Search results for: archaeological heritage resources
4903 Gamifying Content and Language Integrated Learning: A Study Exploring the Use of Game-Based Resources to Teach Primary Mathematics in a Second Language
Authors: Sarah Lister, Pauline Palmer
Abstract:
Research findings presented within this paper form part of a larger scale collaboration between academics at Manchester Metropolitan University and a technology company. The overarching aims of this project focus on developing a series of game-based resources to promote the teaching of aspects of mathematics through a second language (L2) in primary schools. This study explores the potential of game-based learning (GBL) as a dynamic way to engage and motivate learners, making learning fun and purposeful. The research examines the capacity of GBL resources to provide a meaningful and purposeful context for CLIL. GBL is a powerful learning environment and acts as an effective vehicle to promote the learning of mathematics through an L2. The fun element of GBL can minimise stress and anxiety associated with mathematics and L2 learning that can create barriers. GBL provides one of the few safe domains where it is acceptable for learners to fail. Games can provide a life-enhancing experience for learners, revolutionizing the routinized ways of learning through fusing learning and play. This study argues that playing games requires learners to think creatively to solve mathematical problems, using the L2 in order to progress, which can be associated with the development of higher-order thinking skills and independent learning. GBL requires learners to engage appropriate cognitive processes with increased speed of processing, sensitivity to environmental inputs, or flexibility in allocating cognitive and perceptual resources. At surface level, GBL resources provide opportunities for learners to learn to do things. Games that fuse subject content and appropriate learning objectives have the potential to make learning academic subjects more learner-centered, promote learner autonomy, easier, more enjoyable, more stimulating and engaging and therefore, more effective. Data includes observations of the children playing the games and follow up group interviews. Given that learning as a cognitive event cannot be directly observed or measured. A Cognitive Discourse Functions (CDF) construct was used to frame the research, to map the development of learners’ conceptual understanding in an L2 context and as a framework to observe the discursive interactions that occur learner to learner and between learner and teacher. Cognitively, the children were required to engage with mathematical content, concepts and language to make decisions quickly, to engage with the gameplay to reason, solve and overcome problems and learn through experimentation. The visual elements of the games supported the learning of new concepts. Children recognised the value of the games to consolidate their mathematical thinking and develop their understanding of new ideas. The games afforded them time to think and reflect. The teachers affirmed that the games provided meaningful opportunities for the learners to practise the language. The findings of this research support the view that using the game-based resources supported children’s grasp of mathematical ideas and their confidence and ability to use the L2. Engaging with the content and language through the games led to deeper learning.Keywords: CLIL, gaming, language, mathematics
Procedia PDF Downloads 1424902 Enterpreneurship as a Strategic Tool for Higher Productivity in Nigerian Universities System
Authors: Yahaya Salihu Emeje, Amuchie Austine Anthony
Abstract:
The topic examined the prospects of entrepreneurship as an emerging dynamic and strategic tool in the upliftment of human and non-human resources in the Nigerian university system, with a view of showcasing the abundant positive impact, on the Nigerian University system in particular and Nigerian economy at large. It is end at bringing out the benefits of entrepreneurship in the university system which includes, namely cultivating the culture of enterprise in University system; improvement in the quality and quantity of both human and non-human resources; innovative and creative methods of production; new employment strategies in the University system; improved sources of internal generated revenue; entrepreneurship as the culture of sustainability within and outside the university system. Secondary data was used in analyzing entrepreneurship as a productivity tool in the Nigeria University system. From the findings, the university system could be enriched through innovative ideas and technical revenue and employment generation; sustainable financial and economic base; university autonomy and improved international ranking of Nigerian Universities system; therefore, recommended that entrepreneurship is necessary therapy for reviving the ailing, Nigerian universities system.Keywords: entrepreneurship, strategic, productivity, universities
Procedia PDF Downloads 3944901 Racism In Indonesia: Case Study Racism Toward Papuan
Authors: Fikram Rettob
Abstract:
Racism is human rights violence that has been prohibited for long time ago. However, it is still happening in some part of the world, such as Indonesia. In this journal, the author is going to write about the racism toward Papuan which occurred in 2019 to 2021. The author found that the cause behind this human rights violence was the single assumption about race supremacy in Indonesia. Some people of Indonesia which are in Java that is near from central government believe that their race and the power are above other Indonesia’s race. In this research the author is using the concept of group or collectively oriented rights which explains that solidarity has rights to express their feeling, living in healthy environment, free to humanitarian assistance, communication and share in the common heritage of mankind. This research is applying qualitative methodology which based on secondary data that the author collected from news, journals, books, and articles, and then the author analyses and selects only the relevance one to put into the writing.Keywords: racism, Indonesia, Papuan, violence
