Search results for: personal memory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3291

Search results for: personal memory

2061 Biometric Recognition Techniques: A Survey

Authors: Shabir Ahmad Sofi, Shubham Aggarwal, Sanyam Singhal, Roohie Naaz

Abstract:

Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. These features are used to provide an authentication for computer based security systems. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on 'who she/he is' rather than 'what she/he has' (card, token, key) or 'what she/he knows' (password, PIN). In this paper, a brief overview of biometric methods, both unimodal and multimodal and their advantages and disadvantages, will be presented.

Keywords: biometric, DNA, fingerprint, ear, face, retina scan, gait, iris, voice recognition, unimodal biometric, multimodal biometric

Procedia PDF Downloads 740
2060 A Compared Approach between Moderate Islamic Values and Basic Human Values

Authors: Adel Bessadok

Abstract:

The theory of values postulates that each human has a set of values, or attractive and trans-situational goals, that drive their actions. The Basic Human Values as an incentive construct that apprehends human's values have been shown to govern a wide range of human behaviors. Individuals within and within societies have very different value preferences that reflect their enculturation, their personal experiences, their social places and their genetic heritage. Using a focus group composed by Islamic religious Preachers and a sample of 800 young students; this ongoing study will establish Moderate Islamic Values parameters. We analyze later, for the same students sample the difference between Moderate Islamic Values and Schwartz’s Basic Human Values. Keywords—Moderate Islamic Values, Basic Human Values, Exploratory Factor Analysis and Confirmatory Factor Analysis.

Keywords: moderate Islamic values, basic human values, exploratory factor analysis, confirmatory factor analysis

Procedia PDF Downloads 361
2059 Variations of Metaphors: Wittgenstein's Contribution to Literary Studies

Authors: Dorit Lemberger

Abstract:

Wittgenstein directly used the term "metaphor" only infrequently and with reservations, but his writings include a number of metaphors that have become imprinted in the philosophical memory of Western thought. For example, the ladder in his book Tractatus, or in Philosophical investigations - the ancient city, the beetle in a box, the fly in the fly-bottle, and the duck-rabbit. In light of Wittgenstein's stressing, throughout his investigations, that the only language that exists is ordinary language, and that there is no "second-order" language, the question should be asked: How do these metaphors function, specifically, and in general, how are we to relate to language use that exceeds the normal? Wittgenstein did not disregard such phenomena, but he proposed viewing them in a different way, that would enable understanding them as uses in ordinary language, without necessarily exceeding such language. Two important terms that he coined in this context are "secondary sense" and "experience of meaning". Each denotes language use as reflective of a subjective element characteristic of the speaker, such as intent, experience, or emphasis of a certain aspect. More recent Wittgenstein scholars added the term "quasi-metaphor", that refers to his discussion of the possibility of aesthetic judgment. This paper will examine how, according to Wittgenstein, these terms function without exceeding ordinary language, and will illustrate how they can be applied, in an analysis of the poem "Butterfly" by Nelly Sachs.

Keywords: metaphor, quasi-metaphor, secondary sense, experience of meaning

Procedia PDF Downloads 423
2058 Swedish Police Officers' Experiences of Meeting with Women Who Were Raped

Authors: Lisa Rudolfsson

Abstract:

Socio-cognitive factors, such as social support and attribution of blame, influence the victim’s psychological adjustment after the abuse. Furthermore, the response from the person that the victim first confides to effect adjustment following the abuse. In Sweden, although police are investigating most of the reported cases of rape, very few rape-cases leads to trial and sentence. For many women who have been raped, contact with the police officer when reporting the crime will, therefore, be the most notable experience of how representatives for the Swedish society regard and handle what has happened. Hence, it seems urgent to gather information about these initial meetings. This study is part of a three-year research project, titled 'Female rape victims: Quality of initial police and medical care contact', funded by the Swedish Crime Victim and Support Authority. The focus of this study was on police officers in Sweden: their thoughts and experiences of meeting with raped women. Forthcoming are interviews with raped women about their experiences of meeting with police. Sixteen police officers participated in three focus groups and one interview. The participants consisted of five men and eleven women. Focus groups and interview were audio recorded and transcribed verbatim. The material was analyzed using thematic analysis. Participants described how violence against women was not a priority in Swedish society or within the Police Authority. They talked about rape cases as a Sisyphean work-task that put high demands on them, while they also lacked training and support. They expressed a wish to offer the woman some kind of restoration, and they talked about their work as potentially making a difference for the woman – even if she did not get juridical justice. However, participants also described that they did not feel validated in their hard work. They talked about working rape cases as causing them a great deal of frustration - directed towards the Police Authority, the juridical system, colleagues, and sometimes towards the woman. Participants also described how meeting with raped women was a work that affected them in a personal manner. Listening to stories about sexual violence made the participants sad, and they described it as a struggle to understand. They described wondering how the woman’s life turned out and how they sometimes questioned if they had done enough. Some of the conclusions concern the lack of prerequisites needed for police officers to be able to offer a good-enough treatment of raped women, as well as the lack of tools needed for police officers to care for themselves. In lack of training, validation, and support, the knowledge of how to offer a good- enough treatment of raped women becomes a task learned by doing. Attempts to offer, if not legal justice, then at least some kind of restoration becomes a personal task, dependent on individual police officers. It seems urgent that we address the risk of police officers’ frustration building up to be detrimental for both the crime victim and the officer her/himself.

