Search results for: countermeasures and difficulties
1397 A Quantitative Study Identifying the Prevalence of Anxiety in Dyslexic Students in Higher Education
Authors: Amanda Abbott-Jones
Abstract:
Adult students with dyslexia in higher education can receive support for their cognitive needs but may also experience negative emotion such as anxiety due to their dyslexia in connection with their studies. This paper aims to test the hypothesis that adult dyslexic learners have a higher prevalence of academic and social anxiety than their non-dyslexic peers. A quantitative approach was used to measure differences in academic and social anxiety between 102 students with a formal diagnosis of dyslexia compared to 72 students with no history of learning difficulties. Academic and social anxiety was measured in a questionnaire based on the State-Trait Anxiety Inventory. Findings showed that dyslexic students showed statistically significant higher levels of academic, but not social anxiety in comparison to the non-dyslexic sample. Dyslexic students in higher education show academic anxiety levels that are well above what is shown by students without dyslexia. The implications of this for the dyslexia practitioner is that delivery of strategies to deal with anxiety should be seen equally as important, if not more so, than interventions to deal with cognitive difficulties.Keywords: Academic, Anxiety, Dyslexia, Quantitative
Procedia PDF Downloads 1351396 Examining Cyber Crime and Its Impacts on E-Banking in Nigeria
Authors: Auwal Nata'ala
Abstract:
The Information and Communication Technology (ICT) has had impacts in almost every area human endeavor. From business, industries, banks to none profit organizations. ICT has simplified business process such as sorting, summarizing, coding, updating and generating a report in a real-time processing mode. However, the use of these ICT facilities such as computer and internet has also brought unintended consequences of criminal activities such as spamming, credit card frauds, ATM frauds, phishing, identity theft, denial of services and other related cyber crimes. This study sought to examined cyber-crime and its impact on the banking institution in Nigeria. It also examined the existing policy framework and assessed the success of the institutional countermeasures in combating cyber crime in the banking industry. This paper X-ray’s cyber crimes, policies issues and provides insight from a Nigeria perspective.Keywords: cyber crimes, e-banking, policies, ICT
Procedia PDF Downloads 4071395 Discrete Estimation of Spectral Density for Alpha Stable Signals Observed with an Additive Error
Authors: R. Sabre, W. Horrigue, J. C. Simon
Abstract:
This paper is interested in two difficulties encountered in practice when observing a continuous time process. The first is that we cannot observe a process over a time interval; we only take discrete observations. The second is the process frequently observed with a constant additive error. It is important to give an estimator of the spectral density of such a process taking into account the additive observation error and the choice of the discrete observation times. In this work, we propose an estimator based on the spectral smoothing of the periodogram by the polynomial Jackson kernel reducing the additive error. In order to solve the aliasing phenomenon, this estimator is constructed from observations taken at well-chosen times so as to reduce the estimator to the field where the spectral density is not zero. We show that the proposed estimator is asymptotically unbiased and consistent. Thus we obtain an estimate solving the two difficulties concerning the choice of the instants of observations of a continuous time process and the observations affected by a constant error.Keywords: spectral density, stable processes, aliasing, periodogram
Procedia PDF Downloads 1381394 Barred from Each Other: Why Normative Husbands Remain Married to Incarcerated Wives
Authors: Tomer Einat, Sharon Rabinovitz, Inbal Harel-Aviram
Abstract:
This study explores men’s motivation and justification to remain married to their criminal, imprisoned wives. Using semi-structured interviews and content-analysis, data were collected and analyzed from eight men who maintain stable marriage relationships with their incarcerated wives. Participants are normative men who describe incarceration as a challenge that enhances mutual responsibility and commitment. They exaggerate the extent to which their partners resemble archetypal romantic ideals. They use motivational accounts to explain the woman’s criminal conduct, which is perceived as non-relevant to her real identity. Physical separation and lack of physical intimacy are perceived as the major difficulties in maintaining their marriage relations. Length of imprisonment and marriage was found to be related to the decision whether to continue or terminate the relationships. Women-inmates’ partners experience difficulties and use coping strategies very similar to those cited by other normative spouses facing lengthy separation.Keywords: female inmates, marriage, normative spouses, romantic accounts