Procedia PDF Downloads 234900 Investigating the Role of Clam Festival for Destination Branding: A Case Study of Tainan Cigu
Authors: Lim Lie Pin, Lin Hui Wen
Abstract:
Rural tourism has become popular in Taiwan, the villages based on agriculture including fishery have to follow the trend to develop the local economy and achieve the sustainable development of the rural areas. Through cultural festivals, the tourist could experience the benefit while promoting and stimulating the local development of rural tourism. Cigu is famous for salt history and abundant natural resources, such as lagoon, black-faced spoonbills and other fishery products. Digging clam has become the most special parent-child activities in Tainan and increasing awareness since it was initiated. Therefore, festival organizers and regional destination marketers need to identify visitors’ experiences attributes which lead to opportunities for industry professionals, community involvement to plan and organize regional festivals and their programmes for effective destination branding finding out more potential rural resources encouraging the local industry growth and sustainable development.Keywords: rural tourism, cultural festival, destination branding, tourist experience, sustainable development
Procedia PDF Downloads 3044899 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints
Authors: Amjad Khan
Abstract:
The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking
Procedia PDF Downloads 2844898 Modalmetric Fiber Sensor and Its Applications
Authors: M. Zyczkowski, P. Markowski, M. Karol
Abstract:
The team from IOE MUT is developing fiber optic sensors for the security systems for 15 years. The conclusions of the work indicate that these sensors are complicated. Moreover, these sensors are expensive to produce and require sophisticated signal processing methods.We present the results of the investigations of three different applications of the modalmetric sensor: • Protection of museum collections and heritage buildings, • Protection of fiber optic transmission lines, • Protection of objects of critical infrastructure. Each of the presented applications involves different requirements for the system. The results indicate that it is possible to developed a fiber optic sensor based on a single fiber. Modification of optoelectronic parts with a change of the length of the sensor and the method of reflections of propagating light at the end of the sensor allows to adjust the system to the specific application.Keywords: modalmetric fiber optic sensor, security sensor, optoelectronic parts, signal processing
Procedia PDF Downloads 6194897 Spiritual Health in View of Islamic Mysticism
Authors: Maryam Bakhtyar-Pegah Akrami
Abstract:
The relationship between spiritual health and spirituality is one of the important is that in recent years, the research about it is expanding and due to the rich heritage of the in this field of study and research in this important field more than before and we will come to spiritual life and healthier than before. In this research, we provide the following and the basics of Islamic Mysticism in the realm of spiritual health thoughts. This research is based on a descriptive method and comparison with analytical-method to data collected. The findings show that human beings due to this pivotal topic of full Islamic slab, and mental and physical education with the sought to reach the human place are complete, we can provide the basics along with new discussions of spiritual health help human beings to spiritual education along with our faiths in the reconstruction of the spiritual foundations of spiritual health are extremely helpfulKeywords: spirituality, health, Islam, mysticism, perfect human
Procedia PDF Downloads 1614896 Analysis of Trends and Challenges of Using Renewable Biomass for Bioplastics
Authors: Namasivayam Navaranjan, Eric Dimla
Abstract:
The world needs more quality food, shelter and transportation to meet the demands of growing population and improving living standard of those who currently live below the poverty line. Materials are essential commodities for various applications including food and pharmaceutical packaging, building and automobile. Petroleum based plastics are widely used materials amongst others for these applications and their demand is expected to increase. Use of plastics has environment related issues because considerable amount of plastic used worldwide is disposed in landfills, where its resources are wasted, the material takes up valuable space and blights communities. Some countries have been implementing regulations and/or legislations to increase reuse, recycle, renew and remanufacture materials as well as to minimise the use of non-environmentally friendly materials such as petroleum plastics. However, issue of material waste is still a concern in the countries who have low environmental regulations. Development of materials, mostly bioplastics from renewable biomass resources has become popular in the last decade. It is widely believed that the potential for up to 90% substitution of total plastics consumption by bioplastics is technically possible. The global demand for bioplastics is estimated to be approximately six times larger than in 2010. Recently, standard polymers like polyethylene (PE), polypropylene (PP), Polyvinyl Chloride (PVC) or Polyethylene terephthalate (PET), but also high-performance polymers such as polyamides or polyesters have been totally or partially substituted by their renewable equivalents. An example is Polylactide (PLA) being used as a substitute in films and injection moulded products made of petroleum plastics, e.g. PET. The starting raw materials for bio-based materials are usually sugars or starches that are mostly derived from food resources, partially also recycled materials from food or wood processing. The risk in lower food availability by increasing price of basic grains as a result of competition with biomass-based product sectors for feedstock also needs to be considered for the future bioplastic production. Manufacturing of bioplastic materials is often still reliant upon petroleum as an energy and materials source. Life Cycle Assessment (LCA) of bioplastic products has being conducted to determine the sustainability of a production route. However, the accuracy of LCA depends on several factors and needs improvement. Low oil price and high production cost may also limit the technically possible growth of these plastics in the coming years.Keywords: bioplastics, plastics, renewable resources, biomass
