Search results for: distance learning education
2974 South Asia’s Political Landscape: Precipitating Terrorism
Authors: Saroj Kumar Rath
Abstract:
India's Muslims represent 15 percent of the nation's population, the world's third largest group in any nation after Indonesia and Pakistan. Extremist groups like the Islamic State, Al Qaeda, the Taliban and the Haqqani network increasingly view India as a target. Several trends explain the rise: Terrorism threats in South Asia are linked and mobile - if one source is batted down, jihadists relocate to find another Islamic cause. As NATO withdraws from Afghanistan, some jihadists will eye India. Pakistan regards India as a top enemy and some officials even encourage terrorists to target areas like Kashmir or Mumbai. Meanwhile, a stream of Wahhabi preachers have visited India, offering hard-line messages; extremist groups like Al Qaeda and the Islamic State compete for influence, and militants even pay jihadists. Muslims as a minority population in India could offer fertile ground for the extremist recruiters. This paper argues that there is an urgent need for the Indian government to profile militants and examine social media sites to attack Wahhabi indoctrination while supporting education and entrepreneurship for all of India's citizens.Keywords: Al Qaeda, terrorism, Islamic state, India, haqqani network, Pakistan, Taliban
Procedia PDF Downloads 6172973 Factors Related to the Success of Exclusive Breastfeeding: A Cross Sectional Study among Mothers in Cirebon City, Indonesia
Authors: Witri Pratiwi, Shopa Nur Fauzah, Dini Norviatin
Abstract:
WHO recommends breastfeeding exclusively for infants aged 0 to 6 months because breast milk is the best nutrition. There are several factors associated with the success of exclusive breastfeeding. This study aims to determine the factors associated with the success of exclusive breastfeeding. A cross-sectional study was conducted at 6 community health centers in Cirebon City, Indonesia. Primary data were obtained from a validated questionnaire given to mothers who have children aged 6 to 24 months. A total of 326 mothers participated in this study. Two hundred and eighteen (66.9%) mothers gave exclusive breastfeeding to their babies, and 108 (33.1%) did not give exclusive breastfeeding. The baby gender (p=0.240), birth weight (p=0.436), and place of birth (0.137) were not related to exclusive breastfeeding. Mode of delivery (p=0.029) and early initiation of breastfeeding (p=0.001) were significantly associated with exclusive breastfeeding. Infants with early initiation of breastfeeding are three times more likely to get exclusive breastfeeding compared to those who do not get breastfeeding early (p=0.001; OR=3.696 [95% CI 1.764 – 7.746]). Early initiation of breastfeeding is the most important factor in determining the success of exclusive breastfeeding. Promotion and education on the importance of early breastfeeding initiation to prospective mothers, families, and health workers are expected to be improved.Keywords: early initiation of breastfeeding, exclusive breastfeeding, mode of delivery, Indonesia
Procedia PDF Downloads 1382972 Process Mining as an Ecosystem Platform to Mitigate a Deficiency of Processes Modelling
Authors: Yusra Abdulsalam Alqamati, Ahmed Alkilany
Abstract:
The teaching staff is a distinct group whose impact is on the educational process and which plays an important role in enhancing the quality of the academic education process. To improve the management effectiveness of the academy, the Teaching Staff Management System (TSMS) proposes that all teacher processes be digitized. Since the BPMN approach can accurately describe the processes, it lacks a clear picture of the process flow map, something that the process mining approach has, which is extracting information from event logs for discovery, monitoring, and model enhancement. Therefore, these two methodologies were combined to create the most accurate representation of system operations, the ability to extract data records and mining processes, recreate them in the form of a Petri net, and then generate them in a BPMN model for a more in-depth view of process flow. Additionally, the TSMS processes will be orchestrated to handle all requests in a guaranteed small-time manner thanks to the integration of the Google Cloud Platform (GCP), the BPM engine, and allowing business owners to take part throughout the entire TSMS project development lifecycle.Keywords: process mining, BPM, business process model and notation, Petri net, teaching staff, Google Cloud Platform
Procedia PDF Downloads 1422971 Framework to Quantify Customer Experience
Authors: Anant Sharma, Ashwin Rajan
Abstract:
Customer experience is measured today based on defining a set of metrics and KPIs, setting up thresholds and defining triggers across those thresholds. While this is an effective way of measuring against a Key Performance Indicator ( referred to as KPI in the rest of the paper ), this approach cannot capture the various nuances that make up the overall customer experience. Customers consume a product or service at various levels, which is not reflected in metrics like Customer Satisfaction or Net Promoter Score, but also across other measurements like recurring revenue, frequency of service usage, e-learning and depth of usage. Here we explore an alternative method of measuring customer experience by flipping the traditional views. Rather than rolling customers up to a metric, we roll up metrics to hierarchies and then measure customer experience. This method allows any team to quantify customer experience across multiple touchpoints in a customer’s journey. We make use of various data sources which contain information for metrics like CXSAT, NPS, Renewals, and depths of service usage collected across a customer lifecycle. This data can be mined systematically to get linkages between different data points like geographies, business groups, products and time. Additional views can be generated by blending synthetic contexts into the data to show trends and top/bottom types of reports. We have created a framework that allows us to measure customer experience using the above logic.Keywords: analytics, customers experience, BI, business operations, KPIs, metrics
Procedia PDF Downloads 752970 Environmental Variables as Determinants of Students Achievement in Biology Secondary Schools in South West Nigeria
Authors: Ayeni Margaret Foluso, K. A. Omotayo
Abstract:
This study investigated the impact of selected environmental variables as determinants of students’ achievements in biology in secondary schools. The selected environmental variables are class size and laboratory adequacy. The purpose was to find out whether these environmental variables can bring about improvement in the learning of biology by Senior Secondary School Students. The study design used was descriptive research of the survey type. Two instruments were used that is, Biology Achievement Test and School Environment Questionnaire .The population of the study consisted of all Biology students in both public and private Senior Secondary Schools class III (SSIII) in all the three selected states in South West Nigeria. A sample of 900 Biology students and 45 Biology Teachers from both public and private Senior Secondary Schools Class III were used. Two research hypotheses were generated for the study. The data collected were subjected to both descriptive statistics of mean and standard deviation; and the inferential statistics of regression Analyses was employed to test the hypotheses formulated. From the results, it was revealed that the selected environmental variables had influence on the students’ achievement in biology.Keywords: environmental variables, determinants, students’ achievement, school science
Procedia PDF Downloads 4882969 Iot Device Cost Effective Storage Architecture and Real-Time Data Analysis/Data Privacy Framework
Authors: Femi Elegbeleye, Omobayo Esan, Muienge Mbodila, Patrick Bowe
Abstract:
This paper focused on cost effective storage architecture using fog and cloud data storage gateway and presented the design of the framework for the data privacy model and data analytics framework on a real-time analysis when using machine learning method. The paper began with the system analysis, system architecture and its component design, as well as the overall system operations. The several results obtained from this study on data privacy model shows that when two or more data privacy model is combined we tend to have a more stronger privacy to our data, and when fog storage gateway have several advantages over using the traditional cloud storage, from our result shows fog has reduced latency/delay, low bandwidth consumption, and energy usage when been compare with cloud storage, therefore, fog storage will help to lessen excessive cost. This paper dwelt more on the system descriptions, the researchers focused on the research design and framework design for the data privacy model, data storage, and real-time analytics. This paper also shows the major system components and their framework specification. And lastly, the overall research system architecture was shown, its structure, and its interrelationships.Keywords: IoT, fog, cloud, data analysis, data privacy
Procedia PDF Downloads 992968 Particle Filter State Estimation Algorithm Based on Improved Artificial Bee Colony Algorithm
Authors: Guangyuan Zhao, Nan Huang, Xuesong Han, Xu Huang
Abstract:
In order to solve the problem of sample dilution in the traditional particle filter algorithm and achieve accurate state estimation in a nonlinear system, a particle filter method based on an improved artificial bee colony (ABC) algorithm was proposed. The algorithm simulated the process of bee foraging and optimization and made the high likelihood region of the backward probability of particles moving to improve the rationality of particle distribution. The opposition-based learning (OBL) strategy is introduced to optimize the initial population of the artificial bee colony algorithm. The convergence factor is introduced into the neighborhood search strategy to limit the search range and improve the convergence speed. Finally, the crossover and mutation operations of the genetic algorithm are introduced into the search mechanism of the following bee, which makes the algorithm jump out of the local extreme value quickly and continue to search the global extreme value to improve its optimization ability. The simulation results show that the improved method can improve the estimation accuracy of particle filters, ensure the diversity of particles, and improve the rationality of particle distribution.Keywords: particle filter, impoverishment, state estimation, artificial bee colony algorithm
Procedia PDF Downloads 1522967 Accidents Involving Pedestrians Walking along with/against Traffic: An Evaluation of Crash Characteristics and Injuries
Authors: Chih-Wei Pai, Rong-Chang Jou
Abstract:
Using A1 A2 police-reported accident data for years 2003–2010 in Taiwan, the paper examines anatomic injuries and crash characteristics specific to pedestrians in “facing traffic” and “back to traffic” crashes. There were 2768 and 7558 accidents involving pedestrians walking along with/against traffic respectively. Injuries sustained by pedestrians and crash characteristics in these two crash types were compared with those in other crash types (nearside crash, nearside dart-out crash, offside crash, offside dart-out crash). Main findings include that “back to traffic” crashes resulted in more severe injuries, and pedestrians in “back to traffic” crashes had increased head, neck, and spine injuries than those in other crash types; and there was an elevated risk of head injuries in unlit darkness and NBU (non-built-up) roadways. Several crash features (e.g. unlit darkness, overtaking maneuvers, phone use by pedestrians and drivers, intoxicated drivers) appear to be over-involved in “back to traffic” crashes. The implications of the research findings regarding pedestrian/driver education, enforcement, and remedial engineering design are discussed.Keywords: pedestrian accident, crash characteristics, injury, facing traffic, back to traffic
Procedia PDF Downloads 3782966 Educating on Historic Preservation in the Alabama Gulf Coast: The Case of the Peninsula of Mobile
Authors: Asmaa Benbaba
Abstract:
A series of action plans motivated this work within the city of mobile as the big category and the Peninsula more particularly. Most of the projects sought to educate about the historical and environmental assets of the place, to improve aesthetics, to preserve the natural resources on the Bayou, spread awareness, and reach out to the community. This study was conducted to preserve significant heritage landscapes, and significant historic buildings in the neighborhood of the Peninsula of Mobile at the state of Alabama, while simultaneously strengthen the cultural and historical resources. The purpose of this planning action was to provide planning regulations for the suburban areas of Mobile in Alabama. The plan attempted to overlap three main layers: community, environment, and history. The method that was used to collect data and conduct research was mainly qualitative. The Geographic Information System (GIS) was the tool used to represent this complexity. Results from this study revealed several interventions made to 'neighborhood marina.' The interventions were strategic scenarios to preserve the water landscape, create affordable leisure, connect the Dauphin Island Parkway to the water, preserve all the environmental layers, and add value to the neighborhoods of the Peninsula.Keywords: community outreach, education, historic preservation, peninsula
