Search results for: PASS online server
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3371

Search results for: PASS online server

2111 Computer Assisted Learning Module (CALM) for Consumer Electronics Servicing

Authors: Edicio M. Faller

Abstract:

The use of technology in the delivery of teaching and learning is vital nowadays especially in education. Computer Assisted Learning Module (CALM) software is the use of computer in the delivery of instruction with a tailored fit program intended for a specific lesson or a set of topics. The CALM software developed in this study is intended to supplement the traditional teaching methods in technical-vocational (TECH-VOC) instruction specifically the Consumer Electronics Servicing course. There are three specific objectives of this study. First is to create a learning enhancement and review materials on the selected lessons. Second, is to computerize the end-of-chapter quizzes. Third, is to generate a computerized mock exam and summative assessment. In order to obtain the objectives of the study the researcher adopted the Agile Model where the development of the study undergoes iterative and incremental process of the Software Development Life Cycle. The study conducted an acceptance testing using a survey questionnaire to evaluate the CALM software. The results showed that CALM software was generally interpreted as very satisfactory. To further improve the CALM software it is recommended that the program be updated, enhanced and lastly, be converted from stand-alone to a client/server architecture.

Keywords: computer assisted learning module, software development life cycle, computerized mock exam, consumer electronics servicing

Procedia PDF Downloads 393
2110 Understanding the Impact of Ephemerality and Mobility on Social Media News: A Content Analysis of News on Snapchat

Authors: Chelsea Peterson-Salahuddin

Abstract:

Over the past decade, news outlets have increasingly used social media as a means to create and distribute news content to audiences. Ephemerality, the transitory nature of media, and mobility, media viewing on mobile technologies, are two increasingly salient attributes of social media content; yet little is known about how these features influence news selection practices of news outlets when distributing news via social media. To account for this gap, this study examines the influences of ephemerality and mobility on social media news content on the social media application Snapchat, in order to understand how these qualities of digital media influence and shape news content. Findings from this study suggest that understandings of ephemerality and mobility play a key role in influencing social media news. This paper suggests that as these factors become increasingly salient in our dominant news viewing environments, being able to understand how they manifest themselves in online news reporting practices is critical for both scholars and practitioners of news as they aim to understand what 'newsworthiness' means in the current, digital age. Findings from this study also enhance our current understandings of how the technological affordances of online and digital media platforms play a key role in shaping the kinds being produced and what information is being prioritized and highlighted in our contemporary news media environment. This is especially important in our current era where new mediums and technologies for news dissemination are continuously arising, and reorienting our understandings of what is considered ‘news'. As a key site of mass communication, discourse, and stories highlighted in the news do critical work in defining culture and ideology. Thus, better understanding the contours of news in our contemporary moment is critical in understanding cultural norms and meaning-making.

Keywords: content analysis, ephemerality, mobile communication, social media news

Procedia PDF Downloads 136
2109 Student Diversity in Higher Education: The Impact of Digital Elements on Student Learning Behavior and Subject-Specific Preferences

Authors: Pia Kastl

Abstract:

By combining face-to-face sessions with digital selflearning units, the learning process can be enhanced and learning success improved. Potentials of blended learning are the flexibility and possibility to get in touch with lecturers and fellow students face-toface. It also offers the opportunity to individualize and self-regulate the learning process. Aim of this article is to analyse how different learning environments affect students’ learning behavior and how digital tools can be used effectively. The analysis also considers the extent to which the field of study affects the students’ preferences. Semi-structured interviews were conducted with students from different disciplines at two German universities (N= 60). The questions addressed satisfaction and perception of online, faceto-face and blended learning courses. In addition, suggestions for improving learning experience and the use of digital tools in the different learning environments were surveyed. The results show that being present on campus has a positive impact on learning success and online teaching facilitates flexible learning. Blended learning can combine the respective benefits, although one challenge is to keep the time investment within reasonable limits. The use of digital tools differs depending on the subject. Medical students are willing to use digital tools to improve their learning success and voluntarily invest more time. Students of the humanities and social sciences, on the other hand, are reluctant to invest additional time. They do not see extra study material as an additional benefit their learning success. This study illustrates how these heterogenous demands on learning environments can be met. In addition, potential for improvement will be identified in order to foster both learning process and learning success. Learning environments can be meaningfully enriched with digital elements to address student diversity in higher education.

