Search results for: psychological- social approach
11918 Teaching Kindness as Moral Virtue in Preschool Children: The Effectiveness of Picture-Storybook Reading and Hand-Puppet Storytelling
Authors: Rose Mini Agoes Salim, Shahnaz Safitri
Abstract:
The aim of this study is to test the effectiveness of teaching kindness in preschool children by using several techniques. Kindness is a physical act or emotional support aimed to build or maintain relationships with others. Kindness is known to be essential in the development of moral reasoning to distinguish between the good and bad things. In this study, kindness is operationalized as several acts including helping friends, comforting sad friends, inviting friends to play, protecting others, sharing, saying hello, saying thank you, encouraging others, and apologizing. It is mentioned that kindness is crucial to be developed in preschool children because this is the time the children begin to interact with their social environment through play. Furthermore, preschool children's cognitive development makes them begin to represent the world with words, which then allows them to interact with others. On the other hand, preschool children egocentric thinking makes them still need to learn to consider another person's perspective. In relation to social interaction, preschool children need to be stimulated and assisted by adult to be able to pay attention to other and act with kindness toward them. On teaching kindness to children, the quality of interaction between children and their significant others is the key factor. It is known that preschool children learn about kindness by imitating adults on their two way interaction. Specifically, this study examines two types of teaching techniques that can be done by parents as a way to teach kindness, namely the picture-storybook reading and hand-puppet storytelling. These techniques were examined because both activities are easy to do and both also provide a model of behavior for the child based on the character in the story. To specifically examine those techniques effectiveness in teaching kindness, two studies were conducted. Study I involves 31 children aged 5-6 years old with picture-storybook reading technique, where the intervention is done by reading 8 picture books for 8 days. In study II, hand-puppet storytelling technique is examined to 32 children aged 3-5 years old. The treatments effectiveness are measured using an instrument in the form of nine colored cards that describe the behavior of kindness. Data analysis using Wilcoxon Signed-rank test shows a significant difference on the average score of kindness (p < 0.05) before and after the intervention has been held. For daily observation, a ‘kindness tree’ and observation sheets are used which are filled out by the teacher. Two weeks after interventions, an improvement on all kindness behaviors measured is intact. The same result is also gained from both ‘kindness tree’ and observational sheets.Keywords: kindness, moral teaching, storytelling, hand puppet
Procedia PDF Downloads 25311917 Convective Brinkman-Forchiemer Extended Flow through Channel Filled with Porous Material: An Approximate Analytical Approach
Authors: Basant K. Jha, M. L. Kaurangini
Abstract:
An approximate analytical solution is presented for convective flow in a horizontal channel filled with porous material. The Brinkman-Forchheimer extension of Darcy equation is utilized to model the fluid flow while the energy equation is utilized to model temperature distribution in the channel. The solutions were obtained utilizing the newly suggested technique and compared with those obtained from an implicit finite-difference solution.Keywords: approximate analytical, convective flow, porous material, Brinkman-Forchiemer
Procedia PDF Downloads 39911916 Morphological and Syntactic Meaning: An Interactive Crossword Puzzle Approach
Authors: Ibrahim Garba
Abstract:
This research involved the use of word distributions and morphological knowledge by speakers of Arabic learning English connected different allomorphs in order to realize how the morphology and syntax of English gives meaning through using interactive crossword puzzles (ICP). Fifteen chapters covered with a class of nine learners over an academic year of an intensive English program were reviewed using the ICP. Learners were questioned about how the use of this gaming element enhanced and motivated their learning of English. The findings were positive indicating a successful implementation of ICP both at creational and user levels. This indicated a positive role technology had when learning and teaching English through adopting an interactive gaming element for learning English.Keywords: distribution, gaming, interactive-crossword-puzzle, morphology
Procedia PDF Downloads 33211915 Neural Network in Fixed Time for Collision Detection between Two Convex Polyhedra
Authors: M. Khouil, N. Saber, M. Mestari
Abstract:
In this paper, a different architecture of a collision detection neural network (DCNN) is developed. This network, which has been particularly reviewed, has enabled us to solve with a new approach the problem of collision detection between two convex polyhedra in a fixed time (O (1) time). We used two types of neurons, linear and threshold logic, which simplified the actual implementation of all the networks proposed. The study of the collision detection is divided into two sections, the collision between a point and a polyhedron and then the collision between two convex polyhedra. The aim of this research is to determine through the AMAXNET network a mini maximum point in a fixed time, which allows us to detect the presence of a potential collision.Keywords: collision identification, fixed time, convex polyhedra, neural network, AMAXNET