Procedia PDF Downloads 1362965 Detection of Cyberattacks on the Metaverse Based on First-Order Logic
Authors: Sulaiman Al Amro
Abstract:
There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic
Procedia PDF Downloads 412964 Entrepreneurship Cure for Economic Under-Development in Nigeria: A Theoretical Perspective
Authors: Kurotimi Maurice Fems, Abara Onu, Francis W. D. Poazi
Abstract:
Scholars and development economists believe that the development of an economy depends largely on the creative and innovative ingenuity of its entrepreneurs. Others however, are of the opinion that the lack of entrepreneurs or entrepreneurial activities is not a constraint to economic development in any economy, particularly Nigeria. This paper sets out to explore the connectivity between entrepreneurship and economic development from a theoretical point of view, principally in Nigeria. A desk research approach was adopted where a conglomerate of literatures was reviewed on how entrepreneurship can spur economic growth or otherwise. The findings reveal that entrepreneurship is vital to the development of Nigeria and that, universities and other Higher Education Institutions must play the vital role of educating the people on entrepreneurship skills and competences. However, the problems and difficulties entrepreneurs face in Nigeria and the same problems suffocating the growth and development of its economy. Therefore, entrepreneurship cannot be said to be the sole cure for economic under-development in Nigeria but rather other factors such as empowering and granting the institutions autonomy and the provision of infrastructural capability, such as consistent electricity generation and supply, good system of transportation, implementing proposed economic policies in an effective and efficient manner etc., the cultural beliefs and mindset of the citizenry, was also found to be key in the development of any economy.Keywords: economic underdevelopment, entrepreneurial, entrepreneurship, infrastructural under-development, oil boom, SMEs, unemployable
Procedia PDF Downloads 2732963 Applying Neural Networks for Solving Record Linkage Problem via Fuzzy Description Logics
Authors: Mikheil Kalmakhelidze
Abstract:
Record linkage (RL) problem has become more and more important in recent years due to the growing interest towards big data analysis. The problem can be formulated in a very simple way: Given two entries a and b of a database, decide whether they represent the same object or not. There are two classical deterministic and probabilistic ways of solving the RL problem. Using simple Bayes classifier in many cases produces useful results but sometimes they show to be poor. In recent years several successful approaches have been made towards solving specific RL problems by neural network algorithms including single layer perception, multilayer back propagation network etc. In our work, we model the RL problem for specific dataset of student applications in fuzzy description logic (FDL) where linkage of specific pair (a,b) depends on the truth value of corresponding formula A(a,b) in a canonical FDL model. As a main result, we build neural network for deciding truth value of FDL formulas in a canonical model and thus link RL problem to machine learning. We apply the approach to dataset with 10000 entries and also compare to classical RL solving approaches. The results show to be more accurate than standard probabilistic approach.Keywords: description logic, fuzzy logic, neural networks, record linkage
Procedia PDF Downloads 2722962 Socio-Cultural and Religious Contributions to Gender Wage Gap: A Meta-Analysis
Authors: R. Alothaim, T. Mishra
Abstract:
Different researchers have reviewed the gender wage gap since early days between women and men to point out their difference to help bring about equality in production among them. Many fingers have been pointed out towards culture and religion as one of the major factors contributing to the gender wage gap throughout the years passed. Recent research has been done to give out equalization to this gap between men and women. The gender wage gap has raised serious concerns among nations and societies. Additionally, data, methodology and time periods have been affected by the gender wage gap, thus needing special decision making to help in the meta-study in the provision of quantitative review. Quality indicators have played a crucial role towards the education through stressing on enough consideration to help give a solution of equality and worth in the research study. The different research reviewed have given enough evidence and impact to point out that the major causes of this gender wage gap has resulted due to culture. On the other pedestal, religion may play a role to the issues of gender wage gap but with more emphasis on culture playing the bigger part. Furthermore, social status of individual has contributed to the wage gap difference between men and women. Labor market has played a vital role in empowering women, leading to the lower rate of the raw wage difference in the recent years.Keywords: culture, gender wage gap, social, religion
Procedia PDF Downloads 1202961 Exploring Art Teacher Voice: Canadian Education - Local and International Perspectives
Authors: Amy Atkinson
Abstract:
Teacher burnout and dissatisfaction is a concerning challenge for visual art (VA) programs within the western (Canadian) educational context, however VA programs who offer the International Baccalaureate (IB) curriculum within international schools are thriving. The purpose of this research was to investigate the experiences of Canadian-educated seasoned VA teachers within a range of curriculums, administrative systems and locations focusing on issues related to the VA teaching experience such as viability of the artist-teacher relationship, teaching satisfaction and teacher burnout. Research was conducted using an auto-ethnography approach coupled with a comparative case study method using in-depth interviews. Insights were uncovered into VA teacher’s lived experience, values and decisions, occupational ideology, cultural knowledge, and perspectives. Research for creation methods were explored to develop a creative narrative to amplify teacher voice; endeavouring to make the obscure vivid, empathy possible, direct attention to individuality and locate the universal. Case study results sustain ethnographic observations revealing that VA teachers are experiencing more efficacy, satisfaction and success, with less burn out within the international school/IB context.Keywords: international baccalaureate, autoethnography, teacher voice, visual arts
Procedia PDF Downloads 1842960 The Development of Competency with a Training Curriculum via Electronic Media for Condominium Managers
Authors: Chisakan Papapankiad
Abstract:
The purposes of this research were 1) to study the competency of condominium managers, 2) to create the training curriculum via electronic media for condominium managers, and 3) to evaluate the training curriculum for condominium managers. The research methods included document analysis, interview, questionnaire, and a try-out. A total of 20 experts were selected to collect data by using Delphi technique. The designed curriculum was tried out with 30 condominium managers. The important steps of conducting this research included analyzing and synthesizing, creating interview questions, conducting factor analysis and developing the training curriculum, editing by experts, and trying out with sample groups. The findings revealed that there were five core competencies: leadership, human resources management, management, communication, and self-development. The training curriculum was designed and all the learning materials were put into a CD. The evaluation of the training curriculum was performed by five experts and the training curriculum was found to be cohesive and suitable for use in the real world. Moreover, the findings also revealed three important issues: 1) the competencies of the respondents after the experiment were higher than before the experiment and this had a level of significance of 0.01, 2) the competencies remained with the respondents at least 12 weeks and this also had a level of significance of 0.01, and 3) the overall level of satisfaction from the respondents were 'the highest level'.Keywords: competency training curriculum, condominium managers, electronic media
Procedia PDF Downloads 2862959 Perceptions of Educators on the Learners’ Youngest Age for the Introduction of ICTs in Schools: A Personality Theory Approach
Authors: Kayode E. Oyetade, Seraphin D. Eyono Obono
Abstract:
Age ratings are very helpful in providing parents with relevant information for the purchase and use of digital technologies by the children; this is why the non-definition of age ratings for the use of ICT's by children in schools is a major concern; and this problem serves as a motivation for this study whose aim is to examine the factors affecting the perceptions of educators on the learners’ youngest age for the introduction of ICT's in schools. This aim is achieved through two types of research objectives: the identification and design of theories and models on age ratings, and the empirical testing of such theories and models in a survey of educators from the Camperdown district of the South African KwaZulu-Natal province. A questionnaire is used for the collection of the data of this survey whose validity and reliability is checked in SPSS prior to its descriptive and correlative quantitative analysis. The main hypothesis supporting this research is the association between the demographics of educators, their personality, and their perceptions on the learners’ youngest age for the introduction of ICT's in schools; as claimed by existing research; except that the present study looks at personality from three dimensions: self-actualized personalities, fully functioning personalities, and healthy personalities. This hypothesis was fully confirmed by the empirical study conducted by this research except for the demographic factor where only the educators’ grade or class was found to be associated with the personality of educators.Keywords: age ratings, educators, e-learning, personality theories
Procedia PDF Downloads 2372958 Numerical Investigation of Flow Boiling within Micro-Channels in the Slug-Plug Flow Regime
Authors: Anastasios Georgoulas, Manolia Andredaki, Marco Marengo
Abstract:
The present paper investigates the hydrodynamics and heat transfer characteristics of slug-plug flows under saturated flow boiling conditions within circular micro-channels. Numerical simulations are carried out, using an enhanced version of the open-source CFD-based solver ‘interFoam’ of OpenFOAM CFD Toolbox. The proposed user-defined solver is based in the Volume Of Fluid (VOF) method for interface advection, and the mentioned enhancements include the implementation of a smoothing process for spurious current reduction, the coupling with heat transfer and phase change as well as the incorporation of conjugate heat transfer to account for transient solid conduction. In all of the considered cases in the present paper, a single phase simulation is initially conducted until a quasi-steady state is reached with respect to the hydrodynamic and thermal boundary layer development. Then, a predefined and constant frequency of successive vapour bubbles is patched upstream at a certain distance from the channel inlet. The proposed numerical simulation set-up can capture the main hydrodynamic and heat transfer characteristics of slug-plug flow regimes within circular micro-channels. In more detail, the present investigation is focused on exploring the interaction between subsequent vapour slugs with respect to their generation frequency, the hydrodynamic characteristics of the liquid film between the generated vapour slugs and the channel wall as well as of the liquid plug between two subsequent vapour slugs. The proposed investigation is carried out for the 3 different working fluids and three different values of applied heat flux in the heated part of the considered microchannel. The post-processing and analysis of the results indicate that the dynamics of the evolving bubbles in each case are influenced by both the upstream and downstream bubbles in the generated sequence. In each case a slip velocity between the vapour bubbles and the liquid slugs is evident. In most cases interfacial waves appear close to the bubble tail that significantly reduce the liquid film thickness. Finally, in accordance with previous investigations vortices that are identified in the liquid slugs between two subsequent vapour bubbles can significantly enhance the convection heat transfer between the liquid regions and the heated channel walls. The overall results of the present investigation can be used to enhance the present understanding by providing better insight of the complex, underpinned heat transfer mechanisms in saturated boiling within micro-channels in the slug-plug flow regime.Keywords: slug-plug flow regime, micro-channels, VOF method, OpenFOAM