Keywords: blended learning, higher education, diversity, learning styles

Procedia PDF Downloads 69
2108 Social Media Impact on Professional and Profile Level of Dental Students in Saudi Arabia

Authors: Aliyaa Zaidan, Rayan Bahabri

Abstract:

The twenty-first century revealed an accelerating change and intensifying complexity of communication technology. Online social networking engines have gained astounding recognition worldwide. The influence of those social media platforms on dentistry and dental students is not well established. Therefore, this study aimed to evaluate the impact of using social media on professional and profile level among dental students in Saudi Arabia. A cross-sectional study developed via online questionnaire concerning on social media usage and its effect on professional and profile level of dental students and dental interns from several universities in Saudi Arabia. A total of 296 dental students and dental interns in Saudi Arabia responded to the questionnaire. Ninety-eight percent of the participants usually use the social media on a regular basis. Most social media sites used among the participants were Snapchat, Instagram, and YouTube by 85%, 81%, 77% respectively. Forty-one percent of the participants agreed that using social media in the dental field is a necessity nowadays. Thirty-eight percent of participants agreed that using social media is an easy way to gain a reliable knowledge, while 43% agreed that social media will improve the quality of healthcare. Furthermore, 65% of the students deemed using social media for academic purposes will improve their performance. Fifty-five percent of the respondents often use social media tools to obtain information about subject or procedures related to the dental field. Regarding profile reputation of dental students, 40% of the respondents agreed that their profile information published on social networking websites, could be used by others to judge their level of professionalism. Male and female dental students both agreed that their reputation would be adversely affected by 37%,63%, respectively, if their social networking activity were viewed by members of the public. The discrepancy among student levels reveals that social media profile positively influence the acceptance to postgraduate programs (P= 0.01).

Keywords: dental students, professional, reputation, social media

Procedia PDF Downloads 211
2107 Behavior of Engineering Students in Kuwait University

Authors: Mohammed A. Al-Ajmi, Reem S. Al-Kandari

Abstract:

This study is concerned with the behavior of engineering students in Kuwait University which became a concern due to the global issues of education in all levels. A survey has been conducted to identify academic and societal issues that affect the engineering student performance through. The study is drawing major conclusions with regard to private tutoring and the online availability of textbooks’ solution manuals.

Keywords: solution manual, engineering, textbook, ethics

Procedia PDF Downloads 491
2106 Russia's War Memory: How Tolstoy Uses Homeric Epic to Reconstruct History

Authors: Svetlana Yefimenko

Abstract:

Situated within the fields of Russian literature, Russian history, and classics, this paper investigates the early writing of Leo Tolstoy in terms of his reception and appropriation of Homeric epic for the purposes of reconstructing early 19th-century Russian history. The epic mode, specifically its Homeric variation, was deployed in Tolstoy’s writing on his military experience in the Crimean War to legitimize a version of historical events which positioned Russian soldiers as the inheritors of ancient Greek heroism. With reference to Tolstoy’s oft-neglected Sevastopol’ Sketches, and the short stories The Raid, The Wood-Felling, and Two Hussars, this paper examines how such narratives pass from communicative memory into collective memory both in the Homeric epics and in Tolstoy’s reworking of them, particularly on the literary effects produced when the distance between communicative and collective memory collapses. Within a song culture, epic song functions as memory, and this paper shows how, by modeling his early work on epic, Tolstoy produced texts which act as memory itself, thereby becoming the authoritative version of Russia’s past in the Crimea, often contradicting historical facts.