Keywords: focus groups, police, raped women, restoration

Procedia PDF Downloads 109
2057 A Survey on Smart Security Mechanism Using Graphical Passwords

Authors: Aboli Dhanavade, Shweta Bhimnath, Rutuja Jumale, Ajay Nadargi

Abstract:

Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins.

Keywords: shoulder-surfing, security, authentication, text-passwords

Procedia PDF Downloads 349
2056 'Marching into the Classroom' a Second Career in Education for Ex-Military Personnel

Authors: Mira Karnieli, Shosh Veitzman

Abstract:

In recent years, due to transitions in teacher education, professional identities are changing. In many countries, the education system is absorbing ex-military personnel. The aim of this research is to investigate the phenomenon of retired officers in Israel who choose education as a second career and the training provided. The phenomenon of retired military permanent-service officers pursuing a career in education is not unique to Israel. In the United States and the United Kingdom, for example, government-supported accelerated programs (Troops to Teachers) are run for ex-military personnel (soldiers and officers) with a view to their entry into the education system. These programs direct the ex-military personnel to teacher education and training courses to obtain teaching certification. The present study, however, focused specifically on senior officers who have a full academic education, most of the participants hold second degrees in a variety of fields. They all retired from a rich military career, including roles in command, counseling, training, guidance, and management. The research included 80 participants' men and women. Data was drowning from in-depth interviews and questioner. The conceptual framework which guided this study was mixed methods. The qualitative-phenomenological methodology, using in-depth interviews, and a questioner. The study attempted to understand the motives and personal perceptions behind the choice of teaching. Were they able to identify prior skills that they had accumulated throughout their years of service? What were these skills? In addition, which (if any) would stand them in good stead for a career in teaching? In addition, they were asked how they perceived the training program’s contribution to their professionalization and integration in the education system. The data was independently coded by the researchers. Subsequently, the data was discussed by both researchers, codes were developed, and conceptual categories were formed. Analysis of the data shows this population to be characterized by the high motivation for studying, professionalization, contribution to society and a deep sense of commitment to education. All of them had a profession which they acquired in the past which is not related to education. However, their motives for choosing to teach are related to their wish to give expression to their leadership experience and ability, the desire to have an influence and to bring about change. This is derived from personal commitment, as well as from a worldview and value system that are supportive of education. In other words, they feel committed and act out of a sense of vocation. In conclusion, it will emphasize that all the research participants began working in education immediately upon completing the training program. They perceived this path as a way of realizing a mission despite the low status of the teaching profession in Israel and low teacher salaries.

Keywords: cross-boundary skills, lifelong learning, professional identities, teaching as a second career, training program

Procedia PDF Downloads 185
2055 Effective Teaching without Digital Enhancement

Authors: D. A. Carnegie

Abstract:

Whilst there is a movement towards increased digital augmentation in order to facilitate effective tertiary learning, this must come with an awareness of the limitations of such an approach. Learning is best achieved in an environment that includes their learning peers where difficulties can be shared and learning enabled. Policy that advocates for digital technology in place of a physical classroom is dangerous and is often driven by financial concerns rather than pedagogical ones. In this paper, a mostly digital-less form of teaching is presented – one that has proven to be extremely effective. Implicit is anecdotal evidence that student prefer the old overhead transparencies to PowerPoint presentations. Varying and reinforcing assessment, facilitation of effective note-taking, and just actively engaging with students is at the core of a good tertiary education experience. Digital techniques can augment and complement, but not replace these core personal teaching requirements.

Keywords: engineering education, active classroom engagement, effective note taking, reinforcing assessment

Procedia PDF Downloads 337
2054 Factors Related to Employee Adherence to Rules in Kuwait Business Organizations

Authors: Ali Muhammad

Abstract:

The purpose of this study is to develop a theoretical framework which demonstrates the effect of four personal factors on employees rule following behavior in Kuwaiti business organizations. The model suggested in this study includes organizational citizenship behavior, affective organizational commitment, organizational trust, and procedural justice as possible predictors of rule following behavior. The study also attempts to compare the effects of the suggested factors on employees rule following behavior. The new model will, hopefully, extend previous research by adding new variables to the models used to explain employees rule following behavior. A discussion of issues related to rule-following behavior is presented, as well as recommendations for future research.