Procedia PDF Downloads 2672957 Phylogenetic Analysis of Georgian Populations of Potato Cyst Nematodes Globodera Rostochiensis
Authors: Dali Gaganidze, Ekaterine Abashidze
Abstract:
Potato is one of the main agricultural crops in Georgia. Georgia produces early and late potato varieties in almost all regions. In traditional potato growing regions (Svaneti, Samckhet javaheti and Tsalka), the yield is higher than 30-35 t/ha. Among the plant pests that limit potato production and quality, the potato cyst nematodes (PCN) are harmful around the world. Yield losses caused by PCN are estimated up to 30%. Rout surveys conducted in two geographically distinct regions of Georgia producing potatoes - Samtskhe - Javakheti and Svaneti revealed potato cyst nematode Globodera rostochiensi. The aim of the study was the Phylogenetic analyses of Globodera rostochiensi revealed in Georgia by the amplification and sequencing of 28S gen in the D3 region and intergenic ITS1-15.8S-ITS2 region. Identification of all the samples from the two Globodera populations (Samtskhe - Javakheti and Svaneti), i.e., G. rostochiensis (20 isolates) were confirmed by conventional multiplex PCR with ITS 5 universal and PITSp4, PITSr3 specific primers of the cyst nematodes’ (G. pallida, G. rostochiensis). The size of PCR fragment 434 bp confirms that PCN samples from two populations, Samtskhe- Javakheti and Svaneti, belong to G. rostochiensi . The ITS1–5.8S-ITS2 regions were amplified using prime pairs: rDNA1 ( 5’ -TTGATTACGTCCCTGCCCTTT-3’ and rDNA2( 5’ TTTCACTCGCCGTTACTAAGG-3’), D3 expansion regions were amplified using primer pairs: D3A (5’ GACCCCTCTTGAAACACGGA-3’) and D3B (5’-TCGGAAGGAACCAGCTACTA-3’. PCR products of each region were cleaned up and sequenced using an ABI 3500xL Genetic Analyzer. Obtained sequencing results were analyzed by computer program BLASTN (https://blast.ncbi.nlm.nih.gov/Blast.cg). Phylogenetic analyses to resolve the relationships between the isolates were conducted in MEGA7 using both distance- and character-based methods. Based on analysis of G.rostochiensis isolate`s D3 expansion regions are grouped in three major clades (A, B and C) on the phylogenetic tree. Clade A is divided into three subclades; clade C is divided into two subclades. Isolates from the Samtckhet-javakheti population are in subclade 1 of clade A and isolates in subclade 1 of clade C. Isolates) from Svaneti populations are in subclade 2 of clade A and in clad B. In Clade C, subclade two is presented by three isolates from Svaneti and by one isolate (GL17) from Samckhet-Javakheti. . Based on analysis of G.rostochiensis isolate`s ITS1–5.8S-ITS2 regions are grouped in two main clades, the first contained 20 Georgian isolates of Globodera rostochiensis from Svaneti . The second clade contained 15 isolates of Globodera rostochiensis from Samckhet javakheti. Our investigation showed of high genetic variation of D3 and ITS1–5.8S-ITS2 region of rDNA of the isolates of G. rostochiensis from different geographic origins (Svameti, Samckhet-Javakheti) of Georgia. Acknowledgement: The research has been supported by the Shota Rustaveli National Scientific Foundation of Georgia : Project # FR17_235Keywords: globodera rostochiensi, PCR, phylogenetic tree, sequencing
Procedia PDF Downloads 1962956 Selecting Answers for Questions with Multiple Answer Choices in Arabic Question Answering Based on Textual Entailment Recognition
Authors: Anes Enakoa, Yawei Liang
Abstract:
Question Answering (QA) system is one of the most important and demanding tasks in the field of Natural Language Processing (NLP). In QA systems, the answer generation task generates a list of candidate answers to the user's question, in which only one answer is correct. Answer selection is one of the main components of the QA, which is concerned with selecting the best answer choice from the candidate answers suggested by the system. However, the selection process can be very challenging especially in Arabic due to its particularities. To address this challenge, an approach is proposed to answer questions with multiple answer choices for Arabic QA systems based on Textual Entailment (TE) recognition. The developed approach employs a Support Vector Machine that considers lexical, semantic and syntactic features in order to recognize the entailment between the generated hypotheses (H) and the text (T). A set of experiments has been conducted for performance evaluation and the overall performance of the proposed method reached an accuracy of 67.5% with C@1 score of 80.46%. The obtained results are promising and demonstrate that the proposed method is effective for TE recognition task.Keywords: information retrieval, machine learning, natural language processing, question answering, textual entailment
Procedia PDF Downloads 1452955 Analysis of Big Data on Leisure Activities and Depression for the Disabled
Authors: Hee-Jung Seo, Yunjung Lee, Areum Han, Heeyoung Park, Se-Hyuk Park
Abstract:
The purpose of this study was to analyze the relationship between happiness and depression among people with disabilities and to analyze the social phenomenon of leisure activities among them to promote physical and leisure activities for people with disabilities. The research methods included analyzing differences in happiness according to depression classification. A total of 281 people with disabilities were analyzed using SPSS WIN Ver. 29.0. In addition, the SumTrend platform was used to analyze terms related to 'leisure activities for the disabled.' The findings can be summarized into two main points: First, there were significant differences in happiness according to depression classification. Second, there were 20 mentions before COVID-19, 34 mentions after COVID-19, and currently 43 mentions, with high positive rates observed in each period. Based on these results, the following conclusions were drawn: First, measures for people with disabilities include strengthening online resources and services, social distancing response policies, improving accessibility, and providing support and financial assistance. Second, measures for non-disabled individuals emphasize the need for education and information provision, promoting dialogue and interaction, ensuring accessibility, and promoting inclusive cultural awareness and attitude change.Keywords: leisure activities, individuals with disabilities, COVID-19 pandemic, depression
