Search results for: ISA (instruction set architecture)
1200 Stock Movement Prediction Using Price Factor and Deep Learning
Abstract:
The development of machine learning methods and techniques has opened doors for investigation in many areas such as medicines, economics, finance, etc. One active research area involving machine learning is stock market prediction. This research paper tries to consider multiple techniques and methods for stock movement prediction using historical price or price factors. The paper explores the effectiveness of some deep learning frameworks for forecasting stock. Moreover, an architecture (TimeStock) is proposed which takes the representation of time into account apart from the price information itself. Our model achieves a promising result that shows a potential approach for the stock movement prediction problem.Keywords: classification, machine learning, time representation, stock prediction
Procedia PDF Downloads 1481199 Mountain Architectural Design Under the Concept of Pedestrian-oriented Cities: Taking Bai Xiang Ju as an Example
Authors: Xiaohan Wang
Abstract:
In the rapid urbanization process, urban design concepts are shifting towards people-oriented approaches. Emphasizing the pedestrian experience promotes urban livability and sustainable development. In mountainous cities, the inconvenience of transportation caused by complex terrain makes pedestrian-friendly architectural design one of the entry points for problem-solving. This paper mainly takes the high-rise residential area of Bai Xiang Ju in Chongqing as an example to explore the architectural design strategies of mountainous cities under the concept of pedestrian-oriented urban design, providing valuable references and insights for similar urban architectural designs.Keywords: pedestrian city, Bai Xiang Ju, mountain architecture, pedestrian infrastructure, pedestrian-oriented design
Procedia PDF Downloads 81198 The Integration of ICT in EFL Classroom and Its Impact on Teacher Development
Authors: Tayaa Karima, Bouaziz Amina
Abstract:
Today's world is knowledge-based; everything we do is somehow connected with technology which it has a remarkable influence on socio-cultural and economic developments, including educational settings. This type of technology is supported in many teaching/learning setting where the medium of instruction is through computer technology, and particularly involving digital technologies. There has been much debate over the use of computers and the internet in foreign language teaching for more than two decades. Various studies highlights that the integration of Information Communications Technology (ICT) in foreign language teaching will have positive effects on both the teachers and students to help them be aware of the modernized world and meet the current demands of the globalised world. Information and communication technology has been gradually integrated in foreign learning environment as a platform for providing learners with learning opportunities. Thus, the impact of ICT on language teaching and learning has been acknowledged globally, this is because of the fundamental role that it plays in the enhancement of teaching and learning quality, modify the pedagogical practice, and motivate learners. Due to ICT related developments, many Maghreb countries regard ICT as a tool for changes and innovations in education. Therefore, the ministry of education attempted to set up computer laboratories and provide internet connection in the schools. Investment in ICT for educational innovations and improvement purposes has been continuing the need of teacher who will employ it in the classroom as vital role of the curriculum. ICT does not have an educational value in itself, but it becomes precious when teachers use it in learning and teaching process. This paper examines the impacts of ICT on teacher development rather than on teaching quality and highlights some challenges facing using ICT in the language learning/teaching.Keywords: information communications technology (ICT), integration, foreign language teaching, teacher development, learning opportunity
Procedia PDF Downloads 3891197 A Three Tier Secure KQML Interface with Novel Performatives
Authors: Dimple Juneja, Aarti Singh, Renu Hooda
Abstract:
Knowledge Query Manipulation Language (KQML) and FIPA ACL are two prime communication languages existing in multi agent systems (MAS). Both languages are more or less similar in terms of semantics (based on speech act theory) and offer cutting edge competition while establishing agent communication across Internet. In contrast to the fact that software agents operating on the internet are required to be more safeguarded from their counter-peer, both protocols lack security performatives. The paper proposes a three tier security interface with few novel security related performatives enhancing the basic architecture of KQML. The three levels are attestation, certification and trust establishment which enforces a tight security and hence reduces the security breeches.Keywords: multiagent systems, KQML, FIPA ACL, performatives
Procedia PDF Downloads 4121196 Developing Second Language Learners’ Reading Comprehension through Content and Language Integrated Learning
Authors: Kaine Gulozer
Abstract:
A strong methodological conception in the practice of teaching, content, and language integrated learning (CLIL) is adapted to boost efficiency in the second language (L2) instruction with a range of proficiency levels. This study aims to investigate whether the incorporation of two different mediums of meaningful CLIL reading activities (in-school and out-of-school settings) influence L2 students’ development of comprehension skills differently. CLIL based instructional methodology was adopted and total of 50 preparatory year students (N=50, 25 students for each proficiency level) from two distinct language proficiency learners (elementary and intermediate) majoring in engineering faculties were recruited for the study. Both qualitative and quantitative methods through a post-test design were adopted. Data were collected through a questionnaire, a reading comprehension test and a semi-structured interview addressed to the two proficiency groups. The results show that both settings in relation to the development of reading comprehension are beneficial, whereas the impact of the reading activities conducted in school settings was higher at the elementary language level of students than that of the one conducted out-of-class settings based on the reported interview results. This study suggests that the incorporation of meaningful CLIL reading activities in both settings for both proficiency levels could create students’ self-awareness of their language learning process and the sense of ownership in successful improvements of field-specific reading comprehension. Further potential suggestions and implications of the study were discussed.Keywords: content and language integrated learning, in-school setting, language proficiency, out-of-school setting, reading comprehension
Procedia PDF Downloads 1491195 Shocking Shortage: The Electrical Trade Crisis in the Eastern Cape, South Africa
Authors: Amore Gerber, Gerrit Crafford
Abstract:
This research paper explores the root causes of the shortage of professional electricians in the Eastern Cape, South Africa. The primary objectives are to identify the underlying reasons contributing to this deficit, analyze the consequences of the shortage, and propose practical solutions to address this critical issue. The research employed an interpretivist paradigm and an inductive approach. Qualitative data was gathered through semi-structured interviews with professional electricians working in the Eastern Cape. Thematic analysis was used to identify common themes and comprehensively understand the issue. The analysis revealed that the shortage of electricians can be attributed primarily to training challenges and a lack of awareness within the industry. This shortage has significant repercussions, as it has led to the proliferation of unqualified electricians, exacerbating the problem. The study identified two key solutions to address this issue: promoting education and trade programs and transforming electrical instruction and education. The research was conducted in the Eastern Cape and reflects the viewpoints of professional electricians. Results may differ in other locations or where the effects are investigated from a client’s perspective. The research uncovers the root causes of the electrician shortage and offers valuable insights for devising effective solutions to address these challenges. This paper adds a significant dimension to the current literature gap. The study's findings underscore deficiencies in awareness and training as fundamental factors driving the shortage of electricians, emphasizing the urgent need to address these issues to bridge the gap.Keywords: electrician shortage, skill gap, training, awareness
Procedia PDF Downloads 621194 Facial Emotion Recognition Using Deep Learning
Authors: Ashutosh Mishra, Nikhil Goyal
Abstract:
A 3D facial emotion recognition model based on deep learning is proposed in this paper. Two convolution layers and a pooling layer are employed in the deep learning architecture. After the convolution process, the pooling is finished. The probabilities for various classes of human faces are calculated using the sigmoid activation function. To verify the efficiency of deep learning-based systems, a set of faces. The Kaggle dataset is used to verify the accuracy of a deep learning-based face recognition model. The model's accuracy is about 65 percent, which is lower than that of other facial expression recognition techniques. Despite significant gains in representation precision due to the nonlinearity of profound image representations.Keywords: facial recognition, computational intelligence, convolutional neural network, depth map
Procedia PDF Downloads 2321193 Effective Student Engaging Strategies to Enhance Academic Learning in Middle Eastern Classrooms: An Action Research Approach
Authors: Anjum Afrooze
Abstract:
The curriculum at General Sciences department in Prince Sultan University includes ‘Physical science’ for Computer Science, Information Technology and Business courses. Students are apathetic towards Physical Science and question, as to, ‘How this course is related to their majors?’ English is not a native language for the students and also for many instructors. More than sixty percent of the students come from institutions where English is not the medium of instruction, which makes student learning and academic achievement challenging. After observing the less enthusiastic student cohort for two consecutive semesters, the instructor was keen to find effective strategies to enhance learning and further encourage deep learning by engaging students in different tasks to empower them with necessary skills and motivate them. This study is participatory action research, in which instructor designs effective tasks to engage students in their learning. The study is conducted through two semesters with a total of 200 students. The effectiveness of this approach is studied using questionnaire at the end of each semester and teacher observation. Major outcomes of this study were overall improvement in students attitude towards science learning, enhancement of multiple skills like note taking, problem solving, language proficiency and also fortifying confidence. This process transformed instructor into engaging and reflecting practitioner. Also, these strategies were implemented by other instructors teaching the course and proved effective in opening a path to changes in related areas of the course curriculum. However, refinement in the strategies could be done based on student evaluation and instructors observation.Keywords: group activity, language proficiency, reasoning skills, science learning
Procedia PDF Downloads 1471192 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207
Authors: Mazhar Hamayun
Abstract:
Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207
Procedia PDF Downloads 891191 Queer Social Realism and Architecture in British Cinema: Tenement Housing, Unions and the Affective Body
Authors: Christopher Pullen
Abstract:
This paper explores the significance of British cinema in the late 1950s and early 1960s as offering a renaissance of realist discourse, in the representation of everyday social issues. Offering a rejection of Hollywood cinema and the superficially of the middle classes, these ‘kitchen sink dramas’ often set within modest and sometimes squalid domestic and social environments, focused on the political struggle of the disenfranchised examining poverty, the oppressed and the outsider. While films like Look Back in Anger and Room at the Top looked primarily at male heterosexual subjectivity, films like A Taste of Honey and Victim focused on female and queer male narratives. Framing the urban landscape as a discursive architectural arena, representing basic living conditions and threatening social worlds, these iconic films established new storytelling processes for the outsider. This paper examines this historical context foregrounding the contemporary films Beautiful Thing (Hettie Macdonald, 1996), Weekend (Andrew Haigh, 2011) and Pride (Marcus Warchus, 2014), while employing the process of textual analysis in relation to theories of affect, defined by writers such as Lisa U. Marks and Sara Ahmed. Considering both romance narratives and public demonstrations of unity, where the queer ‘affective’ body is placed within architectural and social space, Beautiful Thing tells the story of gay male teenagers falling in love despite oppression from family and school, Weekend examines a one-night stand between young gay men and the unlikeliness of commitment, but the drive for sensitivity, and Pride foregrounds an historical relationship between queer youth activists and the miner’s union, who were on strike between 1984-5. These films frame the queer ‘affective’ body within politicized public space, evident in lower class men’s working clubs, tenement housing and brutal modernist tower blocks, focusing on architectural features such as windows, doorways and staircases, relating temporality, desire and change. Through such an examination a hidden history of gay male performativity is revealed, framing the potential of contemporary cinema to focus on the context of the outsider in encouraging social change.Keywords: queer, affect, cinema, architecture, life chances
Procedia PDF Downloads 3611190 E-Service and the Nigerian Banking Sector: A Review of ATM Architecture and Operations
Authors: Bashir Aliyu Yauri, Rufai Aliyu Yauri
Abstract:
With the introduction of cash-less society policy by the Central Bank of Nigeria, the concept of e-banking services has experienced a significant improvement over the years. Today quite a number of people are embracing e-banking activities especially ATM, thereby moving away from the conventional banking system. This paper presents a review of the underlying Architectural Layout of Intra-Bank and Inter-Bank ATM connectivity in Nigeria. The paper further investigates and discusses factors affecting the Intra-Bank and Inter-Bank ATM connectivity in Nigeria. And as well possible solutions to these factors affecting ATM Connectivity and Operations are proposed.Keywords: architectural layout, automated teller machine, e-services, postilion
Procedia PDF Downloads 6361189 Complex Event Processing System Based on the Extended ECA Rule
Authors: Kwan Hee Han, Jun Woo Lee, Sung Moon Bae, Twae Kyung Park
Abstract:
ECA (Event-Condition-Action) languages are largely adopted for event processing since they are an intuitive and powerful paradigm for programming reactive systems. However, there are some limitations about ECA rules for processing of complex events such as coupling of event producer and consumer. The objective of this paper is to propose an ECA rule pattern to improve the current limitations of ECA rule, and to develop a prototype system. In this paper, conventional ECA rule is separated into 3 parts and each part is extended to meet the requirements of CEP. Finally, event processing logic is established by combining the relevant elements of 3 parts. The usability of proposed extended ECA rule is validated by a test scenario in this study.Keywords: complex event processing, ECA rule, Event processing system, event-driven architecture, internet of things