Keywords: employee adherence to rules, organizational justice, organizational commitment, organizational citizenship behavior

Procedia PDF Downloads 441
2053 The Effects of Normal Aging on Reasoning Ability: A Dual-Process Approach

Authors: Jamie A. Prowse Turner, Jamie I. D. Campbell, Valerie A. Thompson

Abstract:

The objective of the current research was to use a dual-process theory framework to explain these age-related differences in reasoning. Seventy-two older (M = 80.0 years) and 72 younger (M = 24.6 years) adults were given a variety of reasoning tests (i.e., a syllogistic task, base rate task, the Cognitive Reflection Test, and a perspective manipulation), as well as independent tests of capacity (working memory, processing speed, and inhibition), thinking styles, and metacognitive ability, to account for these age-related differences. It was revealed that age-related differences were limited to problems that required Type 2 processing and were related to differences in cognitive capacity, individual difference factors, and strategy choice. Furthermore, older adults’ performance can be improved by reasoning from another’s’ perspective and cannot, at this time, be explained by metacognitive differences between young and older adults. All of these findings fit well within a dual-process theory of reasoning, which provides an integrative framework accounting for previous findings and the findings presented in the current manuscript.

Keywords: aging, dual-process theory, performance, reasoning ability

Procedia PDF Downloads 176
2052 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 170
2051 Indicators of Radicalization in Prisons Facilities: Identification and Assessment

Authors: David Kramsky, Barbora Vegrichtova

Abstract:

The prison facility is generally considered as an environment having a corrective purpose. Besides the social sense of remedy, prison is also an environment that potentially determines and affects socially dangerous behavior. The authors, based on long-term empirical research, present the significant indicators that are directly related to the transformation of personality attitudes, motivations and behavior associating with a process of radicalization. One of the most significant symptoms of radicalization is a particular social moral decision making. Individuals in the radicalism process primarily prefer utilitarian manners of decision-making more than personal aspects like empathy for others. The authors will present the method of social moral profiling of the subject in radicalization process as an effective prevention system reducing security risks in society.

Keywords: indicators, moral decision, radicalism, social profile

Procedia PDF Downloads 209
2050 The Impact of Political Polarization on the COVID-19 Vaccine Hesitancy in the United States: A Qualitative Study

Authors: Peiran Ma

Abstract:

This study explored the role of political polarization in an individual's decision of receiving the COVID-19 vaccine. A total of 15 participants participated in individual interviews and focus group discussions about the relationships among domestic political polarization, vaccine hesitancy, and behavioral responses to the COVID-19 pandemic. Political affiliation affected an individual’s decision on the COVID-19 vaccination, such that people who identified as Liberals and Democrats were more accepting of the vaccine. On the other hand, the level of influence declined over time (2020-2022) when the general conception of COVID-19 immunization shifted from political to personal. Results provided qualitative support to the previously identified positive relationship between divided political opinions and COVID-19 vaccine hesitancy and highlighted the decreasing trend in the power of political polarization in vaccination and the existence of other factors.

Keywords: COVID-19, vaccine hesitancy, political polarization, partisanship, ideology

Procedia PDF Downloads 65
2049 Empowering Learners: From Augmented Reality to Shared Leadership

Authors: Vilma Zydziunaite, Monika Kelpsiene

Abstract:

In early childhood and preschool education, play has an important role in learning and cognitive processes. In the context of a changing world, personal autonomy and the use of technology are becoming increasingly important for the development of a wide range of learner competencies. By integrating technology into learning environments, the educational reality is changed, promoting unusual learning experiences for children through play-based activities. Alongside this, teachers are challenged to develop encouragement and motivation strategies that empower children to act independently. The aim of the study was to reveal the changes in the roles and experiences of teachers in the application of AR technology for the enrichment of the learning process. A quantitative research approach was used to conduct the study. The data was collected through an electronic questionnaire. Participants: 319 teachers of 5-6-year-old children using AR technology tools in their educational process. Methods of data analysis: Cronbach alpha, descriptive statistical analysis, normal distribution analysis, correlation analysis, regression analysis (SPSS software). Results. The results of the study show a significant relationship between children's learning and the educational process modeled by the teacher. The strongest predictor of child learning was found to be related to the role of the educator. Other predictors, such as pedagogical strategies, the concept of AR technology, and areas of children's education, have no significant relationship with child learning. The role of the educator was found to be a strong determinant of the child's learning process. Conclusions. The greatest potential for integrating AR technology into the teaching-learning process is revealed in collaborative learning. Teachers identified that when integrating AR technology into the educational process, they encourage children to learn from each other, develop problem-solving skills, and create inclusive learning contexts. A significant relationship has emerged - how the changing role of the teacher relates to the child's learning style and the aspiration for personal leadership and responsibility for their learning. Teachers identified the following key roles: observer of the learning process, proactive moderator, and creator of the educational context. All these roles enable the learner to become an autonomous and active participant in the learning process. This provides a better understanding and explanation of why it becomes crucial to empower the learner to experiment, explore, discover, actively create, and foster collaborative learning in the design and implementation of the educational content, also for teachers to integrate AR technologies and the application of the principles of shared leadership. No statistically significant relationship was found between the understanding of the definition of AR technology and the teacher’s choice of role in the learning process. However, teachers reported that their understanding of the definition of AR technology influences their choice of role, which has an impact on children's learning.