Procedia PDF Downloads 42611914 Expatriation Success: Different Perceptions
Authors: Graziele Zwielewski, Suzana R. Tolfo
Abstract:
The globalization of markets, the need to develop competitive advantages and core competencies, among other things, lead organizations to increasingly cross borders to operate in other countries. The expatriation of professionals who go to work in another country besides their own becomes increasingly common. In order to generate data about this issue, research was conducted concerning the perception of expatriate employees concerning expatriation success. The research method used was case study through a qualitative approach. This research was done through interviews with five India expatriates and five China expatriates, interview with expatriate department heads and analysis of company documents. It was found that there are differences between the organizational perception and perception of expatriates of what constitutes mission success. The paper also provides suggestions for further research and suggestions for future expatriates.Keywords: expatriation success, international assignments, success factors, success for expatriates
Procedia PDF Downloads 35411913 Fractional Order Differentiator Using Chebyshev Polynomials
Authors: Koushlendra Kumar Singh, Manish Kumar Bajpai, Rajesh Kumar Pandey
Abstract:
A discrete time fractional orderdifferentiator has been modeled for estimating the fractional order derivatives of contaminated signal. The proposed approach is based on Chebyshev’s polynomials. We use the Riemann-Liouville fractional order derivative definition for designing the fractional order SG differentiator. In first step we calculate the window weight corresponding to the required fractional order. Then signal is convoluted with this calculated window’s weight for finding the fractional order derivatives of signals. Several signals are considered for evaluating the accuracy of the proposed method.Keywords: fractional order derivative, chebyshev polynomials, signals, S-G differentiator
Procedia PDF Downloads 65011912 A Syntactic Approach to Applied and Socio-Linguistics in Arabic Language in Modern Communications
Authors: Adeyemo Abduljeeel Taiwo
Abstract:
This research is an attempt that creates a conducive atmosphere of a phonological and morphological compendium of Arabic language in Modern Standard Arabic (MSA) for modern day communications. The research is carried out with the chief aim of grammatical analysis of the two broad fields of Arabic linguistics namely: Applied and Socio-Linguistics. It draws a pictorial record of Applied and Socio-Linguistics in Arabic phonology and morphology. Thematically, it postulates and contemplates to a large degree, the theory of concord in contemporary modern Arabic language acquisition. It utilizes an analytical method while it portrays Arabic as a Semitic language that promotes linguistics and syntax among the scholars of the fields.Keywords: Arabic language, applied linguistics, socio-linguistics, modern communications
Procedia PDF Downloads 33611911 Profiling Risky Code Using Machine Learning
Authors: Zunaira Zaman, David Bohannon
Abstract:
This study explores the application of machine learning (ML) for detecting security vulnerabilities in source code. The research aims to assist organizations with large application portfolios and limited security testing capabilities in prioritizing security activities. ML-based approaches offer benefits such as increased confidence scores, false positives and negatives tuning, and automated feedback. The initial approach using natural language processing techniques to extract features achieved 86% accuracy during the training phase but suffered from overfitting and performed poorly on unseen datasets during testing. To address these issues, the study proposes using the abstract syntax tree (AST) for Java and C++ codebases to capture code semantics and structure and generate path-context representations for each function. The Code2Vec model architecture is used to learn distributed representations of source code snippets for training a machine-learning classifier for vulnerability prediction. The study evaluates the performance of the proposed methodology using two datasets and compares the results with existing approaches. The Devign dataset yielded 60% accuracy in predicting vulnerable code snippets and helped resist overfitting, while the Juliet Test Suite predicted specific vulnerabilities such as OS-Command Injection, Cryptographic, and Cross-Site Scripting vulnerabilities. The Code2Vec model achieved 75% accuracy and a 98% recall rate in predicting OS-Command Injection vulnerabilities. The study concludes that even partial AST representations of source code can be useful for vulnerability prediction. The approach has the potential for automated intelligent analysis of source code, including vulnerability prediction on unseen source code. State-of-the-art models using natural language processing techniques and CNN models with ensemble modelling techniques did not generalize well on unseen data and faced overfitting issues. However, predicting vulnerabilities in source code using machine learning poses challenges such as high dimensionality and complexity of source code, imbalanced datasets, and identifying specific types of vulnerabilities. Future work will address these challenges and expand the scope of the research.Keywords: code embeddings, neural networks, natural language processing, OS command injection, software security, code properties