Procedia PDF Downloads 4611393 The Knowledge and Beliefs Concerning Attention Deficit Hyperactivity Disorder Held by Parents of Children With Attention Deficit Hyperactivity Disorder in Saudi Arabia
Authors: Mohaned G. Abed
Abstract:
Attention Deficit Hyperactivity Disorder (ADHD) is considered one of the most frequently diagnosed psychiatric childhood disorders. It has an effect on 3–5% of school-aged children, and brings about difficulties in academic and social interaction. This study explored the knowledge and beliefs of parents in Saudi Arabia about children with ADHD. The Knowledge about Attention Deficit Disorder Questionnaire (KADD-Q) was administered to a sample of parents, followed by interviews with a subset of the total respondents. The results indicated that the parents knew more about the characteristics of ADHD than they knew about its related causes and treatment. Overall, the findings indicated that these parents had some knowledge about general characteristics of ADHD, but they had little understanding of causes and possible interventions. These results suggest an important need for more formal parents training regarding all aspects of ADHD in school age children.Keywords: attention deficit hyperactivity disorder, childhood disorders, school-aged children, difficulties in academic, social interaction
Procedia PDF Downloads 1131392 SeCloudBPMN: A Lightweight Extension for BPMN Considering Security Threats in the Cloud
Authors: Somayeh Sobati Moghadam
Abstract:
Business processes are crucial for organizations and help businesses to evaluate and optimize their performance and processes against current and future-state business goals. Outsourcing business processes to the cloud becomes popular due to a wide varsity of benefits and cost-saving. However, cloud outsourcing raises enterprise data security concerns, which must be incorporated in Business Process Model and Notation (BPMN). This paper, presents SeCloudBPMN, a lightweight extension for BPMN which extends the BPMN to explicitly support the security threats in the cloud as an outsourcing environment. SeCloudBPMN helps business’s security experts to outsource business processes to the cloud considering different threats from inside and outside the cloud. In this way, appropriate security countermeasures could be considered to preserve data security in business processes outsourcing to the cloud.Keywords: BPMN, security threats, cloud computing, business processes outsourcing, privacy
Procedia PDF Downloads 2691391 Usability Testing with Children: BatiKids Case Study
Authors: Hestiasari Rante, Leonardo De Araújo, Heidi Schelhowe
Abstract:
Usability testing with children is similar in many aspects to usability testing with adults. However, there are a few differences that one needs to be aware of in order to get the most out of the sessions, and to ensure that children are comfortable and enjoying the process. This paper presents the need to acquire methodological knowledge for involving children as test users in usability testing, with consideration on Piaget’s theory of cognitive growth. As a case study, we use BatiKids, an application developed to evoke children’s enthusiasm to be involved in culture heritage preservation. The usability test was applied to 24 children from 9 to 10 years old. The children were divided into two groups; one interacted with the application through a graphic tablet with pen, and the other through touch screen. Both of the groups had to accomplish the same amount of tasks. In the end, children were asked to give feedback. The results suggested that children who interacted using the graphic tablet with pen had more difficulties rather than children who interacted through touch screen. However, the difficulty brought by the graphic tablet with pen is an important learning objective in order to understand the difficulties of using canting, which is an important part of batik.Keywords: batikids, children, child-computer interaction, usability test
Procedia PDF Downloads 2961390 Difficulties in Teaching and Learning English Pronunciation in Sindh Province, Pakistan
Authors: Majno Ajbani
Abstract:
Difficulties in teaching and learning English pronunciation in Sindh province, Pakistan Abstract Sindhi language is widely spoken in Sindh province, and it is one of the difficult languages of the world. Sindhi language has fifty-two alphabets which have caused a serious issue in learning and teaching of English pronunciation for teachers and students of Colleges and Universities. This study focuses on teachers’ and students’ need for extensive training in the pronunciation that articulates the real pronunciation of actual words. The study is set to contribute in the sociolinguistic studies of English learning communities in this region. Data from 200 English teachers and students was collected by already tested structured questionnaire. The data was analysed using SPSS 20 software. The data analysis clearly demonstrates the higher range of inappropriate pronunciations towards English learning and teaching. The anthropogenic responses indicate 87 percentages teachers and students had an improper pronunciation. This indicates the substantial negative effects on academic and sociolinguistic aspects. It is suggested an improper speaking of English, based on rapid changes in geopolitical and sociocultural surroundings.Keywords: alphabets, pronunciation, sociolinguistic, anthropogenic, imprudent, malapropos
Procedia PDF Downloads 3961389 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks
Authors: Faisal Al Yahmadi, Muhammad R. Ahmed
Abstract:
Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.Keywords: smart grid network, security, threats, vulnerabilities
Procedia PDF Downloads 1391388 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures
Authors: L. Sellami, D. Idoughi, P. F. Tiako
Abstract:
Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.Keywords: cloud computing, intrusion detection system, privacy, trust
Procedia PDF Downloads 3231387 Hypotonia - A Concerning Issue in Neonatal Care
Authors: Eda Jazexhiu-Postoli, Gladiola Hoxha, Ada Simeoni, Sonila Biba
Abstract:
Background Neonatal hypotonia represents a commonly encountered issue in the Neonatal Intensive Care Unit and newborn nursery. The differential diagnosis is broad, encompassing chromosome abnormalities, primary muscular dystrophies, neuropathies and inborn errors of metabolism. Aim of study Our study describes some of the main clinical features of hypotonia in newborns and presents clinical cases of neonatal hypotonia we treated in our Neonatal unit in the last 3 years. Case reports Four neonates born in our hospital presented with hypotonia after birth, one preterm newborn 35-36 weeks of gestational age and three other term newborns (38-39 weeks of gestational age). Prenatal data revealed a decrease in fetal movements in both cases. Intrapartum meconium-stained amniotic fluid was found in 75% of our hypotonic newborns. Clinical features included inability to establish effective respiratory movements and need for resuscitation in the delivery room, respiratory distress syndrome, feeding difficulties and need for oro-gastric tube feeding, dysmorphic features, hoarse voice and moderate to severe muscular hypotonia. The genetic workup revealed the diagnosis of Autosomal Recessive Congenital Myasthenic Syndrome 1-B, Sotos Syndrome, Spinal Muscular Atrophy Type 1 and Transient Hypotonia of the Newborn. Two out of four hypotonic neonates were transferred to the Pediatric Intensive Care Unit and died at the age of three to five months old. Conclusion Hypotonia is a concerning finding in neonatal care and it is suggested by decreased intrauterine fetal movements, failure to establish first breaths, respiratory distress and feeding difficulties in the neonate. Prognosis is determined by its etiology and time of diagnosis and intervention.Keywords: hypotonic neonate, respiratory distress, feeding difficulties, fetal movements
Procedia PDF Downloads 1151386 Modeling of Traffic Turning Movement
Authors: Michael Tilahun Mulugeta
Abstract:
Pedestrians are the most vulnerable road users as they are more exposed to the risk of collusion. Pedestrian safety at road intersections still remains the most vital and yet unsolved issue in Addis Ababa, Ethiopia. One of the critical points in pedestrian safety is the occurrence of conflict between turning vehicle and pedestrians at un-signalized intersection. However, a better understanding of the factors that affect the likelihood of the conflicts would help provide direction for countermeasures aimed at reducing the number of crashes. This paper has sorted to explore a model to describe the relation between traffic conflicts and influencing factors using Multiple Linear regression methodology. In this research the main focus is to study the interaction of turning (left & right) vehicle with pedestrian at unsignalized intersections. The specific objectives also to determine factors that affect the number of potential conflicts and develop a model of potential conflict.Keywords: potential, regression analysis, pedestrian, conflicts