Keywords: teacher, learner, augmented reality, collaboration, shared leadership, preschool education

Procedia PDF Downloads 27
2048 Assumption of Cognitive Goals in Science Learning

Authors: Mihail Calalb

Abstract:

The aim of this research is to identify ways for achieving sustainable conceptual understanding within science lessons. For this purpose, a set of teaching and learning strategies, parts of the theory of visible teaching and learning (VTL), is studied. As a result, a new didactic approach named "learning by being" is proposed and its correlation with educational paradigms existing nowadays in science teaching domain is analysed. In the context of VTL the author describes the main strategies of "learning by being" such as guided self-scaffolding, structuring of information, and recurrent use of previous knowledge or help seeking. Due to the synergy effect of these learning strategies applied simultaneously in class, the impact factor of learning by being on cognitive achievement of students is up to 93 % (the benchmark level is equal to 40% when an experienced teacher applies permanently the same conventional strategy during two academic years). The key idea in "learning by being" is the assumption by the student of cognitive goals. From this perspective, the article discusses the role of student’s personal learning effort within several teaching strategies employed in VTL. The research results emphasize that three mandatory student – related moments are present in each constructivist teaching approach: a) students’ personal learning effort, b) student – teacher mutual feedback and c) metacognition. Thus, a successful educational strategy will target to achieve an involvement degree of students into the class process as high as possible in order to make them not only know the learning objectives but also to assume them. In this way, we come to the ownership of cognitive goals or students’ deep intrinsic motivation. A series of approaches are inherent to the students’ ownership of cognitive goals: independent research (with an impact factor on cognitive achievement equal to 83% according to the results of VTL); knowledge of success criteria (impact factor – 113%); ability to reveal similarities and patterns (impact factor – 132%). Although it is generally accepted that the school is a public service, nonetheless it does not belong to entertainment industry and in most of cases the education declared as student – centered actually hides the central role of the teacher. Even if there is a proliferation of constructivist concepts, mainly at the level of science education research, we have to underline that conventional or frontal teaching, would never disappear. Research results show that no modern method can replace an experienced teacher with strong pedagogical content knowledge. Such a teacher will inspire and motivate his/her students to love and learn physics. The teacher is precisely the condensation point for an efficient didactic strategy – be it constructivist or conventional. In this way, we could speak about "hybridized teaching" where both the student and the teacher have their share of responsibility. In conclusion, the core of "learning by being" approach is guided learning effort that corresponds to the notion of teacher–student harmonic oscillator, when both things – guidance from teacher and student’s effort – are equally important.

Keywords: conceptual understanding, learning by being, ownership of cognitive goals, science learning

Procedia PDF Downloads 157
2047 Pre-Service Science Teachers' Perceptions Related to the Concept of Laboratory: A Metaphorical Analysis

Authors: Salih Uzun

Abstract:

The laboratory activities are seen an indispensable part of science, teaching, and learning. In this study, the aim was to identify pre-service science teachers’ perceptions related to the concept of laboratory through metaphors. It is expressed that metaphors can be used as a powerful research tool in order to understand personal perceptions. Therefore, metaphors were used with the aim of revealing a picture regarding how pre-service science teachers perceive laboratory. Within the scope of this aim, phenomenographic research design was adopted for this study and an answer was sought to the question; ‘What are pre-service science teachers’ perceptions about the concept of laboratory?’. The sample of this study was a total of 80 pre-service science teachers at various grade levels in Turkey. Participants were asked to complete the sentence; ‘Laboratory is like…; because…’. Documents including pre-service science teachers’ answers to the open-ended questions were used as data sources and the data were analysed with content analysis.

Keywords: laboratory, metaphor, phenomenology, pre-service science teachers

Procedia PDF Downloads 417
2046 A Machine Learning Based Method to Detect System Failure in Resource Constrained Environment

Authors: Payel Datta, Abhishek Das, Abhishek Roychoudhury, Dhiman Chattopadhyay, Tanushyam Chattopadhyay

Abstract:

Machine learning (ML) and deep learning (DL) is most predominantly used in image/video processing, natural language processing (NLP), audio and speech recognition but not that much used in system performance evaluation. In this paper, authors are going to describe the architecture of an abstraction layer constructed using ML/DL to detect the system failure. This proposed system is used to detect the system failure by evaluating the performance metrics of an IoT service deployment under constrained infrastructure environment. This system has been tested on the manually annotated data set containing different metrics of the system, like number of threads, throughput, average response time, CPU usage, memory usage, network input/output captured in different hardware environments like edge (atom based gateway) and cloud (AWS EC2). The main challenge of developing such system is that the accuracy of classification should be 100% as the error in the system has an impact on the degradation of the service performance and thus consequently affect the reliability and high availability which is mandatory for an IoT system. Proposed ML/DL classifiers work with 100% accuracy for the data set of nearly 4,000 samples captured within the organization.

Keywords: machine learning, system performance, performance metrics, IoT, edge

Procedia PDF Downloads 181
2045 Educational Theatre Making Project: Prior Conditions

Authors: Larisa Akhmylovskaia, Andriana Barysh

Abstract:

The present paper is introducing the translation score developing methodology and methods in the cross-cultural communication. The ideas and examples presented by the authors illustrate the universal character of translation score developing methods under analysis. Personal experience in the international theatre-making projects, opera laboratories, cross-cultural master-classes give more opportunities to single out the conditions, forms, means and principles of translation score developing as well as the translator/interpreter’s functions as cultural liaison for multiethnic collaboration.