Procedia PDF Downloads 3084895 The Impact of Human Resources Management on the Job Security of Self-Initiated Expatriates after the Brexit
Authors: Yllka Hysaj, Ylberina Hysaj Arifi
Abstract:
Recently, with BREXIT taking place, organizations and employees have been affected in the way of job and employment security. Career-oriented human resources management (HRM) practices are likely to facilitate self-initiated expatriates’ adjustment to the host country. This was related to the career security (job security and employment security), which were missing in their home country and seemed to be important elements to adjust to the host country. The aim of this study is to assess whether the perception of career security by Frances self-initiated expatriates (SIEs) have changed in the wake of the referendum result. Quantitative research method will be used, and the data will be collected through electronic questionnaires. Data will be analyzed through Statistical Package for the Social Sciences (SPSS). The study variables will include an adjustment to the host country, HRM practices, employability, and job security. Predicted results consist that career-oriented HRM practices are positively related to the adjustment to the host country, employability, and job security. However, with Brexit, there might be a negative relationship between career-oriented HRM practices and job security.Keywords: migration, self-initiated expatriates, Brexit, job security
Procedia PDF Downloads 1704894 A Resource Optimization Strategy for CPU (Central Processing Unit) Intensive Applications
Authors: Junjie Peng, Jinbao Chen, Shuai Kong, Danxu Liu
Abstract:
On the basis of traditional resource allocation strategies, the usage of resources on physical servers in cloud data center is great uncertain. It will cause waste of resources if the assignment of tasks is not enough. On the contrary, it will cause overload if the assignment of tasks is too much. This is especially obvious when the applications are the same type because of its resource preferences. Considering CPU intensive application is one of the most common types of application in the cloud, we studied the optimization strategy for CPU intensive applications on the same server. We used resource preferences to analyze the case that multiple CPU intensive applications run simultaneously, and put forward a model which can predict the execution time for CPU intensive applications which run simultaneously. Based on the prediction model, we proposed the method to select the appropriate number of applications for a machine. Experiments show that the model can predict the execution time accurately for CPU intensive applications. To improve the execution efficiency of applications, we propose a scheduling model based on priority for CPU intensive applications. Extensive experiments verify the validity of the scheduling model.Keywords: cloud computing, CPU intensive applications, resource optimization, strategy
Procedia PDF Downloads 2784893 The Names of the Traditional Motif of Batik Solo
Authors: Annisa D. Febryandini
Abstract:
Batik is a unique cultural heritage that strongly linked with its community. As a product of current culture in Solo, Batik Solo not only has a specific design and color to represent the cultural identity, cultural values, and spirituality of the community, but also has some specific names given by its community which are not arbitrary. This qualitative research paper uses the primary data by interview method as well as the secondary data to support it. Based on the data, this paper concludes that the names consist of a word or words taken from a current name of things in Javanese language. They indicate the cultural meaning such as a specific event, a hope, and the social status of the people who use the motif. Different from the other research, this paper takes a look at the names of traditional motif of Batik Solo which analyzed linguistically to reveal the cultural meaning.Keywords: traditional motif, Batik, solo, anthropological linguistics
Procedia PDF Downloads 2774892 Exploring Open Innovation Practice in Start-Ups within an Innovation Ecosystem
Authors: Yassine Mehros, Jean-Michel Degeorge, Abdelaziz Elabjani
Abstract:
Innovation has long been considered the key to the survival, development, and growth of companies. It is a process in which start-ups play a key role, but they suffer from a structural lack of resources, which hinders the development of new innovations and their commercialization. The use of alternative channels to access resources is therefore becoming a necessity to overcome this constraint and identify opportunities. This is why they can be part of large communities of interdependent actors, namely innovation ecosystems that are part of a logic of sharing and open innovation. This research aims to explore and better understand OI in start-ups within an innovation ecosystem. We offer an exploratory qualitative study with start-ups and other actors in the Saint-Étienne innovation ecosystem. Our paper explored the characteristics and main actors of the Saint-Etienne innovation ecosystem, focusing on start-ups. We have identified the motivations of start-up’s adopting OI, its difficulties, its risks, and its impact on their growth. Also, our results show the existence of strong links between the different actors in the ecosystem. In addition, a strong trust has been established between these actors thanks to the geographical proximity; the start-ups manage to get in touch with the different actors of their innovation ecosystem by practicing OI. The actors collaborate on projects involving companies and, in particular, start-ups.Keywords: open innovation, start-ups, Innovation ecosystem, actors