Procedia PDF Downloads 661385 Study on Empowering Youth and Adults to Overcome Mental Health Hardships Using a Web Application
Authors: Jennis Delina Giles, Nimesha Liyanage, Damindi Senadheera, Dilan Randima, Kushnara Suriyawansa
Abstract:
Mental health is essential during childhood, adolescence, and adulthood. Mental health issues can influence one's thoughts, disposition, and conduct. A record number of mental health problems are caused by a global pandemic. Prevention of mental disease is vital for both children and adults. We desired to develop a web application for those with mental health difficulties. This web application will provide group chat, discussion, a community feed, and counseling services. The community feed function provides information regarding scheduled conversation space meetings, and the counselor uploads uplifting thoughts and tales of patients who received proper care and overcame mental health issues. Community feed can filter content based on user preferences. The mental health system for adults and adolescents will be updated. The community feed delivers relevant and instructive postings, links, and images so that service recipients can benefit from other platform features and receive encouraging words to assist them in overcoming mental health difficulties.Keywords: bio medical, mental helath care, empower youths & adults, counselling
Procedia PDF Downloads 1551384 Axiomatic Systems as an Alternative to Teach Physics
Authors: Liliana M. Marinelli, Cristina T. Varanese
Abstract:
In the last few years, students from higher education have difficulties in grasping mathematical concepts which support physical matters, especially those in the first years of this education. Classical Physics teaching turns to be complex when students are not able to make use of mathematical tools which lead to the conceptual structure of Physics. When derivation and integration rules are not used or developed in parallel with other disciplines, the physical meaning that we attempt to convey turns to be complicated. Due to this fact, it could be of great use to see the Classical Mechanics from an axiomatic approach, where the correspondence rules give physical meaning, if we expect students to understand concepts clearly and accurately. Using the Minkowski point of view adapted to a two-dimensional space and time where vectors, matrices, and straight lines (worked from an affine space) give mathematical and physical rigorosity even when it is more abstract. An interesting option would be to develop the disciplinary contents from an axiomatic version which embraces the Classical Mechanics as a particular case of Relativistic Mechanics. The observation about the increase in the difficulties stated by students in the first years of education allows this idea to grow as a possible option to improve performance and understanding of the concepts of this subject.Keywords: axioms, classical physics, physical concepts, relativity
Procedia PDF Downloads 3061383 Understanding Evolutionary Algorithms through Interactive Graphical Applications
Authors: Javier Barrachina, Piedad Garrido, Manuel Fogue, Julio A. Sanguesa, Francisco J. Martinez
Abstract:
It is very common to observe, especially in Computer Science studies that students have difficulties to correctly understand how some mechanisms based on Artificial Intelligence work. In addition, the scope and limitations of most of these mechanisms are usually presented by professors only in a theoretical way, which does not help students to understand them adequately. In this work, we focus on the problems found when teaching Evolutionary Algorithms (EAs), which imitate the principles of natural evolution, as a method to solve parameter optimization problems. Although this kind of algorithms can be very powerful to solve relatively complex problems, students often have difficulties to understand how they work, and how to apply them to solve problems in real cases. In this paper, we present two interactive graphical applications which have been specially designed with the aim of making Evolutionary Algorithms easy to be understood by students. Specifically, we present: (i) TSPS, an application able to solve the ”Traveling Salesman Problem”, and (ii) FotEvol, an application able to reconstruct a given image by using Evolution Strategies. The main objective is that students learn how these techniques can be implemented, and the great possibilities they offer.Keywords: education, evolutionary algorithms, evolution strategies, interactive learning applications
Procedia PDF Downloads 3381382 Difficulties Posed by Disability on the Acquisition of Higher Education in Inclusive Setting by Physically Challenged Students