Keywords: methodology of translation score developing, pre-production, analysis, production, post-production, ethnic scene theory, theatre anthropology, laboratory, master-class, educational project, academic project, participant observation, super-objective

Procedia PDF Downloads 495
2044 Factors Impacting Entrepreneurial Intention: A Literature Review

Authors: Abir S. AL-Harrasi, Eyad B. AL-Zadjali, Zahran S. AL-Salti

Abstract:

Entrepreneurship has captured the attention of policy-makers, educators and researchers in the last few decades. It has been regarded as a main driver for economic growth, development and employment generation in many countries worldwide. However, scholars have not agreed on the key factors that impact entrepreneurial intention. This study attempts, through an extensive literature review, to provide a holistic view and a more comprehensive understanding of the key factors that lead university undergraduate students to become entrepreneurs. A systematic literature review is conducted and several scientific articles and reports have been examined. The results of this study indicate that there are four main sets of factors: the personality-traits factors, contextual factors, motivational factors, and personal background factors. This research will serve as a base for future studies and will have valuable implications for policy makers and educators.

Keywords: entrepreneurship, entrepreneurial intention, literature review, economic growth

Procedia PDF Downloads 270
2043 Design of Personal Job Recommendation Framework on Smartphone Platform

Authors: Chayaporn Kaensar

Abstract:

Recently, Job Recommender Systems have gained much attention in industries since they solve the problem of information overload on the recruiting website. Therefore, we proposed Extended Personalized Job System that has the capability of providing the appropriate jobs for job seeker and recommending some suitable information for them using Data Mining Techniques and Dynamic User Profile. On the other hands, company can also interact to the system for publishing and updating job information. This system have emerged and supported various platforms such as web application and android mobile application. In this paper, User profiles, Implicit User Action, User Feedback, and Clustering Techniques in WEKA libraries have gained attention and implemented for this application. In additions, open source tools like Yii Web Application Framework, Bootstrap Front End Framework and Android Mobile Technology were also applied.

Keywords: recommendation, user profile, data mining, web and mobile technology

Procedia PDF Downloads 300
2042 Development of a Real-Time Brain-Computer Interface for Interactive Robot Therapy: An Exploration of EEG and EMG Features during Hypnosis

Authors: Maryam Alimardani, Kazuo Hiraki

Abstract:

This study presents a framework for development of a new generation of therapy robots that can interact with users by monitoring their physiological and mental states. Here, we focused on one of the controversial methods of therapy, hypnotherapy. Hypnosis has shown to be useful in treatment of many clinical conditions. But, even for healthy people, it can be used as an effective technique for relaxation or enhancement of memory and concentration. Our aim is to develop a robot that collects information about user’s mental and physical states using electroencephalogram (EEG) and electromyography (EMG) signals and performs costeffective hypnosis at the comfort of user’s house. The presented framework consists of three main steps: (1) Find the EEG-correlates of mind state before, during, and after hypnosis and establish a cognitive model for state changes, (2) Develop a system that can track the changes in EEG and EMG activities in real time and determines if the user is ready for suggestion, and (3) Implement our system in a humanoid robot that will talk and conduct hypnosis on users based on their mental states. This paper presents a pilot study in regard to the first stage, detection of EEG and EMG features during hypnosis.

Keywords: hypnosis, EEG, robotherapy, brain-computer interface (BCI)

Procedia PDF Downloads 240
2041 Environmental Literacy of Teacher Educators in Colleges of Teacher Education in Israel

Authors: Tzipi Eshet

Abstract:

The importance of environmental education as part of a national strategy to promote the environment is recognized around the world. Lecturers at colleges of teacher education have considerable responsibility, directly and indirectly, for the environmental literacy of students who will end up teaching in the school system. This study examined whether lecturers in colleges of teacher education and teacher training in Israel, are able and willing to develop among the students, environmental literacy. Capability and readiness is assessed by evaluating the level of environmental literacy dimensions that include knowledge on environmental issues, positions related to the environmental agenda and "green" patterns of behavior in everyday life. The survey included 230 lecturers from 22 state colleges coming from various sectors (secular, religious, and Arab), from different academic fields and different personal backgrounds. Firstly, the results show that the higher the commitment to environmental issues, the lower the satisfaction with the current situation. In general, the respondents show positive environmental attitudes in all categories examined, they feel that they can personally influence responsible environmental behavior of others and are able to internalize environmental education in schools and colleges; they also report positive environmental behavior. There are no significant differences between teachers of different background characteristics when it comes to behavior patterns that generate personal income funds (e.g. returning bottles for deposit). Women show a more responsible environmental behavior than men. Jewish lecturers, in most categories, show more responsible behavior than Druze and Arab lecturers; however, when referring to positions, Arabs and Druze have a better sense in their ability to influence the environmental agenda. The Knowledge test, which included 15 questions, was mostly based on basic environmental issues. The average score was adequate - 83.6. Science lecturers' environmental literacy is higher than the other lecturers significantly. The larger the environmental knowledge base is, they are more environmental in their attitudes, and they feel more responsible toward the environment. It can be concluded from the research findings, that knowledge is a fundamental basis for developing environmental literacy. Environmental knowledge has a positive effect on the development of environmental commitment that is reflected in attitudes and behavior. This conclusion is probably also true of the general public. Hence, there is a great importance to the expansion of knowledge among the general public and teacher educators in particular on environmental. From the open questions in the survey, it is evident that most of the lecturers are interested in the subject and understand the need to integrate environmental issues in the colleges, either directly by teaching courses on the environment or indirectly by integrating environmental issues in different professions as well as asking the students to set an example (such as, avoid unnecessary printing, keeping the environment clean). The curriculum at colleges should include a variety of options for the development and enhancement of environmental literacy of student teachers, but first there must be a focus on bringing their teachers to a high literacy level so they can meet the difficult and important task they face.