Procedia PDF Downloads 5321188 Austrian Standard German Struggling between Language Change, Loyalty to Its Variants and Norms: A Study on Linguistic Identity of Austrian Teachers and Students
Authors: Jutta Ransmayr
Abstract:
The German language is known to be one of the most varied and diverse languages in Europe. This variance in the standard language can be conceptualized using the pluricentric concept, which has been useful for describing the German language for more than three decades. Up to now, there have hardly been any well-founded studies of how Austrian teachers and pupils conceptualize the German language and how they view the varieties of German and especially Austrian German. The language attitudes and norms of German teachers are of particular interest in the normative, educational language-oriented school context. The teachers’ attitudes are, in turn, formative for the attitudes of the students, especially since Austrian German is an important element in the construction of Austrian national identity. The project 'Austrian German as a Language of Instruction and Education' dealt, among other things, with the attitude of language laypeople (pupils, n = 1253) and language experts (teachers, n = 164) towards the Austrian standard variety. It also aimed to find out to what extent external factors such as regional origin, age, education, or media use to influence these attitudes. It was examined whether language change phenomena can be determined and to what extent language change is in conflict with loyalty to variants. The study also focused on what norms prevail among German teachers, how they deal with standard language variation from a normative point of view, and to what extent they correct exonorm-oriented, as claimed in the literature. Methodologically, both quantitative (questionnaire survey) and qualitative methods were used (interviews with 21 teachers, 2 group discussions, and participatory observation of lessons in 7 school classes). The data were evaluated in terms of inference statistics and discourse analysis. This paper reports on the results of this project.Keywords: Austrian German, language attitudes and linguistic identity, linguistic loyalty, teachers and students
Procedia PDF Downloads 1201187 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks
Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba
Abstract:
The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.Keywords: authentication, long term evolution, security, vehicle-to-everything
Procedia PDF Downloads 1681186 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems
Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia
Abstract:
The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.Keywords: cloud computing, data management, multi-tenancy, requirements, security
Procedia PDF Downloads 1571185 Managing Cognitive Load in Accounting: An Analysis of Three Instructional Designs in Financial Accounting
Authors: Seedwell Sithole
Abstract:
One of the persistent problems in accounting education is how to effectively support students’ learning. A promising technique to this issue is to investigate the extent that learning is determined by the design of instructional material. This study examines the academic performance of students using three instructional designs in financial accounting. Student’s performance scores and reported mental effort ratings were used to determine the instructional effectiveness. The findings of this study show that accounting students prefer graph and text designs that are integrated. The results suggest that spatially separated graph and text presentations in accounting should be reorganized to align with the requirements of human cognitive architecture.Keywords: accounting, cognitive load, education, instructional preferences, students
Procedia PDF Downloads 1541184 An Informative Marketing Platform: Methodology and Architecture
Authors: Martina Marinelli, Samanta Vellante, Francesco Pilotti, Daniele Di Valerio, Gaetanino Paolone
Abstract:
Any development in web marketing technology requires changes in information engineering to identify instruments and techniques suitable for the production of software applications for informative marketing. Moreover, for large web solutions, designing an interface that enables human interactions is a complex process that must bridge between informative marketing requirements and the developed solution. A user-friendly interface in web marketing applications is crucial for a successful business. The paper introduces mkInfo - a software platform that implements informative marketing. Informative marketing is a new interpretation of marketing which places the information at the center of every marketing action. The creative team includes software engineering researchers who have recently authored an article on automatic code generation. The authors have created the mkInfo software platform to generate informative marketing web applications. For each web application, it is possible to automatically implement an opt in page, a