Procedia PDF Downloads 784891 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches
Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar
Abstract:
Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework
Procedia PDF Downloads 1204890 A Proposal of Multi-modal Teaching Model for College English
Authors: Huang Yajing
Abstract:
Multimodal discourse refers to the phenomenon of using various senses such as hearing, vision, and touch to communicate through various means and symbolic resources such as language, images, sounds, and movements. With the development of modern technology and multimedia, language and technology have become inseparable, and foreign language teaching is becoming more and more modal. Teacher-student communication resorts to multiple senses and uses multiple symbol systems to construct and interpret meaning. The classroom is a semiotic space where multimodal discourses are intertwined. College English multi-modal teaching is to rationally utilize traditional teaching methods while mobilizing and coordinating various modern teaching methods to form a joint force to promote teaching and learning. Multimodal teaching makes full and reasonable use of various meaning resources and can maximize the advantages of multimedia and network environments. Based upon the above theories about multimodal discourse and multimedia technology, the present paper will propose a multi-modal teaching model for college English in China.Keywords: multimodal discourse, multimedia technology, English education, applied linguistics
Procedia PDF Downloads 684889 Testing Two Actors Contextual Interaction Theory in a Multi Actors Context: Case of COVID-19 Disease Prevention and Control Policy
Authors: Muhammad Fayyaz Nazir, Ellen Wayenberg, Shahzadaah Faahed Qureshi
Abstract:
Introduction: The study is based on the Contextual Interaction Theory (CIT) constructs to explore the role of policy actors in implementing the COVID-19 Disease Prevention and Control (DP&C) Policy. The study analyzes the role of healthcare workers' contextual factors, such as cognition, motives, and resources, and their interactions in implementing Social Distancing (SD). In this way, we test a two actors policy implementation theory, i.e., the CIT in a three-actor context. Methods: Data was collected through document analysis and semi-structured interviews. For a qualitative study design, interviews were conducted with questions on cognition, motives, and resources from the healthcare workers involved in implementing SD in the local context in Multan – Pakistan. The possible interactions resulting from contextual factors of the policy actors – healthcare workers were identified through framework analysis protocol guided by CIT and supported by trustworthiness criterion and data saturation. Results: This inquiry resulted in theory application, addition, and enrichment. The theoretical application in the three actor's contexts illustrates the different levels of motives, cognition, and resources of healthcare workers – senior administrators, managers, and healthcare professionals. The senior administrators working in National Command and Operations Center (NCOC), Provincial Technical Committees (PTCs), and Districts Covid Teams (DCTs) were playing their role with high motivation. They were fully informed about the policy and moderately resourceful. The policy implementors: healthcare managers working on implementing the SD within their respective hospitals were playing their role with high motivation and were fully informed about the policy. However, they lacked the required resources to implement SD. The target medical and allied healthcare professionals were moderately motivated but lack of resources and information. The interaction resulted in cooperation and the need for learning to manage the future healthcare crisis. However, the lack of resources created opposition to the implementation of SD. Objectives of the Study: The study aimed to apply a two actors theory in a multi actors context. We take this as an opportunity to qualitatively test the theory in a novel situation of the Covid-19 pandemic and make way for its quantitative application by designing a survey instrument so that implementation researchers can apply CIT through multivariate analyses or higher-order statistical modeling. Conclusion: Applying two actors' implementation theory in exploring a complex case of healthcare intervention in three actors context is a unique work that has never been done before, up to the best of our knowledge. So, the work will contribute to the policy implementation studies by applying, extending, and enriching an implementation theory in a novel case of the Covi-19 pandemic, ultimately fulfilling the gap in implementation literature. Policy institutions and other low or middle-income countries can learn from this research and improve SD implementation by working on the variables with weak significance levels.Keywords: COVID-19, disease prevention and control policy, implementation, policy actors, social distancing
Procedia PDF Downloads 584888 Walking in the Steps of Poets: Evoking Past Poets in Sufi Poetry
Authors: Bilal Orfali
Abstract:
It is common practice in modern times to read mystical poetry and apply it to our mundane lives and loves. Sufis in the early period did the opposite. Their mystical hymns often spun out of the courtly poetic ghazal, panegyric, and wine songs. This paper highlights the relation of the Arabic courtly poetic canon to early Sufism. Sufi akhbār and poetry evoke past poets and their poetic heritage. They tend to quote or refer to eminent poets whose poetry must have been widely circulated and memorized. However, Sufism places this readily recognizable poetry in a new context that deliberately changes the past. It is a process of a metaphorization in which the reality of the pre-Islamic, Umayyad, and Abbasid models now acts as a device or metaphor for the Sufi poetics.Keywords: Sufism, Arabic poetry, literature, Islamic literature, Abbasid