Keywords: colleges of teacher education, environmental literacy, environmental education, teacher's teachers

Procedia PDF Downloads 268
2040 Investigation of Various Variabilities of Attitudes toward Teaching as a Profession Levels of Physical Education and Sports School Students

Authors: Turan Cetinkaya, Abdurrahman Kırtepe

Abstract:

The aim of this study is to determine the relation of the level attitudes toward teaching as a profession to various variables of the students in physical education and sports departments. 277 students who are studying at the departments of physical education and sports teaching, sports management and coaching in Ahi Evran University, College of Physical Education and Sports participated to the research. Personal information tool and teaching profession scale consisting 34 items were used as data collection tool in the research. Distribution, frequency, t test and anova test were used in comparison of the related data. As a result of statistical analysis, attitudes toward teaching as a profession levels do not differ according to gender, but significant differences were detected in the exercise regularly and department.

Keywords: teaching profession, attitude, physical education and sports students, university students

Procedia PDF Downloads 272
2039 Exploring the Motivations That Drive Paper Use in Clinical Practice Post-Electronic Health Record Adoption: A Nursing Perspective

Authors: Sinead Impey, Gaye Stephens, Lucy Hederman, Declan O'Sullivan

Abstract:

Continued paper use in the clinical area post-Electronic Health Record (EHR) adoption is regularly linked to hardware and software usability challenges. Although paper is used as a workaround to circumvent challenges, including limited availability of a computer, this perspective does not consider the important role paper, such as the nurses’ handover sheet, play in practice. The purpose of this study is to confirm the hypothesis that paper use post-EHR adoption continues as paper provides both a cognitive tool (that assists with workflow) and a compensation tool (to circumvent usability challenges). Distinguishing the different motivations for continued paper-use could assist future evaluations of electronic record systems. Methods: Qualitative data were collected from three clinical care environments (ICU, general ward and specialist day-care) who used an electronic record for at least 12 months. Data were collected through semi-structured interviews with 22 nurses. Data were transcribed, themes extracted using an inductive bottom-up coding approach and a thematic index constructed. Findings: All nurses interviewed continued to use paper post-EHR adoption. While two distinct motivations for paper use post-EHR adoption were confirmed by the data - paper as a cognitive tool and paper as a compensation tool - further finding was that there was an overlap between the two uses. That is, paper used as a compensation tool could also be adapted to function as a cognitive aid due to its nature (easy to access and annotate) or vice versa. Rather than present paper persistence as having two distinctive motivations, it is more useful to describe it as presenting on a continuum with compensation tool and cognitive tool at either pole. Paper as a cognitive tool referred to pages such as nurses’ handover sheet. These did not form part of the patient’s record, although information could be transcribed from one to the other. Findings suggest that although the patient record was digitised, handover sheets did not fall within this remit. These personal pages continued to be useful post-EHR adoption for capturing personal notes or patient information and so continued to be incorporated into the nurses’ work. Comparatively, the paper used as a compensation tool, such as pre-printed care plans which were stored in the patient's record, appears to have been instigated in reaction to usability challenges. In these instances, it is expected that paper use could reduce or cease when the underlying problem is addressed. There is a danger that as paper affords nurses a temporary information platform that is mobile, easy to access and annotate, its use could become embedded in clinical practice. Conclusion: Paper presents a utility to nursing, either as a cognitive or compensation tool or combination of both. By fully understanding its utility and nuances, organisations can avoid evaluating all incidences of paper use (post-EHR adoption) as arising from usability challenges. Instead, suitable remedies for paper-persistence can be targeted at the root cause.