landing page, a sales page, and a thank you page: one only needs to insert the content. mkInfo implements an autoresponder to send mail according to a predetermined schedule. The mkInfo platform also includes e-commerce for a product or service. The stakeholder can access any opt-in page and get basic information about a product or service. If he wants to know more, he will need to provide an e-mail address to access a landing page that will generate an e-mail sequence. It will provide him with complete information about the product or the service. From this point on, the stakeholder becomes a user and is now able to purchase the product or related services through the mkInfo platform. This paper suggests a possible definition for Informative Marketing, illustrates its basic principles, and finally details the mkInfo platform that implements it. This paper also offers some Informative Marketing models, which are implemented in the mkInfo platform. Informative marketing can be applied to products or services. It is necessary to realize a web application for each product or service. The mkInfo platform enables the product or the service producer to send information concerning a specific product or service to all stakeholders. In conclusion, the technical contributions of this paper are: a different interpretation of marketing based on information; a modular architecture for web applications, particularly for one with standard features such as information storage, exchange, and delivery; multiple models to implement informative marketing; a software platform enabling the implementation of such models in a web application. Future research aims to enable stakeholders to provide information about a product or a service so that the information gathered about a product or a service includes both the producer’s and the stakeholders' point of view. The purpose is to create an all-inclusive management system of the knowledge regarding a specific product or service: a system that includes everything about the product or service and is able to address even unexpected questions.Keywords: informative marketing, opt in page, software platform, web application
Procedia PDF Downloads 1301183 The Use of Indicators to Evaluate Minor Heritage Areas in a City
Authors: J. L. Oliver, T. Agryzkov, L. Tortosa, J. F. Vicent, J. Santacruz
Abstract:
This paper aims to demonstrate how a system of indicators can be used in order to evaluate some heritage areas which can be understood as minor ones. We mean by that those urban areas with high heritage interest from an academical point of view, but never properly valued. The reasons for this situation may be diverse, either they are not old enough, or they may show the modest architecture, the fact is these areas have not been considered deserving of protection, as the historical ones. As a result of this reality, they usually show now a very degraded urban space, which in addition contribute to accelerate a process of deterioration. Using a technic well known in urban design, we propose here a system of indicators for patrimonial purposes, as a tool to identify and quantify the heritage value of these kinds of areas. As a case study, we apply this system in some part of the City of Quito (El Ecuador).Keywords: heritage cities, indicators, spatial analysis, historic sites
Procedia PDF Downloads 2451182 Investigating the Relationship between Bank and Cloud Provider
Authors: Hatim Elhag
Abstract:
Banking and Financial Service Institutions are possibly the most advanced in terms of technology adoption and use it as a key differentiator. With high levels of business process automation, maturity in the functional portfolio, straight through processing and proven technology outsourcing benefits, Banking sector stand to benefit significantly from Cloud computing capabilities. Additionally, with complex Compliance and Regulatory policies, combined with expansive products and geography coverage, the business impact is even greater. While the benefits are exponential, there are also significant challenges in adopting this model– including Legal, Security, Performance, Reliability, Transformation complexity, Operating control and Governance and most importantly proof for the promised cost benefits. However, new architecture designed should be implemented to align this approach.Keywords: security, cloud, banking sector, cloud computing
Procedia PDF Downloads 5121181 The Unique Journeys from Different Pasts to Multiple Presents in the Work of the Pritzker Prize Laureates of 2010-2020
Authors: Christakis Chatzichristou Kyriakos Miltiadou, Konstantinos Gounaridis
Abstract:
The paper discusses how the Pritzker Prize Laureates of the last decade themselves identify the various ways different aspects or interpretations of the past have influenced their design methodologies. As the recipients of what is considered to be the most prestigious award in architecture, these architects are worth examining not only because of their exemplary work but also because of the strong influence they have on architectural culture in general. Rather than attempting to interpret their projects, the methodology chosen focuses on what the architects themselves have to say on the subject. The research aims at, and, as the tabular form of the findings shows, also succeeds in revealing the numerous and diverse ways different aspects of what is termed as the Past can potentially enrich contemporary design practices.Keywords: design methodology, Pritzker Prize Laureates, past, culture, tradition