Procedia PDF Downloads 3134887 Lost Maritime Culture in the Netherlands: Linking Material and Immaterial Datasets for a Modern Day Perception of the Late Medieval Maritime Cultural Landscape of the Zuiderzee Region
Authors: Y. T. van Popta
Abstract:
This paper focuses on the never thoroughly examined yet in native relevant late medieval maritime cultural landscape of the former Zuiderzee (A.D. 1170-1932) in the center part of the Netherlands. Especially the northeastern part of the region, nowadays known as the Noordoostpolder, testifies of the dynamic battle of the Dutch against the water. This highly dynamic maritime region developed from a lake district into a sea and eventually into a polder. By linking physical and cognitive datasets from the Noordoostpol-der region in a spatial environment, new information on a late medieval maritime culture is brought to light, giving the opportunity to: (i) create a modern day perception on the late medieval maritime cultural landscape of the region and (ii) to underline the value of interdisciplinary and spatial research in maritime archaeology in general. Since the large scale reclamations of the region (A.D. 1932-1968), many remains have been discovered of a drowned and eroded late medieval maritime culture, represented by lost islands, drowned settlements, cultivated lands, shipwrecks and socio-economic networks. Recent archaeological research has proved the existence of this late medieval maritime culture by the discovery of the remains of the drowned settlement Fenehuysen (Veenhuizen) and its surroundings. The fact that this settlement and its cultivated surroundings remained hidden for so long proves that a large part of the maritime cultural landscape is ‘invisible’ and can only be found by extensive interdisciplinary research.Keywords: drowned settlements, late middle ages, lost islands, maritime cultural landscape, the Netherlands
Procedia PDF Downloads 2134886 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Abstract:
Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates
Procedia PDF Downloads 3054885 Utilization of Waste Crushed Tile as Coarse Aggregate in Concrete
Authors: Harkaranjit Singh, Arun Kumar
Abstract:
Depletion of natural resources is a common phenomenon in developing countries like India due to rapid urbanization and industrialization involving construction of infrastructure and other amenities. In view of this, people have started searching for suitable other viable alternative materials for concrete so that the existing natural resources could be preserved to the possible extent for the future generation. In this process, different industrial waste materials such as fly ash, blast furnace slag, quarry dust, tile waste, bricks, broken glass waste, waste aggregate from demolition of structures, ceramic insulator waste, etc. have been tried as a viable substitute material to the conventional materials in concrete and has also been succeeded. This paper describes the studies conducted on strength characteristics of concrete made with utilizing of crushed tiles as a coarse aggregate. The waste crushed tiles can be used as coarse aggregates with the replacement ratio of 0, 50, 75 and 100% were used. Mechanical and physical tests were conducted on specimens. It was found that, the concrete made of waste ceramic tile aggregate produced more strength in compression, and flexure.Keywords: compressive strength, flexural strength, waste crushed tile, concrete
Procedia PDF Downloads 4054884 Distributed Manufacturing (DM)- Smart Units and Collaborative Processes
Authors: Hermann Kuehnle
Abstract:
Developments in ICT totally reshape manufacturing as machines, objects and equipment on the shop floors will be smart and online. Interactions with virtualizations and models of a manufacturing unit will appear exactly as interactions with the unit itself. These virtualizations may be driven by providers with novel ICT services on demand that might jeopardize even well established business models. Context aware equipment, autonomous orders, scalable machine capacity or networkable manufacturing unit will be the terminology to get familiar with in manufacturing and manufacturing management. Such newly appearing smart abilities with impact on network behavior, collaboration procedures and human resource development will make distributed manufacturing a preferred model to produce. Computing miniaturization and smart devices revolutionize manufacturing set ups, as virtualizations and atomization of resources unwrap novel manufacturing principles. Processes and resources obey novel specific laws and have strategic impact on manufacturing and major operational implications. Mechanisms from distributed manufacturing engaging interacting smart manufacturing units and decentralized planning and decision procedures already demonstrate important effects from this shift of focus towards collaboration and interoperability.Keywords: autonomous unit, networkability, smart manufacturing unit, virtualization
Procedia PDF Downloads 5264883 Effectiveness of Blended Learning in Public School During Covid-19: A Way Forward
Authors: Sumaira Taj
Abstract:
Blended learning is emerged as a prerequisite approach for teaching in all schools after the outbreak of the COVID-19 pandemic. However, how much public elementary and secondary schools in Pakistan are ready for adapting this approach and what should be done to prepare schools and students for blended learning are the questions that this paper attempts to answer. Mixed-method research methodology was used to collect data from 40 teachers, 500 students, and 10 mothers. Descriptive statistics was used to analyze quantitative data. As for as readiness is concerned, schools lack resources for blended/ virtual/ online classes from infra-structure to skills, parents’ literacy level hindered students’ learning process and teachers’ skills presented challenges in a smooth and swift shift of the schools from face-to-face learning to blended learning. It is recommended to establish a conducive environment in schools by providing all required resources and skills. Special trainings should be organized for low literacy level parents. Multiple ways should be adopted to benefit all students.Keywords: blended learning, challenges in online classes, education in covid-19, public schools in pakistan