Authors: G. Fatima, R. Bashir, M. Saeed Akhtar, M. Malik, M. Safder, D. Nayab
Abstract:
The main purpose of this quantitative study was to investigate challenges and difficulties being encountered by physically challenged students in inclusive settings at higher education level. A self-developed and validated questionnaire (Cronbach alpha: 0.879) was employed for data collected from a sample of fifty six (56) graduate and continuing students with physical disabilities (males:46, females:10) selected through snow ball sampling technique from colleges and universities of Pakistan. The participants were required to respond on three point criteria (no, to some extent, yes). Data were analyzed by using SPSS. Independent sample t-test and One Way Analysis of Variance (ANOVA) was run to compare mean scores of responses of physically challenged students on the basis of their gender, education, types of physical disability, types of institutions, provinces, and status. Frequencies were run to have an overall picture of challenges faced by physically challenged students. Major findings reflected that physically challenged students were encountering problems in transportation, accessibility, and financial support, etc. Conclusions were drawn and recommendations were made.Keywords: physically challenged students, inclusive setting, higher education, accessibility
Procedia PDF Downloads 4061381 Moral Dilemmas, Difficulties in the Digital Games
Authors: YuPei Chang
Abstract:
In recent years, moral judgement tasks have served as an increasingly popular plot mechanism in digital gameplay. As a moral agency, the player's choice judgment in digital games is to shuttle between the real world and the game world. The purpose of the research is to explore the moral difficulties brewed by the interactive mechanism of the game and the moral choice of players. In the theoretical level, this research tries to combine moral disengagement, moral foundations theory, and gameplay as an aesthetic experience. And in the methodical level, this research tries to use methods that combine text analysis, diary method, and in-depth interviews. There are three research problems that will be solved in three stages. In the first stage, this project will explore how moral dilemmas are represented in game mechanics. In the second stage, this project will analyze the appearance and conflicts of moral dilemmas in game mechanics based on the five aspects of moral foundations theory. In the third stage, this project will try to understand the players' choices when they face the choices of moral dilemmas, as well as their explanations and reflections after making the decisions.Keywords: morality, moral disengagement, moral foundations theory, PC game, gameplay, moral dilemmas, player
Procedia PDF Downloads 791380 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)
Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat
Abstract:
National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.Keywords: NTS, risk assessment, threat factors, security, services
Procedia PDF Downloads 701379 Environmental Teachers’ Perceptions about Science-Technology-Society (STS) Education
Authors: Christiana Fwenji Zumyil, Toma Maina Antip
Abstract:
Environmental Science subject is currently not an independent subject taught in secondary schools in Nigeria like Biology, Agricultural Science, Chemistry, Geography and other subjects that students take final exams (West Africa Examination Council, WAEC, National Examination Council, NEC, National Board for Technical Education, NABTED)., on it but its elements/topics/contents are integrated into the curriculum of the subjects mentioned, and because of that, it becomes difficult to know what should be taught and how it should be taught. Currently, it is still difficult to implement student-centered strategies in the classroom. Through this study, we sought to diagnose the difficulties, advantages and perceptions that Environmental Teachers experience when conceiving and implementing Science-Technology-Society (STS) strategies in SS2 classes at the Secondary Education level. Four semi-structured interviews were conducted with Secondary School Environmental Teachers. Despite the difficulties found, the advantages, the motivation and the involvement of the students that this teaching perspective enables to lead the teacher to continue developing and implementing STS strategies in the classroom.Keywords: environment, science, technology, society, science-technology-society, science education, secondary teaching
Procedia PDF Downloads 1021378 Innovative Small and Medium Sized Firms: Intangible Investment and Financial Constraints - a Literature Review.