Keywords: cognitive tool, compensation tool, electronic record, handover sheet, nurse, paper persistence

Procedia PDF Downloads 418
2038 Improvements and Implementation Solutions to Reduce the Computational Load for Traffic Situational Awareness with Alerts (TSAA)

Authors: Salvatore Luongo, Carlo Luongo

Abstract:

This paper discusses the implementation solutions to reduce the computational load for the Traffic Situational Awareness with Alerts (TSAA) application, based on Automatic Dependent Surveillance-Broadcast (ADS-B) technology. In 2008, there were 23 total mid-air collisions involving general aviation fixed-wing aircraft, 6 of which were fatal leading to 21 fatalities. These collisions occurred during visual meteorological conditions, indicating the limitations of the see-and-avoid concept for mid-air collision avoidance as defined in the Federal Aviation Administration’s (FAA). The commercial aviation aircraft are already equipped with collision avoidance system called TCAS, which is based on classic transponder technology. This system dramatically reduced the number of mid-air collisions involving air transport aircraft. In general aviation, the same reduction in mid-air collisions has not occurred, so this reduction is the main objective of the TSAA application. The major difference between the original conflict detection application and the TSAA application is that the conflict detection is focused on preventing loss of separation in en-route environments. Instead TSAA is devoted to reducing the probability of mid-air collision in all phases of flight. The TSAA application increases the flight crew traffic situation awareness providing alerts of traffic that are detected in conflict with ownship in support of the see-and-avoid responsibility. The relevant effort has been spent in the design process and the code generation in order to maximize the efficiency and performances in terms of computational load and memory consumption reduction. The TSAA architecture is divided into two high-level systems: the “Threats database” and the “Conflict detector”. The first one receives the traffic data from ADS-B device and provides the memorization of the target’s data history. Conflict detector module estimates ownship and targets trajectories in order to perform the detection of possible future loss of separation between ownship and each target. Finally, the alerts are verified by additional conflict verification logic, in order to prevent possible undesirable behaviors of the alert flag. In order to reduce the computational load, a pre-check evaluation module is used. This pre-check is only a computational optimization, so the performances of the conflict detector system are not modified in terms of number of alerts detected. The pre-check module uses analytical trajectories propagation for both target and ownship. This allows major accuracy and avoids the step-by-step propagation, which requests major computational load. Furthermore, the pre-check permits to exclude the target that is certainly not a threat, using an analytical and efficient geometrical approach, in order to decrease the computational load for the following modules. This software improvement is not suggested by FAA documents, and so it is the main innovation of this work. The efficiency and efficacy of this enhancement are verified using fast-time and real-time simulations and by the execution on a real device in several FAA scenarios. The final implementation also permits the FAA software certification in compliance with DO-178B standard. The computational load reduction allows the installation of TSAA application also on devices with multiple applications and/or low capacity in terms of available memory and computational capabilities

Keywords: traffic situation awareness, general aviation, aircraft conflict detection, computational load reduction, implementation solutions, software certification

Procedia PDF Downloads 264
2037 Work Life Balance Strategies and Retention of Medical Professionals

Authors: Naseem M. Twaissi

Abstract:

Medical professionals play an important role in society, and in general, they care more about their patients than about their personal well-being. They need to take a professional approach to maintain a work-life balance. Through a collection of primary data from 1020 medical professionals and the application of relevant statistical tools, this paper explores the pressures on medical professionals with reference to their work-life balance. This study highlights how hospital management, in addition to economic reasons, needs to identify variables to enhance the work-life balance of medical professionals so that quality healthcare facilities may be provided to the citizens of Jordan. Results indicate that formulation and implementation of policies for enhancing work-life balance together with career and retention plans for medical professionals would enhance the performance of hospitals and the quality of health care in Jordan, leading to greater societal well-being.

Keywords: work life balance, job environment, job satisfaction, employee well-being, stress, hospital industry

Procedia PDF Downloads 127
2036 Variation of Lexical Choice and Changing Need of Identity Expression

Authors: Thapasya J., Rajesh Kumar

Abstract:

Language plays complex roles in society. The previous studies on language and society explain their interconnected, complementary and complex interactions and, those studies were primarily focused on the variations in the language. Variation being the fundamental nature of languages, the question of personal and social identity navigated through language variation and established that there is an interconnection between language variation and identity. This paper analyses the sociolinguistic variation in language at the lexical level and how the lexical choice of the speaker(s) affects in shaping their identity. It obtains primary data from the lexicon of the Mappila dialect of Malayalam spoken by the members of Mappila (Muslim) community of Kerala. The variation in the lexical choice is analysed by collecting data from the speech samples of 15 minutes from four different age groups of Mappila dialect speakers. Various contexts were analysed and the frequency of borrowed words in each instance is calculated to reach a conclusion on how the variation is happening in the speech community. The paper shows how the lexical choice of the speakers could be socially motivated and involve in shaping and changing identities. Lexical items or vocabulary clearly signal the group identity and personal identity. Mappila dialect of Malayalam was rich in frequent use of borrowed words from Arabic, Persian and Urdu. There was a deliberate attempt to show their identity as a Mappila community member, which was derived from the socio-political situation during those days. This made a clear variation between the Mappila dialect and other dialects of Malayalam at the surface level, which was motivated to create and establish the identity of a person as the member of Mappila community. Historically, these kinds of linguistic variation were highly motivated because of the socio-political factors and, intertwined with the historical facts about the origin and spread of Islamism in the region; people from the Mappila community highly motivated to project their identity as a Mappila because of the social insecurities they had to face before accepting that religion. Thus the deliberate inclusion of Arabic, Persian and Urdu words in their speech helped in showing their identity. However, the socio-political situations and factors at the origin of Mappila community have been changed over a period of time. The social motivation for indicating their identity as a Mappila no longer exist and thus the frequency of borrowed words from Arabic, Persian and Urdu have been reduced from their speech. Apart from the religious terms, the borrowed words from these languages are very few at present. The analysis is carried out by the changes in the language of the people according to their age and found to have significant variations between generations and literacy plays a major role in this variation process. The need of projecting a specific identity of an individual would vary according to the change in the socio-political scenario and a variation in language can shape the identity in order to go with the varying socio-political situation in any language.