Procedia PDF Downloads 1664882 Social Data-Based Users Profiles' Enrichment
Authors: Amel Hannech, Mehdi Adda, Hamid Mcheick
Abstract:
In this paper, we propose a generic model of user profile integrating several elements that may positively impact the research process. We exploit the classical behavior of users and integrate a delimitation process of their research activities into several research sessions enriched with contextual and temporal information, which allows reflecting the current interests of these users in every period of time and infer data freshness. We argue that the annotation of resources gives more transparency on users' needs. It also strengthens social links among resources and users, and can so increase the scope of the user profile. Based on this idea, we integrate the social tagging practice in order to exploit the social users' behavior to enrich their profiles. These profiles are then integrated into a recommendation system in order to predict the interesting personalized items of users allowing to assist them in their researches and further enrich their profiles. In this recommendation, we provide users new research experiences.Keywords: user profiles, topical ontology, contextual information, folksonomies, tags' clusters, data freshness, association rules, data recommendation
Procedia PDF Downloads 2654881 Factors Affecting Students' Attitude to Adapt E-Learning: A Case from Iran How to Develop Virtual Universities in Iran: Using Technology Acceptance Model
Authors: Fatemeh Keivanifard
Abstract:
E-learning is becoming increasingly prominent in higher education, with universities increasing provision and more students signing up. This paper examines factors that predict students' attitudes to adapt e-learning at the Khuzestan province Iran. Understanding the nature of these factors may assist these universities in promoting the use of information and communication technology in teaching and learning. The main focus of the paper is on the university students, whose decision supports effective implementation of e-learning. Data was collected through a survey of 300 post graduate students at the University of dezful, shooshtar and chamran in Khuzestan. The technology adoption model put forward by Davis is utilized in this study. Two more independent variables are added to the original model, namely, the pressure to act and resources availability. The results show that there are five factors that can be used in modeling students' attitudes to adapt e-learning. These factors are intention toward e-learning, perceived usefulness of e-learning, perceived ease of e-learning use, pressure to use e-learning, and the availability of resources needed to use e-learning.Keywords: e-learning, intention, ease of use, pressure to use, usefulness
Procedia PDF Downloads 3684880 Environmental Threats and Great Barrier Reef: A Vulnerability Assessment of World’s Best Tropical Marine Ecosystems
Authors: Ravi Kant Anand, Nikkey Keshri
Abstract:
The Great Barrier Reef of Australia is known for its beautiful landscapes and seascapes with ecological importance. This site was selected as a World Heritage site in 1981 and popularized internationally for tourism, recreational activities and fishing. But the major environmental hazards such as climate change, pollution, overfishing and shipping are making worst the site of marine ecosystem. Climate change is directly hitting on Great Barrier Reef through increasing level of sea, acidification of ocean, increasing in temperature, uneven precipitation, changes in the El Nino and increasing level of cyclones and storms. Apart from that pollution is second biggest factor which vanishing the coral reef ecosystem. Pollution including over increasement of pesticides and chemicals, eutrophication, pollution through mining, sediment runoff, loss of coastal wetland and oil spills. Coral bleaching is the biggest problem because of the environmental threatening agents. Acidification of ocean water reduced the formation of calcium carbonate skeleton. The floral ecosystem (including sea grasses and mangroves) of ocean water is the key source of food for fishes and other faunal organisms but the powerful waves, extreme temperature, destructive storms and river run- off causing the threat for them. If one natural system is under threat, it means the whole marine food web is affected from algae to whale. Poisoning of marine water through different polluting agents have been affecting the production of corals, breeding of fishes, weakening of marine health and increased in death of fishes and corals. In lieu of World Heritage site, tourism sector is directly affected and causing increasement in unemployment. Fishing sector also affected. Fluctuation in the temperature of ocean water affects the production of corals because it needs desolate place, proper sunlight and temperature up to 21 degree centigrade. But storms, El Nino, rise in temperature and sea level are induced for continuous reduction of the coral production. If we do not restrict the environmental problems of Great Barrier Reef than the best known ecological beauty with coral reefs, pelagic environments, algal meadows, coasts and estuaries, mangroves forests and sea grasses, fish species, coral gardens and the one of the best tourist spots will lost in upcoming years. My research will focus on the different environmental threats, its socio-economic impacts and different conservative measures.Keywords: climate change, overfishing, acidification, eutrophication