Procedia PDF Downloads 471180 Improving Effectiveness of Students' Learning during Clinical Rotations at a Teaching Hospital in Rwanda
Authors: Nanyombi Lubimbi, Josette Niyokindi
Abstract:
Background: As in many other developing countries in Africa, Rwanda suffers from a chronic shortage of skilled Health Care professionals including Clinical Instructors. This shortage negatively affects the clinical instruction quality therefore impacting student-learning outcomes. Due to poor clinical supervision, it is often noted that students have no structure or consistent guidance in their learning process. The Clinical Educators and the Rwandan counterparts identified the need to create a favorable environment for learning. Description: During orientation the expectations of the student learning process, collaboration of the clinical instructors with the nurses and Clinical Educators is outlined. The ward managers facilitate structured learning by helping the students identify a maximum of two patients using the school’s objectives to guide the appropriate selection of patients. Throughout the day, Clinical Educators with collaboration of Clinical Instructors when present conduct an ongoing assessment of learning and provide feedback to the students. Post-conference is provided once or twice a week to practice critical thinking skills of patient cases that they have been taking care of during the day. Lessons Learned: The students are found to be more confident with knowledge and skills gained during rotations. Clinical facility evaluations completed by students at the end of their rotations highlight the student’s satisfaction and recommendation for continuation of structured learning. Conclusion: Based on the satisfaction of both students and Clinical Instructors, we have identified need for structured learning during clinical rotations. We acknowledge that more evidence-based practice is necessary to effectively address the needs of nursing and midwifery students throughout the country.Keywords: Rwanda, clinical rotation, structured learning, critical thinking skills, post-conference
Procedia PDF Downloads 2401179 Research on the Evolution of Public Space in Tourism-Oriented Traditional Rural Settlements
Authors: Yu Zhang, Mingxue Lang, Li Dong
Abstract:
The hundreds of years of slow succession of living environment in rural area is a crucial carrier of China’s long history of culture and national wisdom. In recent years, the space evolution of traditional rural settlements has been promoted by the intervention of tourism development, among which the public architecture and outdoor activity areas together served as the major places for villagers, and tourists’ social activities are an important characterization for settlement spatial evolution. Traditional public space upgrade and layout study of new public space can effectively promote the tourism industry development of traditional rural settlements. This article takes Qi County, one China Traditional Culture Village as the exemplification and uses the technology of Remote Sensing (RS), Geographic Information System (GIS) and Space Syntax, studies the evolution features of public space of tourism-oriented traditional rural settlements in four steps. First, acquire the 2003 and 2016 image data of Qi County, using the remote sensing application EDRAS8.6. Second, vectorize the basic maps of Qi County including its land use map with the application of ArcGIS 9.3 meanwhile, associating with architectural and site information concluded from field research. Third, analyze the accessibility and connectivity of the inner space of settlements using space syntax; run cross-correlation with the public space data of 2003 and 2016. Finally, summarize the evolution law of the public space of settlements; study the upgrade pattern of traditional public space and location plan for new public space. Major findings of this paper including: first, location layout of traditional public space has a larger association with the calculation results of space syntax and further confirmed the objective value of space syntax in expressing the space and social relations. Second, the intervention of tourism development generates remarkable impact on public space location of tradition rural settlements. Third, traditional public space produces the symbols of both strengthening and decline and forms a diversified upgrade pattern for the purpose of meeting the different tourism functional needs. Finally, space syntax provides an objective basis for location plan of new public space that meets the needs of tourism service. Tourism development has a significant impact on the evolution of public space of traditional rural settlements. Two types of public space, architecture, and site are both with changes seen from the perspective of quantity, location, dimension and function after the intervention of tourism development. Function upgrade of traditional public space and scientific layout of new public space are two important ways in achieving the goal of sustainable development of tourism-oriented traditional rural settlements.Keywords: public space evolution, Qi county, space syntax, tourism oriented, traditional rural settlements