Keywords: borrowings, dialect, identity, lexical choice, literacy, variation

Procedia PDF Downloads 224
2035 Inspection of Railway Track Fastening Elements Using Artificial Vision

Authors: Abdelkrim Belhaoua, Jean-Pierre Radoux

Abstract:

In France, the railway network is one of the main transport infrastructures and is the second largest European network. Therefore, railway inspection is an important task in railway maintenance to ensure safety for passengers using significant means in personal and technical facilities. Artificial vision has recently been applied to several railway applications due to its potential to improve the efficiency and accuracy when analyzing large databases of acquired images. In this paper, we present a vision system able to detect fastening elements based on artificial vision approach. This system acquires railway images using a CCD camera installed under a control carriage. These images are stitched together before having processed. Experimental results are presented to show that the proposed method is robust for detection fasteners in a complex environment.

Keywords: computer vision, image processing, railway inspection, image stitching, fastener recognition, neural network

Procedia PDF Downloads 434
2034 DCASH: Dynamic Cache Synchronization Algorithm for Heterogeneous Reverse Y Synchronizing Mobile Database Systems

Authors: Gunasekaran Raja, Kottilingam Kottursamy, Rajakumar Arul, Ramkumar Jayaraman, Krithika Sairam, Lakshmi Ravi

Abstract:

The synchronization server maintains a dynamically changing cache, which contains the data items which were requested and collected by the mobile node from the server. The order and presence of tuples in the cache changes dynamically according to the frequency of updates performed on the data, by the server and client. To synchronize, the data which has been modified by client and the server at an instant are collected, batched together by the type of modification (insert/ update/ delete), and sorted according to their update frequencies. This ensures that the DCASH (Dynamic Cache Synchronization Algorithm for Heterogeneous Reverse Y synchronizing Mobile Database Systems) gives priority to the frequently accessed data with high usage. The optimal memory management algorithm is proposed to manage data items according to their frequency, theorems were written to show the current mobile data activity is reverse Y in nature and the experiments were tested with 2g and 3g networks for various mobile devices to show the reduced response time and energy consumption.

Keywords: mobile databases, synchronization, cache, response time

Procedia PDF Downloads 381
2033 The Social Perception of National Security Risks: A Comparative Perspective

Authors: Nicula Valentin, Andrei Virginia

Abstract:

Nowadays, the individual plays a central role in the state’s architecture. This is why the subjective dimension of the security represents a key concept in risk assessment. The paper’s scope is to emphasize the discrepancy between expert and lay evaluations of national security hazards, which is caused by key factors like emotions, personal experience, knowledge and media. Therefore, we have chosen to apply, using these two different groups of respondents, the Q-sort method, which reveals individual beliefs, attitudes, preferences hidden behind the subjects’ own way of prioritizing the risks they are confronted with. Our study’s conclusions are meant to unveil significant indicators needed to be taken into consideration by a state’s leadership in order to understand the social perception of national security hazards, to communicate better with the public opinion and prevent or mitigate the overestimation of the severity or probability of these dangers.

Keywords: risk perception, Q-sort method, national security hazards, individual beliefs

Procedia PDF Downloads 291
2032 Exploring the Visual Roots of Classical Rhetoric and Its Implication for Gender Politics: Reflection upon Roman Rhetoric from a Bakhtin's Perspective

Authors: Hsiao-Yung Wang

Abstract:

This study aims to explore the visual roots of classical rhetoric and its implication for gender politics by the constant reference to Mikhail Bakhtin’s theory of novelist time. First, it attempts to clarify the argument that “visuality always has been integral to rhetorical consciousness” by critically re-reading the rhetorical theories of roman rhetorician such as Cicero and Quintilian. Thereby, the vague clues of visuality would be realized from the so-called ‘five canons of rhetoric’ (invention, arrangement, style, memory, and delivery), which originally deriving from verbal and spoken rhetorical tradition. Drawing on Mikhail Bakhtin’s elaboration of novelist time in contrast to epic time, it addresses the specific timeline inherent in the dynamics of visual rhetoric involves the refusing the ‘absolute past’, the focusing on unfinalized contemporary reality, and the expecting for open future. Taking the primary visions of Taipei LGBT parade over the past 13 years as research cases, it mentions that visuality could not only activate the rhetorical functions of classical rhetoric, but also inspire gender politics in the contemporary era.

Keywords: classical rhetoric, gender politics, Mikhail Bakhtin, visuality

Procedia PDF Downloads 361