Procedia PDF Downloads 11011910 A Rapid Assessment of the Impacts of COVID-19 on Overseas Labor Migration: Findings from Bangladesh
Authors: Vaiddehi Bansal, Ridhi Sahai, Kareem Kysia
Abstract:
Overseas labor migration is currently one of the most important contributors to the economy of Bangladesh and is a highly profitable form of labor for Gulf Cooperative Council (GCC) countries. In 2019, 700,159 migrant workers from Bangladeshtraveled abroad for employment. GCC countries are a major destination for Bangladeshi migrant workers, with Saudi Arabia being the most common destination for Bangladeshi migrant workers since 2016. Despite the high rate of migration between these countries every year, the OLR industry remains complex and often leaves migrants susceptible to human trafficking, forced labor, and modern slavery. While the prevalence of forced labor among Bangladeshi migrants in GCC countries is still unknown, the IOM estimates international migrant workers comprise one fourth of the victims of forced labor. Moreover, the onset of the global COVID-19 pandemic has exposed migrant workers to additional adverse situations, making them even more vulnerable to forced labor and health risks. This paper presents findings from a rapid assessment of the impacts of COVID-19 on OLR in Bangladesh, with an emphasis on the increased risk of forced labor among vulnerable migrant worker populations, particularly women.Rapid reviews are a useful approach to swiftly provide actionable evidence for informed decision-making during emergencies, such as the COVID-19 pandemic. The research team conducted semi-structured key information interviews (KIIs) with a range of stakeholders, including government officials, local NGOs, international organizations, migration researchers, and formal and informal recruiting agencies, to obtain insights on the multi-facted impacts of COVID-19 on the OLR sector. The research team also conducted a comprehensive review of available resources, including media articles, blogs, policy briefs, reports, white papers, and other online content, to triangulate findings from the KIIs. After screening for inclusion criteria, a total of 110 grey literature documents were included in the review. A total of 31 KIIs were conducted, data from which was transcribed and translated from Bangla to English, andanalyzed using a detailed codebook. Findings indicate that there was limited reintegration support for returnee migrants. Facing increasing amounts of debt, financial insecurity, and social discrimination, returnee migrants, were extremely vulnerable to forced labor and exploitation. Growing financial debt and limited job opportunities in their home country will likely push migrants to resort to unsafe migration channels. Evidence suggests that women, who are primarily domestic works in GCC countries, were exposed to increased risk of forced labor and workplace violence. Due to stay-at-home measures, women migrant workers were tasked with additional housekeeping working and subjected to longer work hours, wage withholding, and physical abuse. In Bangladesh, returnee women migrant workers also faced an increased risk of domestic violence.Keywords: forced labor, migration, gender, human trafficking
Procedia PDF Downloads 11611909 Issues of Accounting of Lease and Revenue according to International Financial Reporting Standards
Authors: Nadezhda Kvatashidze, Elena Kharabadze
Abstract:
It is broadly known that lease is a flexible means of funding enterprises. Lease reduces the risk related to access and possession of assets, as well as obtainment of funding. Therefore, it is important to refine lease accounting. The lease accounting regulations under the applicable standard (International Accounting Standards 17) make concealment of liabilities possible. As a result, the information users get inaccurate and incomprehensive information and have to resort to an additional assessment of the off-balance sheet lease liabilities. In order to address the problem, the International Financial Reporting Standards Board decided to change the approach to lease accounting. With the deficiencies of the applicable standard taken into account, the new standard (IFRS 16 ‘Leases’) aims at supplying appropriate and fair lease-related information to the users. Save certain exclusions; the lessee is obliged to recognize all the lease agreements in its financial report. The approach was determined by the fact that under the lease agreement, rights and obligations arise by way of assets and liabilities. Immediately upon conclusion of the lease agreement, the lessee takes an asset into its disposal and assumes the obligation to effect the lease-related payments in order to meet the recognition criteria defined by the Conceptual Framework for Financial Reporting. The payments are to be entered into the financial report. The new lease accounting standard secures supply of quality and comparable information to the