Procedia PDF Downloads 3421178 The Impact of Academic Support Practices on Two-Year College Students’ Achievement in Science, Technology, Engineering, and Math Education: An Exploration of Factors
Authors: Gisele Ragusa, Lilian Leung
Abstract:
There are essential needs for science, technology, engineering, and math (STEM) workforces nationally. This important need underscores the necessity of increasing numbers of students attending both two-year community colleges and universities, thereby enabling and supporting a larger pool of students to enter the workforce. The greatest number of students in STEM programs attend public higher education institutions, with an even larger majority beginning their academic experiences enrolled in two-year public colleges. Accordingly, this research explores the impact of experiences and academic support practices on two-year (community) college students’ academic achievement in STEM majors with a focus on supporting students who are the first in their families to attend college. This research is a result of three years of iterative trials of differing supports to improve such students’ academic success with a cross-student comparative research methodological structure involving peer-to-peer and faculty academic supports. Results of this research indicate that background experiences and a combination of peer-to-peer and faculty-led academic support practices, including supplementary instruction, peer mentoring, and study skills support, significantly improve students’ academic success in STEM majors. These results confirm the needs that first-generation students have in navigating their college careers and what can be effective in supporting them.Keywords: higher education policy, student support, two-year colleges, STEM achievement
Procedia PDF Downloads 991177 Hydrogen: Contention-Aware Hybrid Memory Management for Heterogeneous CPU-GPU Architectures
Authors: Yiwei Li, Mingyu Gao
Abstract:
Integrating hybrid memories with heterogeneous processors could leverage heterogeneity in both compute and memory domains for better system efficiency. To ensure performance isolation, we introduce Hydrogen, a hardware architecture to optimize the allocation of hybrid memory resources to heterogeneous CPU-GPU systems. Hydrogen supports efficient capacity and bandwidth partitioning between CPUs and GPUs in both memory tiers. We propose decoupled memory channel mapping and token-based data migration throttling to enable flexible partitioning. We also support epoch-based online search for optimized configurations and lightweight reconfiguration with reduced data movements. Hydrogen significantly outperforms existing designs by 1.21x on average and up to 1.31x.Keywords: hybrid memory, heterogeneous systems, dram cache, graphics processing units
Procedia PDF Downloads 1041176 On-Chip Aging Sensor Circuit Based on Phase Locked Loop Circuit
Authors: Ararat Khachatryan, Davit Mirzoyan
Abstract:
In sub micrometer technology, the aging phenomenon starts to have a significant impact on the reliability of integrated circuits by bringing performance degradation. For that reason, it is important to have a capability to evaluate the aging effects accurately. This paper presents an accurate aging measurement approach based on phase-locked loop (PLL) and voltage-controlled oscillator (VCO) circuit. The architecture is rejecting the circuit self-aging effect from the characteristics of PLL, which is generating the frequency without any aging phenomena affects. The aging monitor is implemented in low power 32 nm CMOS technology, and occupies a pretty small area. Aging simulation results show that the proposed aging measurement circuit improves accuracy by about 2.8% at high temperature and 19.6% at high voltage.Keywords: aging effect, HCI, NBTI, nanoscale
Procedia PDF Downloads 3611175 Web-Based Learning in Nursing: The Sample of Delivery Lesson Program
Authors: Merve Kadioğlu, Nevin H. Şahin
Abstract:
Purpose: This research is organized to determine the influence of the web-based learning program. The program has been developed to gain information about normal delivery skill that is one of the topics of nursing students who take the woman health and illness. Material and Methods: The methodology of this study was applied as pre-test post-test single-group quasi-experimental. The pilot study consisted of 28 nursing student study groups who agreed to participate in the study. The findings were gathered via web-based technologies: student information form, information evaluation tests, Web Based Training Material Evaluation Scale and web-based learning environment feedback form. In the analysis of the data, the percentage, frequency and Wilcoxon Signed Ranks Test were used. The Web Based Instruction Program was developed in the light of full learning model, Mayer's research-based multimedia development principles and Gagne's Instructional Activities Model. Findings: The average scores of it was determined in accordance with the web-based educational material evaluation scale: ‘Instructional Suitability’ 4.45, ‘Suitability to Educational Program’ 4.48, ‘Visual Adequacy’ 4.53, ‘Programming Eligibility / Technical Adequacy’ 4.00. Also, the participants mentioned that the program is successful and useful. A significant difference was found between the pre-test and post-test results of the seven modules (p < 0.05). Results: According to pilot study data, the program was rated ‘very good’ by the study group. It was also found to be effective in increasing knowledge about normal labor.Keywords: normal delivery, web-based learning, nursing students, e-learning