Keywords: classical reception, collective memory, Russian history, Russian literature

Procedia PDF Downloads 132
2105 The Correlation Between Self-Talk and COVID-19

Authors: Abigail Vallance

Abstract:

Current research shows a correlation between declining mental health in the United States and the effect of COVID-19 on young adults and adolescents. Anxiety and depression are the two most common psychiatric illnesses, which are also the leading impediments to academic success. Spending six hours a day or more using computers is associated with higher risks of depression, with this time constraint pervasive even in present-day academia. Along with many hours on the computer, common issues COVID-19 had on students’ academic performance during online school included technical difficulties, poor support services, and difficulty adapting to online learning. Given the volume of requirements with unrealistic deadlines, and despite experiencing COVID-19, students showed an increase in their levels of anxiety. Besides the prevalent effect of COVID-19 on mental health, many studies show a correlation between mental health, COVID-19, academia, and sports performance. Academic research showed that negative self-talk, in relation to one’s self-efficacy, correlated with negative academic performance. Research showed that students who reported negative self-efficacy when test-taking led to negative test results. Furthermore, in sports performance, negative effects were found when athletes engage in negative self-talk. Overall, motivational self-talk, by oneself and through teammates and coaches, correlated with better performance than regular self-talk in sports. In relation to sports performance, the COVID-19 pandemic canceled complete sports seasons for millions of adolescents across the country. Many student-athletes use their sport to release emotions and escape from their mental health, but this was taken away. The purpose of this study is to address the current increase in mental health diagnoses in adolescents, including suicide rates after the COVID-19 pandemic began in 2020.This literature analysis is actively being studied.

Keywords: self-talk, COVID-19, mental health, adolescents

Procedia PDF Downloads 56
2104 Physical Activity Rates and Motivational Profiles of Adolescents While Keeping a Daily Leisure-Time Physical Activity Record

Authors: Matt Fullmer, Carol Wilkinson, Keven Prusak, Dennis Eggett, Todd Pennington

Abstract:

Obesity and chronic health issues are linked to physical inactivity. Physical education (PE) programs in school can play a major role in combating these health-related issues. This study focused on supporting competence through keeping a leisure-time physical activity (LTPA) record as part of PE. Keeping a daily LTPA record may be an effective intervention helping students feel more competent toward exercise, and thus, self-determined (within the context of self-determination theory) to exercise. Little is known about the relationship between daily LTPA records and perceived competence, motivational profiles, and LTPA levels of students enrolled in PE. This study examined the relationship between keeping a daily, online LTPA record and adolescent (a) motivational profiles toward LTPA, (b) perceived competence toward LTPA, and (c) LTPA behaviors. Secondary students (N = 124) in physical education classes completed a baseline questionnaire which consisted of the Behavioural Regulation in Exercise Questionnaire–2, the Perceived Competence Scale, and the Godin Leisure-Time Exercise Questionnaire. For three weeks, the students were assigned to keep the Presidential Active Lifestyle Award Challenge (PALAC) as their online LTPA record. They completed the questionnaire after each week. A 2 (gender) x 4 (trials) repeated measures ANCOVA examined the relationships between recording compliance and motivation, perceived competence, and physical activity. Results showed that recording compliance was not a significant predictor of perceived competence to participate in LTPA. Examining motivational factors, a significant interaction between recording compliance and introjected regulation was found. The more students recorded the less motivated they were by guilt or obligation to exercise in their leisure-time. Also, a significant interaction was found between recording compliance and intrinsic regulation, indicating that the more students recorded the more intrinsically motivated they were to exercise in their leisure-time. Lastly, there was a significant interaction between recording compliance and LTPA. As students kept the LTPA record, girls’ LTPA levels significantly decreased and boys’ LTPA levels significantly increased. The key findings are that, as implemented in this study: a) the lack of PALAC compliance suggests that daily LTPA records may NOT be the most effective intervention for this population, b) keeping a daily LTPA record did NOT help students feel more competent to exercise in their leisure-time, c) a daily LTPA record may help students move towards being more self-determined in their feelings towards LTPA, and d) the outcome of keeping a LTPA record on LTPA behavior is statistically significant, although actual differences may not be practically important.