Procedia PDF Downloads 3744879 Smart Grids in Morocco: An Outline of the Recent Development, Key Drivers and Recommendations for Future Implementation
Authors: Mohamed Laamim, Aboubakr Benazzouz, Abdelilah Rochd, Abdellatif Ghennioui, Abderrahim El Fadili
Abstract:
Smart grids have recently sparked a lot of interest in the energy sector as they allow for the modernization and digitization of the existing power infrastructure. Smart grids have several advantages in terms of reducing the environmental impact of generating power from fossil fuels due to their capacity to integrate large amounts of distributed energy resources. On the other hand, smart grid technologies necessitate many field investigations and requirements. This paper focuses on the major difficulties that governments face around the world and compares them to the situation in Morocco. Also presented in this study are the current works and projects being developed to improve the penetration of smart grid technologies into the electrical system. Furthermore, the findings of this study will be useful to promote the smart grid revolution in Morocco, as well as to construct a strong foundation and develop future needs for better penetration of technologies that aid in the integration of smart grid features.Keywords: smart grids, microgrids, virtual power plants, digital twin, distributed energy resources, vehicle-to-grid, advanced metering infrastructure
Procedia PDF Downloads 1544878 The Nexus of Decentralized Policy, social Heterogeneity and Poverty in Equitable Forest Benefit Sharing in the Lowland Community Forestry Program of Nepal
Authors: Dhiraj Neupane
Abstract:
Decentralized policy and practices have largely concentrated on the transformation of decision-making authorities from central to local institutions (or people) in the developing world. Such policy and practices always aimed for the equitable and efficient management of resources in the line of poverty reduction. The transformation of forest decision-making autonomy has also glorified as the best forest management alternatives to maximize the forest benefits and improve the livelihood of local people living nearby the forests. However, social heterogeneity and poor decision-making capacity of local institutions (or people) pose a nexus while managing the resources and sharing the forest benefits among the user households despite the policy objectives. The situation is severe in the lowland of Nepal, where forest resources have higher economic potential and user households have heterogeneous socio-economic conditions. The study discovered that utilizing the power of decision-making autonomy, user households were putting low values of timber considering the equitable access of timber to all user households as it is the most valuable product of community forest. Being the society is heterogeneous by socio-economic conditions, households of better economic conditions were always taking higher amount of forest benefits. The low valuation of timber has negative consequences on equitable benefit sharing and poor support to livelihood improvement of user households. Moreover, low valuation has possibility to increase the local demands of timber and increase the human pressure on forests.Keywords: decentralized forest policy, Nepal, poverty, social heterogeneity, Terai
Procedia PDF Downloads 2874877 Cloud Computing Impact on e-Government Adoption
Authors: Ali Elshabrawy
Abstract:
Cloud computing is expected to be important for e Government in near future. Governments need it for solving some of its e Government, financial, infrastructure, legacy systems and integration problems. It reduces information technology (IT) infrastructure needs and support costs, and offers on-demand infrastructure and computational power, improved collaboration capabilities, which are important for e Government projects start up and sustainability. Budget pressures will continue to drive more and more government IT to hybrid and even public clouds, and more cooperation between cloud service providers and governmental agencies are expected, Or developing governmental private, community clouds. Motivation to convince governments to use cloud computing services, will create a pressure on cloud service providers to cope with government's requirements for interoperability, security standards, open data and integration between their cloud systems There will be significant legal action arising out of governmental uses of cloud computing, and legislation addressing both IT and business needs and consumer fears and protections. Cloud computing is a considered a revolution for IT and E business in general and e commerce, e Government in particular. As governments faces increasing challenges regarding IT infrastructure required for e Government projects implementation. As a result of Lack of required financial resources allocated for e Government projects in developed and developing countries. Cloud computing can play a major role to solve some of e Government projects challenges such as, lack of financial resources, IT infrastructure, Human resources trained to manage e Government applications, interoperability, cost efficiency challenges. If we could solve some security issues related to cloud computing usage which considered critical for e Government projects. Pretty sure it’s Just a matter of time before cloud service providers will find out solutions to attract governments as major customers for their business.Keywords: cloud computing, e-government, adoption, supply side barriers, e-government requirements, challenges
Procedia PDF Downloads 3464876 Performance Comparison of Droop Control Methods for Parallel Inverters in Microgrid
Authors: Ahmed Ismail, Mustafa Baysal
Abstract:
Although the energy source in the world is mainly based on fossil fuels today, there is a need for alternative energy generation systems, which are more economic and environmentally friendly, due to continuously increasing demand of electric energy and lacking power resources and networks. Distributed Energy Resources (DERs) such as fuel cells, wind and solar power have recently become widespread as alternative generation. In order to solve several problems that might be encountered when integrating DERs to power system, the microgrid concept has been proposed. A microgrid can operate both grid connected and island mode to benefit both utility and customers. For most distributed energy resources (DER) which are connected in parallel in LV-grid like micro-turbines, wind plants, fuel cells and PV cells electrical power is generated as a direct current (DC) and converted to an alternative currents (AC) by inverters. So the inverters are assumed to be primary components in a microgrid. There are many control techniques of parallel inverters to manage active and reactive sharing of the loads. Some of them are based on droop method. In literature, the studies are usually focused on improving the transient performance of inverters. In this study, the performance of two different controllers based on droop control method is compared for the inverters operated in parallel without any communication feedback. For this aim, a microgrid in which inverters are controlled by conventional droop controller and modified droop controller is designed. Modified controller is obtained by adding PID into conventional droop control. Active and reactive power sharing performance, voltage and frequency responses of those control methods are measured in several operational cases. Study cases have been simulated by MATLAB-SIMULINK.Keywords: active and reactive power sharing, distributed generation, droop control, microgrid
Procedia PDF Downloads 5924875 Emotional Labour and Employee Performance Appraisal: The Missing Link in Some Hotels in South East Nigeria
Authors: Polycarp Igbojekwe
Abstract:
The main objective of this study was to determine if emotional labour has become a criterion in performance appraisal, job description, selection, and training schemes in the hotel industry in Nigeria. Our main assumption was that majority of hotel organizations have not built emotional labour into their human resources management schemes. Data were gathered by the use of structured questionnaires designed in Likert format, and interviews. The focus group was managers of the selected hotels. Analyses revealed that majority of the hotels have not built emotional labour into their human resources schemes particularly in the 1, 2, and 3-star hotels. It was observed that service employees of 1, 2, and 3-star hotels have not been adequately trained to perform emotional labour; a critical factor in quality service delivery. Managers of 1, 2, and 3-star hotels have not given serious thought to emotional labour as a critical factor in quality service delivery. The study revealed that suitability of an individual’s characteristics is not being considered as a criterion for selection and performance appraisal for service employees. The implication of this is that, person-job-fit is not seriously considered. It was observed that there has been a disconnect between required emotional competency, its recognition, evaluation, and training. Based on the findings of this study, it is concluded that selection, training, job description and performance appraisal instruments in use in hotels in Nigeria are inadequate. Human resource implications of the findings in this study are presented. It is recommended that hotel organizations should re-design and plan the emotional content and context of their human resources practices to reflect the emotional demands of front line jobs in the hotel industry and the crucial role emotional labour plays during service encounters.Keywords: emotional labour, employee selection, job description, performance appraisal, person-job-fit, employee compensation
Procedia PDF Downloads 1914874 Evaluation of the Efficiency of Nanomaterials in the Consolidation of Limestone
Authors: Mohamed Saad Gad Elzoghby
Abstract:
Nanomaterials are widely used nowadays for the consolidation of degraded archaeological limestone. It’s one of the most predominant stones in monumental buildings and statuary works. It is exposed to different weathering processes that cause degradation and the presence of deterioration pattern as cracks, fissures, and granular disintegration. Nanomaterials have been applied to limestone consolidation. Among these nanomaterials are nanolimes, i.e., dispersions of lime nanoparticles in alcohols, and nano-silica, i.e., dispersions of silica nanoparticles in water, promising consolidating products for limestone. It was investigated and applied to overcome the disadvantages of traditional consolidation materials such as lime water, water glass, and paraliod. So, researchers investigated and tested the effectiveness of nanomaterials as consolidation materials for limestone. The present study includes an evaluation of some nanomaterials in consolidation limestone stone in comparison with traditional consolidants. These consolidation materials are nano calcium hydroxide nanolime, and nanosilica. The latter is known commercially as Nano Estel and the former Known as Nanorestore compared to traditional consolidants Wacker OH (ethyl silicate) and Paraloid B72 (a copolymer of ethyl methacrylate and methyl acrylate). The study evaluated the consolidation effectiveness of nanomaterials and traditional consolidants by using followed methods, characterization of physical properties of stone, scanning electron microscopy (SEM), X-ray diffractometry, Fourier transforms infrared spectroscopy, and mechanical properties. The study confirmed that nanomaterials were better in the distribution and encapsulation of calcite grains in limestone, and traditional materials were better in improving the physical properties of limestone. It demonstrated that good results could be achieved through mixtures of nanomaterials and traditional consolidants.Keywords: nanomaterials, limestone, consolidation, evaluation, weathering, nanolime, nanosilica, scanning electron microscope
Procedia PDF Downloads 81