Procedia PDF Downloads 482954 Implementation of the Outputs of Computer Simulation to Support Decision-Making Processes
Authors: Jiri Barta
Abstract:
At the present time, awareness, education, computer simulation and information systems protection are very serious and relevant topics. The article deals with perspectives and possibilities of implementation of emergence or natural hazard threats into the system which is developed for communication among members of crisis management staffs. The Czech Hydro-Meteorological Institute with its System of Integrated Warning Service resents the largest usable base of information. National information systems are connected to foreign systems, especially to flooding emergency systems of neighboring countries, systems of European Union and international organizations where the Czech Republic is a member. Use of outputs of particular information systems and computer simulations on a single communication interface of information system for communication among members of crisis management staff and setting the site interoperability in the net will lead to time savings in decision-making processes in solving extraordinary events and crisis situations. Faster managing of an extraordinary event or a crisis situation will bring positive effects and minimize the impact of negative effects on the environment.Keywords: computer simulation, communication, continuity, critical infrastructure, information systems, safety
Procedia PDF Downloads 3332953 Implementing Action Research in EFL/ESL Classrooms: A Systematic Review of Literature 2010-2019
Authors: Amira D. Ali
Abstract:
Action research studies in education often address learners’ needs and empower practitioner-researcher to effectively change instructional practices and school communities. A systematic review of action research (AR) studies undertaken in EFL/ESL settings was conducted in this paper to systematically analyze empirical studies on action research published within a ten-year period (between 2010 and 2019). The review also aimed at investigating the focal strategies in teaching the language skills at school level and evaluating the overall quality of AR studies concerning focus, purpose, methodology and contribution. Inclusion criteria were established and 41 studies that fit were finally selected for the systematic review. Garrard’s (2007) Matrix Method was used to structure and synthesize the literature. Results showed a significant diversity in teaching strategies and implementation of the AR model. Almost a quarter of the studies focused on improving writing skills at elementary school level. In addition, findings revealed that (44%) of the studies used a mixed approach followed by qualitative method approach (41%), whereas only (15%) employed quantitative methodology. Research gaps for future action research in developing language skills were pointed out, and recommendations were offered.Keywords: action research, EFL/ESL context, language skills, systematic review
Procedia PDF Downloads 1382952 Presenting Internals of Networks Using Bare Machine Technology
Authors: Joel Weymouth, Ramesh K. Karne, Alexander L. Wijesinha
Abstract:
Bare Machine Internet is part of the Bare Machine Computing (BMC) paradigm. It is used in programming application ns to run directly on a device. It is software that runs directly against the hardware using CPU, Memory, and I/O. The software application runs without an Operating System and resident mass storage. An important part of the BMC paradigm is the Bare Machine Internet. It utilizes an Application Development model software that interfaces directly with the hardware on a network server and file server. Because it is “bare,” it is a powerful teaching and research tool that can readily display the internals of the network protocols, software, and hardware of the applications running on the Bare Server. It was also demonstrated that the bare server was accessible by laptop and by smartphone/android. The purpose was to show the further practicality of Bare Internet in Computer Engineering and Computer Science Education and Research. It was also to show that an undergraduate student could take advantage of a bare server with any device and any browser at any release version connected to the internet. This paper presents the Bare Web Server as an educational tool. We will discuss possible applications of this paradigm.Keywords: bare machine computing, online research, network technology, visualizing network internals
Procedia PDF Downloads 1722951 Status and Management of Grape Stem Borer, Celosterna scrabrator with Soil Application of Chlorantraniliprole 0.4 gr
Authors: D. N. Kambrekar, S. B. Jagginavar, J. Aruna
Abstract:
Grape stem borer, Celosterna scrabrator is an important production constraint in grapes in India. Hitherto this pest was a severe menace only on the aged and unmanaged fields but during the recent past it has also started damaging the newly established fields. In India, since Karnataka, Andra Pradesh, Tamil Nadu and Maharashtra are the major grape production states, the incidence of stem borer is also restricted and severe in these states. The grubs of the beetle bore in to the main stem and even the branches, which affect the translocation of nutrients to the areal parts of the plant. Since, the grubs bore inside the stem, the chewed material along with its excreta is discharged outside the holes and the frass is found on the ground just below the bored holes. The portion of vines above the damaged part has a sticky appearance. The leaves become pale yellow which looks like a deficiency of micronutrients. The leaves ultimately dry and drop down. The status of the incidence of the grape stem borer in different grape growing districts of Northern Karnataka was carried out during three years. In each taluka five locations were surveyed for the incidence of grape stem borer. Further, the experiment on management of stem borer was carried out in the grape gardens of Vijayapur districts under farmers field during three years. Stem borer infested plants that show