Keywords: behavioural regulation in exercise questionnaire–2, Godin leisure–time exercise questionnaire, online physical activity log, perceived competence scale, self-determination theory

Procedia PDF Downloads 340
2103 Being Chinese Online: Discursive (Re)Production of Internet-Mediated Chinese National Identity

Authors: Zhiwei Wang

Abstract:

Much emphasis has been placed on the political dimension of digitised Chinese national(ist) discourses and their embodied national identities, which neglects other important dimensions constitutive of their discursive nature. A further investigation into how Chinese national(ist) discourses are daily (re)shaped online by diverse socio-political actors (especially ordinary users) is crucial, which can contribute to not only deeper understandings of Chinese national sentiments on China’s Internet beyond the excessive focus on their passionate, political-charged facet but also richer insights into the socio-technical ecology of the contemporary Chinese digital (and physical) world. This research adopts an ethnographic methodology, by which ‘fieldsites’ are Sina Weibo and bilibili. The primary data collection method is virtual ethnographic observation on everyday national(ist) discussions on both platforms. If data obtained via observations do not suffice to answer research questions, in-depth online qualitative interviews with ‘key actors’ identified from those observations in discursively (re)producing Chinese national identity on each ‘fieldsite’ will be conducted, to complement data gathered through the first method. Critical discourse analysis is employed to analyse data. During the process of data coding, NVivo is utilised. From November 2021 to December 2022, 35 weeks’ digital ethnographic observations have been conducted, with 35 sets of fieldnotes obtained. The strategy adopted for the initial stage of observations was keyword searching, which means typing into the search box on Sina Weibo and bilibili any keywords related to China as a nation and then observing the search results. Throughout 35 weeks’ online ethnographic observations, six keywords have been employed on Sina Weibo and two keywords on bilibili. For 35 weeks’ observations, textual content created by ordinary users have been concentrated much upon. Based on the fieldnotes of the first week’s observations, multifarious national(ist) discourses on Sina Weibo and bilibili have been found, targeted both at national ‘Others’ and ‘Us’, both on the historical and real-world dimension, both aligning with and differing from or even conflicting with official discourses, both direct national(ist) expressions and articulations of sentiments in the name of presentation of national(ist) attachments but for other purposes. Second, Sina Weibo and bilibili users have agency in interpreting and deploying concrete national(ist) discourses despite the leading role played by the government and the two platforms in deciding on the basic framework of national expressions. Besides, there are also disputes and even quarrels between users in terms of explanations for concrete components of ‘nation-ness’ and (in)direct dissent to officially defined ‘mainstream’ discourses to some extent, though often expressed much more mundanely, discursively and playfully. Third, the (re)production process of national(ist) discourses on Sina Weibo and bilibili depends upon not only technical affordances and limitations of the two sites but also, to a larger degree, some established socio-political mechanisms and conventions in the offline China, e.g., the authorities’ acquiescence of citizens’ freedom in understanding and explaining concrete elements of national discourses while setting the basic framework of national narratives to the extent that citizens’ own national(ist) expressions do not reach political bottom lines and develop into mobilising power to shake social stability.

Keywords: national identity, national(ist) discourse(s), everyday nationhood/nationalism, Chinese nationalism, digital nationalism

Procedia PDF Downloads 90
2102 CanVis: Towards a Web Platform for Cancer Progression Tree Analysis

Authors: Michael Aupetit, Mahmoud Al-ismail, Khaled Mohamed

Abstract:

Cancer is a major public health problem all over the world. Breast cancer has the highest incidence rate over all cancers for women in Qatar making its study a top priority of the country. Human cancer is a dynamic disease that develops over an extended period through the accumulation of a series of genetic alterations. A Darwinian process drives the tumor cells toward higher malignancy growing the branches of a progression tree in the space of genes expression. Although it is not possible to track these genetic alterations dynamically for one patient, it is possible to reconstruct the progression tree from the aggregation of thousands of tumor cells’ genetic profiles from thousands of different patients at different stages of the disease. Analyzing the progression tree is a way to detect pivotal molecular events that drive the malignant evolution and to provide a guide for the development of cancer diagnostics, prognostics and targeted therapeutics. In this work we present the development of a Visual Analytic web platform CanVis enabling users to upload gene-expression data and analyze their progression tree. The server computes the progression tree based on state-of-the-art techniques and allows an interactive visual exploration of this tree and the gene-expression data along its branching structure helping to discover potential driver genes.