financial information users. The International Accounting Standards Board and the US Financial Accounting Standards Board jointly developed IFRS 15: ‘Revenue from Contracts with Customers’. The standard allows the establishment of detailed revenue recognition practical criteria such as identification of the performance obligations in the contract, determination of the transaction price and its components, especially price variable considerations and other important components, as well as passage of control over the asset to the customer. IFRS 15: ‘Revenue from Contracts with Customers’ is very similar to the relevant US standards and includes requirements more specific and consistent than those of the standards in place. The new standard is going to change the recognition terms and techniques in the industries, such as construction, telecommunications (mobile and cable networks), licensing (media, science, franchising), real property, software etc.Keywords: assessment of the lease assets and liabilities, contractual liability, division of contract, identification of contracts, contract price, lease identification, lease liabilities, off-balance sheet, transaction value
Procedia PDF Downloads 32211908 Modeling and Simulation of Standalone Photovoltaic Charging Stations for Electric Vehicles
Authors: R. Mkahl, A. Nait-Sidi-Moh, M. Wack
Abstract:
Batteries of electric vehicles (BEV) are becoming more attractive with the advancement of new battery technologies and promotion of electric vehicles. BEV batteries are recharged on board vehicles using either the grid (G2V for Grid to Vehicle) or renewable energies in a stand-alone application (H2V for Home to Vehicle). This paper deals with the modeling, sizing and control of a photo voltaic stand-alone application that can charge the BEV at home. The modeling approach and developed mathematical models describing the system components are detailed. Simulation and experimental results are presented and commented.Keywords: electric vehicles, photovoltaic energy, lead-acid batteries, charging process, modeling, simulation, experimental tests
Procedia PDF Downloads 44611907 Patent License of Transfer Technology: Challenges and Opportunities in Indonesia
Authors: Agung Sujatmiko
Abstract:
One of the purposes of patent licensing was to transfer technology from developed countries to developing countries. For this reason, the role of the patent license agreement was very important and had a function as a tool to achieve technological development. This goal was very good, but in fact, many problems and obstacles arose in its implementation, so the technology transfer that had been implemented had not given good results. For this reason, it was necessary to find a solution so that technology could switch properly. The problem approach used the statutory and conceptual approaches. The analysis used was deductive by analyzing general laws and regulations and then concluding. Several regulations related to technology transfer were the main source to find answers to why technology transfer was difficult to achieve and what caused it. Once the cause was known, a solution would be sought.Keywords: license, patent, technology, tie in clause
Procedia PDF Downloads 10111906 Eating Behaviours in Islam and Mental Health: A Preventative Approach
Authors: Muhammad Rafiq, Lamae Zulfiqar, Nazish Idrees Chaudhary
Abstract:
A growing number of research focuses on healthy and unhealthy eating behaviors and their impact on health. It was intended to study the Islamic point of view on eating behavior, its impact on mental health and preventative strategies in the light of the Quran and Sunnah. Different articles and Islamic sayings related to eating behaviors and mental health were reviewed in detail. It was also revealed scientifically and through Islamic point of view that appropriate quantity, quality and timings of food have positive effects on mental health. Therefore, a 3Rs model of eating behaviors has been proposed.Keywords: food intake, mental health, quality of food, quantity of food
Procedia PDF Downloads 24111905 A Design for Application of Mobile Agent Technology to MicroService Architecture
Authors: Masayuki Higashino, Toshiya Kawato, Takao Kawamura
Abstract:
A monolithic service is based on the N-tier architecture in many cases. In order to divide a monolithic service into microservices, it is necessary to redefine a model as a new microservice by extracting and merging existing models across layers. Refactoring a monolithic service into microservices requires advanced technical capabilities, and it is a difficult way. This paper proposes a design and concept to ease the migration of a monolithic service to microservices using the mobile agent technology. Our proposed approach, mobile agents-based design and concept, enables to ease dividing and merging services.Keywords: mobile agent, microservice, web service, distributed system
Procedia PDF Downloads 16711904 A Study of Traffic Assignment Algorithms
Authors: Abdelfetah Laouzai, Rachid Ouafi
Abstract:
In a traffic network, users usually choose their way so that it reduces their travel time between pairs origin-destination. This behavior might seem selfish as it produces congestions in different parts of the network. The traffic assignment problem (TAP) models the interactions between congestion and user travel decisions to obtain vehicles flows over each axis of the traffic network. The resolution methods of TAP serve as a tool allows predicting users’ distribution, identifying congesting points and affecting the travelers’ behavior in the choice of their route in the network following dynamic data. In this article, we will present a review about specific resolution approach of TAP. A comparative analysis is carried out on those approaches so that it highlights the characteristics, advantages and disadvantages of each.Keywords: network traffic, travel decisions, approaches, traffic assignment, flows
Procedia PDF Downloads 47411903 On the Analysis of Pseudorandom Partial Quotient Sequences Generated from Continued Fractions
Authors: T. Padma, Jayashree S. Pillai
Abstract:
Random entities are an essential component in any cryptographic application. The suitability of a number theory based novel pseudorandom sequence called Pseudorandom Partial Quotient Sequence (PPQS) generated from the continued fraction expansion of irrational numbers, in cryptographic applications, is analyzed in this paper. An approach to build the algorithm around a hard mathematical problem has been considered. The PQ sequence is tested for randomness and its suitability as a cryptographic key by performing randomness analysis, key sensitivity and key space analysis, precision analysis and evaluating the correlation properties is established.Keywords: pseudorandom sequences, key sensitivity, correlation, security analysis, randomness analysis, sensitivity analysis
Procedia PDF Downloads 59411902 Application of Neuroscience in Aligning Instructional Design to Student Learning Style
Authors: Jayati Bhattacharjee
Abstract:
Teaching is a very dynamic profession. Teaching Science is as much challenging as Learning the subject if not more. For instance teaching of Chemistry. From the introductory concepts of subatomic particles to atoms of elements and their symbols and further presenting the chemical equation and so forth is a challenge on both side of the equation Teaching Learning. This paper combines the Neuroscience of Learning and memory with the knowledge of Learning style (VAK) and presents an effective tool for the teacher to authenticate Learning. The model of ‘Working Memory’, the Visio-spatial sketchpad, the central executive and the phonological loop that transforms short-term memory to long term memory actually supports the psychological theory of Learning style i.e. Visual –Auditory-Kinesthetic. A closer examination of David Kolbe’s learning model suggests that learning requires abilities that are polar opposites, and that the learner must continually choose which set of learning abilities he or she will use in a specific learning situation. In grasping experience some of us perceive new information through experiencing the concrete, tangible, felt qualities of the world, relying on our senses and immersing ourselves in concrete reality. Others tend to perceive, grasp, or take hold of new information through symbolic representation or abstract conceptualization – thinking about, analyzing, or systematically planning, rather than using sensation as a guide. Similarly, in transforming or processing experience some of us tend to carefully watch others who are involved in the experience and reflect on what happens, while others choose to jump right in and start doing things. The watchers favor reflective observation, while the doers favor active experimentation. Any lesson plan based on the model of Prescriptive design: C+O=M (C: Instructional condition; O: Instructional Outcome; M: Instructional method). The desired outcome and conditions are independent variables whereas the instructional method is dependent hence can be planned and suited to maximize the learning outcome. The assessment for learning rather than of learning can encourage, build confidence and hope amongst the learners and go a long way to replace the anxiety and hopelessness that a student experiences while learning Science with a human touch in it. Application of this model has been tried in teaching chemistry to high school students as well as in workshops with teachers. The response received has proven the desirable results.Keywords: working memory model, learning style, prescriptive design, assessment for learning
Procedia PDF Downloads 35211901 Legacy of Islamic Hadith and Biodiversity
Authors: Mohsen Nouraei, M. Amouei
Abstract:
Islamic studies are considered in both the Quran and Hadith. Hadith is defined as a set of reports that narrated the words, and behaviors, of infallible persons such as the holy Prophet (pbuh) or the Infallible Imams (as). The issue of biodiversity which is the one of the most important environmental aspects is considered in the field of Hadith. The present paper has investigated biodiversity on the basis of descriptive-analytical methods and with the approach of library-documentary. The household of the Prophet (as) have referred biodiversity that were included diversity of animals, plants, climate etc. In addition to, they also have emphasized on the human need to keep diversity and no damage. It should be noted that they have expressed the rights of the animals and plants for correct using of human, so that human can use these rights in conservation of diversity and their generation.Keywords: biodiversity, conservation of biodiversity, degradation of biodiversity, extinction of biodiversity
Procedia PDF Downloads 46511900 Socializing Young Females towards Sports