live holes were selected per treatments and it was replicated three times. Live and dead holes observed during pre-treatment were closely monitored and only plants with live holes were selected and tagged. Different doses of chlorantraniliprole 0.4% GR were incorporated into the soil around the vine basins near root zone surrounded to trunk region by removing soils up to 5-10 cm with a peripheral distance of 1 to 1.5 feet from the main trunk where feeder roots are present. Irrigation was followed after application of insecticide for proper incorporation of the test chemical. The results indicated that there was sever to moderate incidence of the stem borer in all the grape growing districts of northern Karnataka. Maximum incidence was recorded in Belagavi (11 holes per vine) and minimum was in Gadag district (8.5 holes per vine). The investigations carried out to study the efficacy of chlorantraniliprole on grape stem borer for successive three years under farmers field indicated that chlorantraniliprole @ 15g/vine applied just near the active root zone of the plant followed by irrigation has successfully managed the pest. The insecticide has translocated to all the parts of the plants and thereby stopped the activity of the pest which has resulted in to better growth of the plant and higher berry yield compared to other treatments under investigation. Thus, chlorantraniliprole 0.4 GR @ 15g/vine can be effective means in managing the stem borer.Keywords: chlorantraniliprole, grape stem borer, Celosterna scrabrator, management
Procedia PDF Downloads 4422950 Challenges in Teaching Code of Ethics and Professional Conduct
Authors: Rasika Dayarathna
Abstract:
Computing has reached every corner of our lives in many forms. The Internet, particularly Social Media, Artificial Intelligence, are prominent among them. As a result, computing has changed our lives and it is expected that severe changes will take place in the coming years. It has introduced a new set of ethical challenges and amplified the existing ethical challenges. It is the duty of everyone involved from conceptualizing, designing, implementing, deploying, and using to follow generally accepted practices in order to avoid or minimize harm and improve the quality of life. Since computing in various forms mentioned above has a significant impact on our lives, various codes of conduct and standards have been introduced. Among many, the ACM (Association of Computing Machinery) Code of Ethics and Professional Conduct is a leading one. This was drafted for everyone, including aspiring computing professionals. However, teaching a code of conduct for aspiring computing professionals is very challenging since this universal code needs to be taught for young computing professionals in a local setting where there are value mismatches and exposure to information systems. This paper discusses the importance of teaching the code, how to overcome the challenges, and suggestions to improve the code to make it more appealing and buying in. It is expected that the improved approach would contribute to improving the quality of life.Keywords: code of conduct, professionalism, ethics, code of ethics, ethics education, moral development
Procedia PDF Downloads 1812949 Research Insights into Making the Premises Spiritually Pure
Authors: Jayant Athavale, Rendy Ekarantio, Sean Clarke
Abstract:
The Maharshi University of Spirituality was founded on the base of 30 years of spiritual research. It specializes in conducting research on how the subtle-world and spiritual-vibrations affect the lives of people. One such area of research is how to create spiritually positive vibrations in the premises. By using aura and energy scanners along with the sixth sense, the spiritual research team has identified 3 aspects that are instrumental in enhancing or reducing the spiritual positivity of any premises. Firstly, the characteristics of the land should be considered holistically, that is, from a physical, psychological and spiritual point of view. While procedures for the physical assessment of land are well documented, due to ignorance and disbelief, the spiritual aspects are not considered. For example, if the land was previously a graveyard site, it can have highly detrimental effects on the residents within the premises at the spiritual level. This can further manifest as physical and psychological problems that are faced by the residents. Secondly, the manner of construction and the purpose/use of the building affects the subtle-vibrations in the premises. The manner of construction includes gross aspects such as the materials used, kind of architecture, etc. It also includes the subtle aspects provided in detail in the ancient science of Vastu Shastra and Feng Shui. For example, having the front door of the premises facing the south direction can negatively affect the premises because the southern direction is prone to distressing vibrations. The purpose and use of the premises also plays an important role in determining the type of subtle-vibrations that will be predominantly found within its area. Thirdly, the actions, thoughts, value systems and attitudes of the residents play an important part in determining whether the subtle-vibrations will be positive or negative. Residents with many personality defects emit negative vibrations. If some of the residents are affected with negative energies and are not doing any spiritual practice to overcome it, then it can have a harmful spiritual effect on the rest of the residents and the premises. If these three aspects are appropriately considered and attended to, then the premises will generate higher levels of spiritually positive vibrations. Both living and non-living objects within the premises imbibe this positivity and therefore, it holistically enhances the overall well-being of its residents. The positivity experienced in the premises of the Spiritual Research Centre of the Maharshi University of Spirituality, is a testimony to the success of this research. Due to regular and intense spiritual practice carried out by 10 Saints and over 500 seekers residing in its premises, the positivity in the environment can be felt by people when they enter its premises and even from a distance, and can easily be picked up by aura and energy scanners. Extraordinary and fascinating phenomena are observed and experienced in its premises as both living and non-living objects emit spiritually positive vibrations. This also protects the residents from negative vibrations. Examples of such phenomena and their positive impact are discussed in the paper.Keywords: negative energies, positive vibrations on the premises, resident’s spiritual practice, science of the premises