Keywords: breast cancer, progression tree, visual analytics, web platform

Procedia PDF Downloads 416
2101 Clonal Evaluation of Malignant Mesothelioma

Authors: Sabahattin Comertpay, Sandra Pastorino, Rosanna Mezzapelle, Mika Tanji, Oriana Strianese, Andrea Napolitano, Tracey Weigel, Joseph Friedberg, Paul Sugarbaker, Thomas Krausz, Ena Wang, Amy Powers, Giovanni Gaudino, Harvey I. Pass, Fatmagul Ozcelik, Barbara L. Parsons, Haining Yang, Michele Carbone

Abstract:

Tumors are thought to be monoclonal in origin. This paradigm arose decades ago, primarily from the study of hematopoietic malignancies and sarcomas. The clonal origin of malignant mesothelioma (MM), a deadly cancer resistant to the current therapies, has not been investigated. Examination of the pleura from patients with MM shows often the presence of multiple pleural nodules, raising the question of whether they represent independent or metastatic growth processes. To investigate the clonality patterns of MM, we used the HUMARA (Human Androgen Receptor) assay to examine 14 sporadic and 2 familial Malignant Mesotheliomas (MM). Of 16 specimens studied, 15 were informative and 14/15 revealed two electrophoretically distinct methylated HUMARA alleles, indicating a polyclonal origin for these tumors. This discovery has important clinical implications, because an accurate assessment of tumor clonality is key to the design of novel molecular strategies for the treatment of MM.

Keywords: malignant mesothelioma, clonal origin, HUMARA, sarcomas

Procedia PDF Downloads 458
2100 Relationship Between Reading Comprehension and Achievement in Science Among Grade Eleven Bilingual Students in a Secondary School, Thailand

Authors: Simon Mauma Efange

Abstract:

The main aims of this research were to describe, in co-relational terms, the relationship, if any, between reading comprehension and academic achievement in science studied at the secondary level and, secondly, to find out possible trends in gender differences, such as whether boys would perform better than girls or vice versa. This research employed a quantitative design. Two kinds of instruments were employed: the Oxford Online Placement Test and the Local Assessment System Test. The Oxford Online Placement Test assesses students' English level quickly and easily. The results of these tests were subjected to statistical analysis using a special statistical software called SPSS. Statistical tools such as mean, standard deviation, percentages, frequencies, t-tests, and Pearson’s coefficient of correlation were used for the analysis of the results. Results of the t-test showed that the means are significantly different. Calculating the p-value revealed that the results were extremely statistically significant at p <.05. The value of r (Pearson correlation coefficient) was 0.2868. Although technically there is a positive correlation, the relationship between the variables is only weak (the closer the value is to zero, the weaker the relationship). However, in conclusion, calculations from the t-test using SPSS revealed that the results were statistically significant at p <.05, confirming a relationship between the two variables, and high scores in reading will give rise to slightly high scores in science. The research also revealed that having a high score in reading comprehension doesn’t necessarily mean having a high score in science or vice versa. Female subjects performed much better than male subjects in both tests, which is in line with the literature reviewed for this research.

Keywords: achievement in science, achievement in English, and bilingual students, relationship

Procedia PDF Downloads 48
2099 The Analysis of Gizmos Online Program as Mathematics Diagnostic Program: A Story from an Indonesian Private School

Authors: Shofiayuningtyas Luftiani

Abstract:

Some private schools in Indonesia started integrating the online program Gizmos in the teaching-learning process. Gizmos was developed to supplement the existing curriculum by integrating it into the instructional programs. The program has some features using an inquiry-based simulation, in which students conduct exploration by using a worksheet while teachers use the teacher guidelines to direct and assess students’ performance In this study, the discussion about Gizmos highlights its features as the assessment media of mathematics learning for secondary school students. The discussion is based on the case study and literature review from the Indonesian context. The purpose of applying Gizmos as an assessment media refers to the diagnostic assessment. As a part of the diagnostic assessment, the teachers review the student exploration sheet, analyze particularly in the students’ difficulties and consider findings in planning future learning process. This assessment becomes important since the teacher needs the data about students’ persistent weaknesses. Additionally, this program also helps to build student’ understanding by its interactive simulation. Currently, the assessment over-emphasizes the students’ answers in the worksheet based on the provided answer keys while students perform their skill in translating the question, doing the simulation and answering the question. Whereas, the assessment should involve the multiple perspectives and sources of students’ performance since teacher should adjust the instructional programs with the complexity of students’ learning needs and styles. Consequently, the approach to improving the assessment components is selected to challenge the current assessment. The purpose of this challenge is to involve not only the cognitive diagnosis but also the analysis of skills and error. Concerning the selected setting for this diagnostic assessment that develops the combination of cognitive diagnosis, skills analysis and error analysis, the teachers should create an assessment rubric. The rubric plays the important role as the guide to provide a set of criteria for the assessment. Without the precise rubric, the teacher potentially ineffectively documents and follows up the data about students at risk of failure. Furthermore, the teachers who employ the program of Gizmos as the diagnostic assessment might encounter some obstacles. Based on the condition of assessment in the selected setting, the obstacles involve the time constrain, the reluctance of higher teaching burden and the students’ behavior. Consequently, the teacher who chooses the Gizmos with those approaches has to plan, implement and evaluate the assessment. The main point of this assessment is not in the result of students’ worksheet. However, the diagnostic assessment has the two-stage process; the process to prompt and effectively follow-up both individual weaknesses and those of the learning process. Ultimately, the discussion of Gizmos as the media of the diagnostic assessment refers to the effort to improve the mathematical learning process.