Authors: Eliane Abdo
Abstract:
Small and medium sized firms “SMEs” play essential role in the countries’ economic development mainly in terms of production, employment and equitable distribution of income. For innovative SMEs, the investment in the human capital and in research and development are crucial to survive in a competitive environment. In this paper we perform a literature review to underline the financing difficulties and constraints which innovative SMEs face while investing in intangible assets: not only when defining amount of the investments but also while choosing its financing methods. Literature review revealed that in order to finance their intangible assets, SMEs rely in first on their internal financing: the availability of internal cash flows can then determine their investment’s decision. Moreover SMEs face difficulties to finance their intangibles by financial debts due to the uncertainty of future cash flow and the absence of physical guarantees; they will therefore go for the issuance of new shares as a second choice, since innovative companies have high opportunity of growth that attract new shareholders.Keywords: small and medium sized firms, capital structure, intangible investment, financial constraints
Procedia PDF Downloads 1231377 Scouring Rate Pattern/Monitoring at Coastal and Offshore Structures
Authors: Ahmad Saifullah Mazlan, Hossein Basser, Shatirah Akib
Abstract:
Scouring pattern evaluation and measuring its depth around coastal and offshore structures is very essential issue to assure the safety of the structures as well as providing needed design parameters. Scouring is known as one of the important phenomena which threatens the safety of infrastructures. Several countermeasures have been developed to control scouring by protecting the structures against water flow attack directly or indirectly by changing the water flow pattern. Recently, monitoring methods for estimating water flow pattern and scour depth are studied to track the safety of structures. Since most of studies regarding scouring is related to monitoring scouring around piers in rivers therefore it is necessary to develop researches investigating scouring around piers in coastal and offshore areas. This paper describes a review of monitoring methods may be used for detecting scour depth around piers in coastal and offshore structures.Keywords: scour, monitoring, pier, coastal, offshore
Procedia PDF Downloads 6441376 Comprehensive Evaluation of Thermal Environment and Its Countermeasures: A Case Study of Beijing
Authors: Yike Lamu, Jieyu Tang, Jialin Wu, Jianyun Huang
Abstract:
With the development of economy and science and technology, the urban heat island effect becomes more and more serious. Taking Beijing city as an example, this paper divides the value of each influence index of heat island intensity and establishes a mathematical model – neural network system based on the fuzzy comprehensive evaluation index of heat island effect. After data preprocessing, the algorithm of weight of each factor affecting heat island effect is generated, and the data of sex indexes affecting heat island intensity of Shenyang City and Shanghai City, Beijing, and Hangzhou City are input, and the result is automatically output by the neural network system. It is of practical significance to show the intensity of heat island effect by visual method, which is simple, intuitive and can be dynamically monitored.Keywords: heat island effect, neural network, comprehensive evaluation, visualization
Procedia PDF Downloads 1331375 Rural Tourism Planning from the Perspective of Water Resource Protection and Regional Integration: Taking Villages along Tongji Lake as an Example
Authors: Pianpian Zhang, Qingping Luo
Abstract:
Currently, there is a great tendency that more and more villages in China are trying to increase income by development of tourism. Especially in Zhejiang Province, 'Beautiful Rural Construction' provides an excellent opportunity for the development of tourism. In this context, development orientation, transportation routes and tourism service facilities are analyzed under the perspective of water resources protection and regional integration based on the development tourism industry of the six villages in Pujiang County, Zhejiang Province as a research object. In the program, the biggest issue is the contradiction between the ecological protection of the water and the development of economy. How to deal with the relationship between protection and development is the key to the design of this case. Furthermore, the six villages are regarded as a whole, connecting to each other by the system of five-path and the landscape along the lake. Every village has its own features, but cannot develop without one another. The article is actively exploring for suggestions and countermeasures to promote the development premised on protection and based on a regional view.Keywords: development, integration, protection, rural tourism
Procedia PDF Downloads 3621374 The Difficulties Encountered in Overseeing Learner-Centered Instructional Activities for Elementary School Children in Ho Chi Minh City, Vietnam
Authors: Van Son Huynh, Thanh Huan Nguyen, Tat Thien Do, Thi Mai Thu Nguyen, Thien Vu Giang
Abstract:
Given the necessity for substantial and all-encompassing educational reform, particularly in elementary Education, it is imperative to prioritize learner-centered instruction at the elementary level. This study focuses on the difficulties encountered in overseeing learner-centered instructional activities for elementary school children in Ho Chi Minh City (HCMC), the largest city in Vietnam in terms of population. Although learner-centered solutions have been implemented, there are still certain weaknesses, including an emphasis on content and worries about lax monitoring. The purpose of this study, named "Management of Learner-Centered Teaching Activities for Primary School Students in HCMC," is to enhance and advance theories related to the management of learner-centered teaching activities. The study evaluates the present condition of learner-centered teaching activities and management practices in HCMC, aiming to suggest solutions for improving the efficiency of managing such activities in primary schools.Keywords: primary school, school children in Ho Chi Minh City, learner-centered instructional activities, learner-centered teaching activities and management.