Procedia PDF Downloads 1791174 Effects of Probiotics on Specific Immunity in Broiler Chicken in Syria
Authors: Moussa Majed, Omar Yaser
Abstract:
The main objective of this experiment was to study the impact of Probiotic compound on the specific immunity as the case study of infectious bursal disease. Total of 8000 one-day old Ross 108 broiler were randomly divided into two experimental groups; control group (4500 birds) and experimental group (3500 birds). Birds in two groups were reared under similar environmental conditions. Birds in control group received basal diets without probiotic whereas the birds in experimental one were fed basal diets supplemented with a commercial probiotic mixture) probiotic lacting k, which contains bacteria cells beyond to lactobacillus, Streptococcus and bifidobacterium genus that are isolated from gut microflora in healthy chickens(. The commercial probiotic were used according to the manufacturer instruction. 400 blood samples for each group were collected from wing vein every 5-7 days as interval period till 42 days old. Indirect Enzyme-Linked Immunosorbent Assay (ELISA) test was performed to detect the level of infectious bursal disease virus (IBDV) antibodies. The results clearly showed that the mean of immune titers was significantly (p= 0.03) higher in trail group than control one. The coefficient of variance percentages were 55% and 39% for control and trial groups respectively, this illustrates that homogeneity of immunity titers in the trail group was much better comparing with control group. The values of geometric means of titers in the control group and trial group were reported 3820 and 8133, respectively. The crude mortality rate in the experimental group was two times lower comparing with control group (14% and 28% respectively, p = 0.005Keywords: probiotic, broiler chicken, infectious bursal disease, immunity, ELISA test
Procedia PDF Downloads 711173 The Voyage of Adolfo Caminha to the USA: The Discourse about Americanism in Brazil in the Late Nineteenth Century
Authors: Maxwel F. Silva, José Geraldo Pedrosa
Abstract:
This paper is a study about the voyage of Adolfo Caminha to the USA in the late nineteenth century described in “No país dos ianques”. The hypothesis is that the USA constitutes a civilizing reference that moves away from Europe. The Americanism expression it means that the Yankees have invented a new repertoire through which built a new idea of civilization. The base is European, but your architecture is new. This paper is not concerned with the meanings and uses of the Americanism expression among the Yankees, but with the ways in which the America were understood by otherness, especially in the late nineteenth and early twentieth century. In this way, this study discusses the concept of Americanism in the thought of Adolfo Caminha and it is relation with the Brazil in the late nineteenth century, especially in questions about democracy, liberty and progress.Keywords: Adolfo Caminha, Americanism, discourse, voyage
Procedia PDF Downloads 5541172 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 2291171 Collaborative Learning Strategies in Engineering Tuition Focused on Students’ Engagement
Authors: Maria Gonzalez Alriols, Itziar Egues, Maria A. Andres, Mirari Antxustegi
Abstract:
Peer to peer learning is an educational tool very useful to enhance teamwork and reinforce cooperation between mates. It is particularly successful to work with students of different level of previous knowledge, as it often happens among pupils of subjects in the first course of science and engineering studies. Depending on the performed pre-university academic itinerary, the acquired knowledge in disciplines as mathematics, physics, or chemistry may be quite different. This fact is an added difficulty to the tuition of first-course basic science subjects of engineering degrees, with inexperienced students that do not know each other. In this context, peer to peer learning applied in small groups facilitates the communication between mates and makes it easier for the students with low level to be helped by the ones with better prior knowledge. In this work, several collaborative learning strategies were designed to be applied in the tuition of the subject 'chemistry', which is imparted in the first course of an engineering degree. Students were organized in groups combining mates with different level of prior knowledge. The teaching role was offered to the more experienced students who were responsible for designing learning pills to help the other mates in their group. This workload was rewarded with an extra mark, and more extra points were offered to all the group mates if every student in the group reached a determined level at the end of the semester. It was very important to start these activities from the beginning of the semester in order to avoid absenteeism. The obtained results were positive as a higher percentage of mates signed up and passed the final exam, the obtained final marks were higher, and a much better atmosphere was observed in the class.Keywords: peer to peer tuition, collaborative learning, engineering instruction, chemistry
Procedia PDF Downloads 143