Procedia PDF Downloads 1492948 Investigation of Suicide by Poison as a Result of Domestic Violence
Authors: Nazih Ramadan, Ghada Hassabo
Abstract:
Background and Aims: Domestic violence and other forms of violence against women and other family members are known to be substantial and widespread, with women more likely than men to be abused mostly by their partner, which is known as gender-based violence. Domestic violence is a major precipitating factor for suicide in many communities especially in our Middle East area. The aim of the study is to show the real relation between suicidal attempts and domestic violence especially in female victims. We tried also through this study to know the most common age at which the abused person attempt suicide, the perpetrator, the educational level of the abused person, and the social level of them. Materials and Methods: In this study, we collect data from 150 victims of suicidal attempts who came to seek medical help at National Poisoning Center. They were asked to answer a preformed questionnaire after giving consent. Results: The study shows that women are at higher risk for suicidal behavior and that suicidal attempt is directly proportionate to low level of education and low social class situation. Conclusion: the study shows the strong relation between attempting suicide and exposure to domestic violence. At the end of this work, we recommend understanding the broad scope and tragic impact of domestic violence; further research is needed concerning domestic violence-related suicide.Keywords: Cairo, domestic violence, domestic violence-related suicide, violence against women
Procedia PDF Downloads 2852947 The Implementation of Animal Welfare for Garut Sheep Fighting Contest in West Java
Authors: Mustopa, Nadya R. Susilo, Rhizal D. Nuva
Abstract:
This study aims to determine the application of animal welfare in Garut sheep fighting contest at West Java. This study conducted by survey and discussion methods with 5 Garut sheep owners in the contest. The animal welfare is going to be proved by observing the condition of the cage, the cleanliness of it, the health of the sheep, feeding and water, also owner treatments for their sheep that will be served as a fighter. Observations made using stable conditions ACRES form with assessment scores ranged from 1 = very poor, 2 = poor, 3 = regular, 4 = good and 5 = very good, animal welfare conditions seen by conducting observations and interviews with garut sheep owners. The result shows that the Garut sheep fighting contest has fulfilled the criteria of animal welfare application. Application of animal welfare principle by the owner of Garut sheep terms of ACRES (Animal Concerns Research and Education Society) below standard, the average score obtained was 1.76 which is mean in a very bad ratings. Besides considering the animal welfare application, sheep owners also do special treatments for their Garut sheep with the purpose to produce fighters that are healthy and strong. So, if the sheep wins in Garut sheep fight contest, it will purchase a high-value prices.Keywords: animal welfare, contest, garut sheep, sheep fighting
Procedia PDF Downloads 2782946 Eco-Drive Predictive Analytics
Authors: Sharif Muddsair, Eisels Martin, Giesbrecht Eugenie
Abstract:
With development of society increase the demand for the movement of people also increases gradually. The various modes of the transport in different extent which expat impacts, which depends on mainly technical-operating conditions. The up-to-date telematics systems provide the transport industry a revolutionary. Appropriate use of these systems can help to substantially improve the efficiency. Vehicle monitoring and fleet tracking are among services used for improving efficiency and effectiveness of utility vehicle. There are many telematics systems which may contribute to eco-driving. Generally, they can be grouped according to their role in driving cycle. • Before driving - eco-route selection, • While driving – Advanced driver assistance, • After driving – remote analysis. Our point of interest is regulated in third point [after driving – remote analysis]. TS [Telematics-system] make it possible to record driving patterns in real time and analysis the data later on, So that driver- classification-specific hints [fast driver, slow driver, aggressive driver…)] are given to imitate eco-friendly driving style. Together with growing number of vehicle and development of information technology, telematics become an ‘active’ research subject in IT and the car industry. Telematics has gone a long way from providing navigation solution/assisting the driver to become an integral part of the vehicle. Today’s telematics ensure safety, comfort and become convenience of the driver.Keywords: internet of things, iot, connected vehicle, cv, ts, telematics services, ml, machine learning
Procedia PDF Downloads 3062945 Image Inpainting Model with Small-Sample Size Based on Generative Adversary Network and Genetic Algorithm
Authors: Jiawen Wang, Qijun Chen
Abstract:
The performance of most machine-learning methods for image inpainting depends on the quantity and quality of the training samples. However, it is very expensive or even impossible to obtain a great number of training samples in many scenarios. In this paper, an image inpainting model based on a generative adversary network (GAN) is constructed for the cases when the number of training samples is small. Firstly, a feature extraction network (F-net) is incorporated into the GAN network to utilize the available information of the inpainting image. The weighted sum of the extracted feature and the random noise acts as the input to the generative network (G-net). The proposed network can be trained well even when the sample size is very small. Secondly, in the phase of the completion for each damaged image, a genetic algorithm is designed to search an optimized noise input for G-net; based on this optimized input, the parameters of the G-net and F-net are further learned (Once the completion for a certain damaged image ends, the parameters restore to its original values obtained in the training phase) to generate an image patch that not only can fill the missing part of the damaged image smoothly but also has visual semantics.Keywords: image inpainting, generative adversary nets, genetic algorithm, small-sample size
Procedia PDF Downloads 130