Authors: Mohinder Kumar
Abstract:
Sports are considered as the very prominent social institution in almost every society because it reflects the mores, values, and general culture of a society. Sports activity tend to pave the foundation for learning acceptable values and beliefs and for acquiring desirable character traits such as self-discipline, sportsmanship, and an appreciation for hard work, fairness, self-respect, leadership, followership, justice, perseverance, competition, and goal attainment. The present study focuses on ideal ways of socializing youngsters into sports. Influences of some socializing agents (e.g. family, school, community) are reviewed and suggestions made as to how these socializing agents can be oriented and made effective in carrying out functional processes toward target ends.Keywords: sports, socializing, family, community, society
Procedia PDF Downloads 46211899 Understanding Consumer Behavior Towards Business Ethics: Is it Really Important for Consumers
Authors: Ömer Akkaya, Muammer Zerenler
Abstract:
Ethics is important for all shareholders and stakeholders that a firm has in its environment. Whether a firm behaves ethically or unethically has a significant influence on consumers’ decision making and buying process. This research tries to explain business ethics from consumers’ perspective. The survey includes several questions to explain how consumers react if they know a firm behave unethically or ethically. What are consumers’ expectations regarding the ethical behavior of firm? Do consumer reward or punish the firms considering the ethics? Does it really important for consumers firms behaving ethical?Keywords: business ethics, consumer behavior, ethics, social responsibility
Procedia PDF Downloads 36211898 JavaScript Object Notation Data against eXtensible Markup Language Data in Software Applications a Software Testing Approach
Authors: Theertha Chandroth
Abstract:
This paper presents a comparative study on how to check JSON (JavaScript Object Notation) data against XML (eXtensible Markup Language) data from a software testing point of view. JSON and XML are widely used data interchange formats, each with its unique syntax and structure. The objective is to explore various techniques and methodologies for validating comparison and integration between JSON data to XML and vice versa. By understanding the process of checking JSON data against XML data, testers, developers and data practitioners can ensure accurate data representation, seamless data interchange, and effective data validation.Keywords: XML, JSON, data comparison, integration testing, Python, SQL
Procedia PDF Downloads 14211897 Long Short-Term Memory Stream Cruise Control Method for Automated Drift Detection and Adaptation
Authors: Mohammad Abu-Shaira, Weishi Shi
Abstract:
Adaptive learning, a commonly employed solution to drift, involves updating predictive models online during their operation to react to concept drifts, thereby serving as a critical component and natural extension for online learning systems that learn incrementally from each example. This paper introduces LSTM-SCCM “Long Short-Term Memory Stream Cruise Control Method”, a drift adaptation-as-a-service framework for online learning. LSTM-SCCM automates drift adaptation through prompt detection, drift magnitude quantification, dynamic hyperparameter tuning, performing shortterm optimization and model recalibration for immediate adjustments, and, when necessary, conducting long-term model recalibration to ensure deeper enhancements in model performance. LSTM-SCCM is incorporated into a suite of cutting-edge online regression models, assessing their performance across various types of concept drift using diverse datasets with varying characteristics. The findings demonstrate that LSTM-SCCM represents a notable advancement in both model performance and efficacy in handling concept drift occurrences. LSTM-SCCM stands out as the sole framework adept at effectively tackling concept drifts within regression scenarios. Its proactive approach to drift adaptation distinguishes it from conventional reactive methods, which typically rely on retraining after significant degradation to model performance caused by drifts. Additionally, LSTM-SCCM employs an in-memory approach combined with the Self-Adjusting Memory (SAM) architecture to enhance real-time processing and adaptability. The framework incorporates variable thresholding techniques and does not assume any particular data distribution, making it an ideal choice for managing high-dimensional datasets and efficiently handling large-scale data. Our experiments, which include abrupt, incremental, and gradual drifts across both low- and high-dimensional datasets with varying noise levels, and applied to four state-of-the-art online regression models, demonstrate that LSTM-SCCM is versatile and effective, rendering it a valuable solution for online regression models to address concept drift.Keywords: automated drift detection and adaptation, concept drift, hyperparameters optimization, online and adaptive learning, regression
Procedia PDF Downloads 1811896 Discrimination during a Resume Audit: The Impact of Job Context in Hiring
Authors: Alexandra Roy
Abstract:
Building on literature on cognitive matching and social categorization and using the correspondence testing method, we test the interaction effect of person characteristics (Gender with physical attractiveness) and job context (client contact, industry status, coworker contact). As expected, while findings show a strong impact of gender with beauty on hiring chances, job context characteristics have also a significant overall effect of this hiring outcome. Moreover, the rate of positive responses varies according some of the recruiter’s characteristics. Results are robust to various sensitivity checks. Implications of the results, limitations of the study, and directions for future research are discussed.Keywords: correspondence testing, discrimination, hiring, physical attractiveness
Procedia PDF Downloads 20911895 Sustainable Development: The Human Rights Approach to Environmental Protection in South Africa
Authors: CM van der Bank, Marjoné van der Bank
Abstract:
International and domestic environmental law has evolved quite rapidly in the last few decades. At the international level the Stockholm and Rio Declarations paved the way for a broad based consensus of the international community on environmental issues and principles. At the Domestic level also many states have incorporated environmental protection in their constitutions and even more states are doing the same at least in their domestic legislations. In this process of evolution environmental law has unleashed a number of novel principles such as; the participatory principle, the polluter pays principle, the precautionary principle, the inter-generational and intra-generational principles, the prevention principle, the sustainable development principle and so on.Keywords: environment, human rights, international law, protection
Procedia PDF Downloads 46411894 Automated Transformation of 3D Point Cloud to BIM Model: Leveraging Algorithmic Modeling for Efficient Reconstruction
Authors: Radul Shishkov, Orlin Davchev
Abstract:
The digital era has revolutionized architectural practices, with building information modeling (BIM) emerging as a pivotal tool for architects, engineers, and construction professionals. However, the transition from traditional methods to BIM-centric approaches poses significant challenges, particularly in the context of existing structures. This research introduces a technical approach to bridge this gap through the development of algorithms that facilitate the automated transformation of 3D point cloud data into detailed BIM models. The core of this research lies in the application of algorithmic modeling and computational design methods to interpret and reconstruct point cloud data -a collection of data points in space, typically produced by 3D scanners- into comprehensive BIM models. This process involves complex stages of data cleaning, feature extraction, and geometric reconstruction, which are traditionally time-consuming and prone to human error. By automating these stages, our approach significantly enhances the efficiency and accuracy of creating BIM models for existing buildings. The proposed algorithms are designed to identify key architectural elements within point clouds, such as walls, windows, doors, and other structural components, and to translate these elements into their corresponding BIM representations. This includes the integration of parametric modeling techniques to ensure that the generated BIM models are not only geometrically accurate but also embedded with essential architectural and structural information. Our methodology has been tested on several real-world case studies, demonstrating its capability to handle diverse architectural styles and complexities. The results showcase a substantial reduction in time and resources required for BIM model generation while maintaining high levels of accuracy and detail. This research contributes significantly to the field of architectural technology by providing a scalable and efficient solution for the integration of existing structures into the BIM framework. It paves the way for more seamless and integrated workflows in renovation and heritage conservation projects, where the accuracy of existing conditions plays a critical role. The implications of this study extend beyond architectural practices, offering potential benefits in urban planning, facility management, and historic preservation.Keywords: BIM, 3D point cloud, algorithmic modeling, computational design, architectural reconstruction
Procedia PDF Downloads 6811893 Application of Granular Computing Paradigm in Knowledge Induction
Authors: Iftikhar U. Sikder
Abstract:
This paper illustrates an application of granular computing approach, namely rough set theory in data mining. The paper outlines the formalism of granular computing and elucidates the mathematical underpinning of rough set theory, which has been widely used by the data mining and the machine learning community. A real-world application is illustrated, and the classification performance is compared with other contending machine learning algorithms. The predictive performance of the rough set rule induction model shows comparative success with respect to other contending algorithms.Keywords: concept approximation, granular computing, reducts, rough set theory, rule induction
Procedia PDF Downloads 53311892 EEG Diagnosis Based on Phase Space with Wavelet Transforms for Epilepsy Detection
Authors: Mohmmad A. Obeidat, Amjed Al Fahoum, Ayman M. Mansour
Abstract:
The recognition of an abnormal activity of the brain functionality is a vital issue. To determine the type of the abnormal activity either a brain image or brain signal are usually considered. Imaging localizes the defect within the brain area and relates this area with somebody functionalities. However, some functions may be disturbed without affecting the brain as in epilepsy. In this case, imaging may not provide the symptoms of the problem. A cheaper yet efficient approach that can be utilized to detect abnormal activity is the measurement and analysis of the electroencephalogram (EEG) signals. The main goal of this work is to come up with a new method to facilitate the classification of the abnormal and disorder activities within the brain directly using EEG signal processing, which makes it possible to be applied in an on-line monitoring system.Keywords: EEG, wavelet, epilepsy, detection
Procedia PDF Downloads 53911891 Feedback Preference and Practice of English Majors’ in Pronunciation Instruction
Authors: Claerchille Jhulia Robin
Abstract:
This paper discusses the perspective of ESL learners towards pronunciation instruction. It sought to determine how these learners view the type of feedback their speech teacher gives and its impact on their own classroom practice of providing feedback. This study utilized a quantitative-qualitative approach to the problem. The respondents were Education students majoring in English. A survey questionnaire and interview guide were used for data gathering. The data from the survey was tabulated using frequency count and the data from the interview were then transcribed and analyzed. Results showed that ESL learners favor immediate corrective feedback and they do not find any issue in being corrected in front of their peers. They also practice the same corrective technique in their own classroom.Keywords: ESL, feedback, learner perspective, pronunciation instruction
Procedia PDF Downloads 23611890 Application of Robotics to Assemble a Used Fuel Container in the Canadian Used Fuel Packing Plant
Authors: Dimitrie Marinceu
Abstract:
The newest Canadian Used Fuel Container (UFC)- (called also “Mark II”) modifies the design approach for its Assembly Robotic Cell (ARC) in the Canadian Used (Nuclear) Fuel Packing Plant (UFPP). Some of the robotic design solutions are presented in this paper. The design indicates that robots and manipulators are expected to be used in the Canadian UFPP. As normally, the UFPP design will incorporate redundancy of all equipment to allow expedient recovery from any postulated upset conditions. Overall, this paper suggests that robot usage will have a significant positive impact on nuclear safety, quality, productivity, and reliability.Keywords: used fuel packing plant, robotic assembly cell, used fuel container, deep geological repository
Procedia PDF Downloads 29311889 A Novel Approach to 3D Thrust Vectoring CFD via Mesh Morphing
Authors: Umut Yıldız, Berkin Kurtuluş, Yunus Emre Muslubaş
Abstract:
Thrust vectoring, especially in military aviation, is a concept that sees much use to improve maneuverability in already agile aircraft. As this concept is fairly new and cost intensive to design and test, computational methods are useful in easing the preliminary design process. Computational Fluid Dynamics (CFD) can be utilized in many forms to simulate nozzle flow, and there exist various CFD studies in both 2D mechanical and 3D injection based thrust vectoring, and yet, 3D mechanical thrust vectoring analyses, at this point in time, are lacking variety. Additionally, the freely available test data is constrained to limited pitch angles and geometries. In this study, based on a test case provided by NASA, both steady and unsteady 3D CFD simulations are conducted to examine the aerodynamic performance of a mechanical thrust vectoring nozzle model and to validate the utilized numerical model. Steady analyses are performed to verify the flow characteristics of the nozzle at pitch angles of 0, 10 and 20 degrees, and the results are compared with experimental data. It is observed that the pressure data obtained on the inner surface of the nozzle at each specified pitch angle and under different flow conditions with pressure ratios of 1.5, 2 and 4, as well as at azimuthal angle of 0, 45, 90, 135, and 180 degrees exhibited a high level of agreement with the corresponding experimental results. To validate the CFD model, the insights from the steady analyses are utilized, followed by unsteady analyses covering a wide range of pitch angles from 0 to 20 degrees. Throughout the simulations, a mesh morphing method using a carefully calculated mathematical shape deformation model that simulates the vectored nozzle shape exactly at each point of its travel is employed to dynamically alter the divergent part of the nozzle over time within this pitch angle range. The mesh morphing based vectored nozzle shapes were compared with the drawings provided by NASA, ensuring a complete match was achieved. This computational approach allowed for the creation of a comprehensive database of results without the need to generate separate solution domains. The database contains results at every 0.01° increment of nozzle pitch angle. The unsteady analyses, generated using the morphing method, are found to be in excellent agreement with experimental data, further confirming the accuracy of the CFD model.Keywords: thrust vectoring, computational fluid dynamics, 3d mesh morphing, mathematical shape deformation model
Procedia PDF Downloads 87