Procedia PDF Downloads 741373 Survivability of Maneuvering Aircraft against Air to Air Infrared Missile
Authors: Ji-Yeul Bae, Hyung Mo Bae, Jihyuk Kim, Hyung Hee Cho
Abstract:
An air to air infrared missile poses a significant threat to the survivability of an aircraft due to an advanced sensitivity of sensor and maneuverability of the missile. Therefore, recent military aircraft is equipped with MAW (Missile Approach Warning) to take an evasive maneuver and to deploy countermeasures like chaff and flare. In this research, an effect of MAW sensitivity and resulting evasive maneuver on the survivability of the fighter aircraft is studied. A single engine fighter jet with Mach 0.9 flying at an altitude of 5 km is modeled in the research and infrared signature of the aircraft is calculated by numerical simulation. The survivability is assessed in terms of lethal range. The MAW sensitivity and maneuverability of an aircraft is used as variables. The result showed that improvement in survivability mainly achieved when the missile approach from the side of the aircraft. And maximum 30% increase in survivability of the aircraft is achieved when existence of the missile is noticed at 7 km distance. As a conclusion, sensitivity of the MAW seems to be more important factor than the maneuverability of the aircraft in terms of the survivability.Keywords: air to air missile, missile approach warning, lethal range, survivability
Procedia PDF Downloads 5681372 Teachers’ Attitudes and Techniques in EFL Writing in Secondary Schools in Egypt
Authors: Hosam Mohamed Darwish
Abstract:
In 2008, the Egyptian Ministry of Education introduced a new national coursebook ‘Hello for Secondary Schools, which recommends a shift in EFL teachers’ instructional practices. Since then, very little attention has been paid to teachers’ techniques in EFL writing classes. Hence, this study aimed at investigating teaching writing practices in secondary schools and exploring the teachers’ attitudes towards EFL writing skill in addition to exploring the difficulties that teachers encountered in EFL writing lessons. The study depended on data triangulation through administering two questionnaires: one to 44 teachers and the other to 24 students, and conducting semi-structured interviews with 11 teachers. Both teachers and students were asked to describe teaching practices in EFL writing classes while the open-ended questions and interviews collected data about the teachers’ difficulties in writing lessons. The questionnaires indicate that teachers have negative attitudes towards teaching writing, and most of their practices are still traditional. Five factors have influenced teachers’ practices: backwash of the test, teachers’ professional development, students’ culture of reading and large classes. The study recommends there has to be a necessary change in the students’ examination system, and ongoing teachers’ professional development should be considered. Finally, a teaching model and implications are suggested.Keywords: EFL writing, Egyptian secondary schools, teachers’ attitudes, teachers’ techniques
Procedia PDF Downloads 4211371 Rural Tourism Planning from the Perspective of Development and Protection of the River and Regional Integration: Taking Nanliangdu Village as an Example
Authors: Yadi Xu, Qingping Luo
Abstract:
Currently, there is a great tendency that more and more villages in China are trying to increase income by development of tourism. 'Beautiful Rural Construction' provides an excellent opportunity for the development of tourism. In this context, development orientation, transportation routes, and tourism service facilities are analyzed under the perspective of existing landscape utilization and regional integration based on the development tourism industry of the Nanliangdu Village in Jingxing Town, Shijiazhuang Province as a research object. In the program, the biggest issue is the contradiction between the ecological development and protection of the river and the development of economy. How to deal with the relationship between protection and development is the key to the design of this case. Furthermore, the streets and courtyard space, existing buildings, public environment, specific landscape of the ancient village with a history of thousands of years have strong regional characteristics. The article is actively exploring for suggestions and countermeasures to promote the development premised on protection and based on a regional view.Keywords: development, integration, protection, rural tourism
Procedia PDF Downloads 2951370 Psychological Well-Being and Perception of Disease Severity in People with Multiple Sclerosis, Who Underwent a Program of Self-Regulation to Promote Physical Activity
Authors: Luísa Pedro, José Pais-Ribeiro, João Páscoa Pinheiro
Abstract:
Multiple Sclerosis (MS) is a chronic disease of the central nervous system that affects more often young adults in the prime of his career and personal development, with no cure and unknown causes. The most common signs and symptoms are fatigue, muscle weakness, changes in sensation, ataxia, changes in balance, gait difficulties, memory difficulties, cognitive impairment and difficulties in problem solving. MS is a relatively common neurological disorder in which various impairments and disabilities impact strongly on function and daily life activities. The aim of this study is to examine the implications of the program of self-regulation in the perception of illness and mental health (psychological well-being domain) in MS patients. MS is a relatively common neurological disorder in which various impairments and disabilities impact strongly on function and daily life activities. The aim of this study is to examine the implications of the program of self-regulation in the perception of illness and mental health (psychological well-being domain) in MS patients. After this, a set of exercises was implemented to be used in daily life activities, according to studies developed with MS patients. We asked the subjects the question “Please classify the severity of your disease?” and used the domain of psychological well-being, the Mental Health Inventory (MHI-38) at the beginning (time A) and end (time B) of the program of self-regulation. We used the Statistical Package for the Social Sciences (SPSS) version 20. A non-parametric statistical hypothesis test (Wilcoxon test) was used for the variable analysis. The intervention followed the recommendations of the Helsinki Declaration. The age range of the subjects was between 20 and 58 years with a mean age of 44 years. 58.3 % were women, 37.5 % were currently married, 67% were retired and the mean level of education was 12.5 years. In the correlation between the severity of the disease perception and psychological well before the self-regulation program, an obtained result (r = 0.26, p <0.05), then the self-regulation program, was (r = 0.37, p <0.01), from a low to moderate correlation. We conclude that the program of self-regulation for physical activity in patients with MS can improve the relationship between the perception of disease severity and psychological well-being.Keywords: psychological well-being, multiple sclerosis, self-regulation, physical activity
Procedia PDF Downloads 4891369 The Nature and Impact of Trojan Horses in Cybersecurity
Authors: Mehrab Faraghti
Abstract:
Trojan horses, a form of malware masquerading as legitimate software, pose significant cybersecurity threats. These malicious programs exploit user trust, infiltrate systems, and can lead to data breaches, financial loss, and compromised privacy. This paper explores the mechanisms through which Trojan horses operate, including delivery methods such as phishing and software vulnerabilities. It categorizes various types of Trojan horses and their specific impacts on individuals and organizations. Additionally, the research highlights the evolution of Trojan threats and the importance of user awareness and proactive security measures. By analyzing case studies of notable Trojan attacks, this study identifies common vulnerabilities that can be exploited and offers insights into effective countermeasures, including behavioral analysis, anomaly detection, and robust incident response strategies. The findings emphasize the need for comprehensive cybersecurity education and the implementation of advanced security protocols to mitigate the risks associated with Trojan horses.Keywords: Trojan horses, cybersecurity, malware, data breach
Procedia PDF Downloads 111368 Singular Stochastic Control Model with Carrying Capacity of Population Management Policy for Squirrels in Durian Orchards
Authors: Sasiwimol Auepong, Raywat Tanadkithirun
Abstract:
In this work, the problem that squirrels ruin durian, which is an economical fruit in Thailand, is considered. We seek the strategy for the durian farmers to eliminate the squirrels under the consideration that squirrels also provide ecosystem service. The population dynamics of squirrels are constructed to have carrying capacity since we consider the population in a confined area. A performance index indicating the total benefit of a given elimination strategy is provided. It comprises the cost of countermeasures, the loss of resources, and the ecosystem service provided by squirrels. The optimal performance index is numerically solved through the variational inequality using the finite difference method. The optimal strategy to control the squirrel population is also given numerically.Keywords: controlled stochastic differential equation, durian, finite difference method, performance index, singular stochastic control model, squirrel
Procedia PDF Downloads 91