Keywords: diagnostic assessment, error analysis, Gizmos online program, skills analysis

Procedia PDF Downloads 182
2098 Thermophysical and Heat Transfer Performance of Covalent and Noncovalent Functionalized Graphene Nanoplatelet-Based Water Nanofluids in an Annular Heat Exchanger

Authors: Hamed K. Arzani, Ahmad Amiri, Hamid K. Arzani, Salim Newaz Kazi, Ahmad Badarudin

Abstract:

The new design of heat exchangers utilizing an annular distributor opens a new gateway for realizing higher energy optimization. To realize this goal, graphene nanoplatelet-based water nanofluids with promising thermophysical properties were synthesized in the presence of covalent and noncovalent functionalization. Thermal conductivity, density, viscosity and specific heat capacity were investigated and employed as a raw data for ANSYS-Fluent to be used in two-phase approach. After validation of obtained results by analytical equations, two special parameters of convective heat transfer coefficient and pressure drop were investigated. The study followed by studying other heat transfer parameters of annular pass in the presence of graphene nanopletelesbased water nanofluids at different weight concentrations, input powers and temperatures. As a result, heat transfer performance and friction loss are predicted for both synthesized nanofluids.

Keywords: heat transfer, nanofluid, turbulent flow, forced convection flow, graphene nanoplatelet

Procedia PDF Downloads 431
2097 Robust Data Image Watermarking for Data Security

Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan

Abstract:

In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.

Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms

Procedia PDF Downloads 515
2096 Intercultural Education and Changing Paradigms of Education: A Research Survey

Authors: Shalini Misra

Abstract:

The means and methods of education have been changing fast since the invention of internet. Both, ancient and modern education emphasized on the holistic development of students. But, a significant change has been observed in the 21st century learners. Online classes, intercultural and interdisciplinary education which were exceptions in the past, are setting new trends in the field of education. In the modern era, intercultural and interpersonal skills are of immense importance, not only for students but for everyone. It sets a platform for better understanding and deeper learning by ensuring the active participation and involvement of students belonging to different social and cultural backgrounds in various academic and non-academic pursuits. On October 31, 2015, on the occasion of 140th birth anniversary of Sardar Vallabhbhai Patel, Hon’ble Prime Minister of India, Narendra Modi announced a wonderful initiative, ‘Ek Bharat Shreshtha Bharat’ i.e. ‘One India Best India’ commonly known as ‘EBSB’. The program highlighted India’s rich culture and traditions. The objective of the program was to foster a better understanding and healthy relationship among Indian States. Under this program, a variety of subjects were covered like ‘Arts, Culture and Language’ .It was claimed to be a successful cultural exchange where students from diverse communities shared their thoughts and experiences with one another. Under this online cultural exchange program, the state of Uttarakhand was paired with the state of Karnataka in the year 2022. The present paper proposes to undertake a survey of a total of thirty secondary level students of Uttarakhand and the partner state Karnataka, who participated in this program with a purpose of learning and embracing new ideas and culture thus promoting intercultural education. It aims to study and examine the role of intercultural education in shifting and establishing new paradigms of education.

Keywords: education, intercultural, interpersonal, traditions, understanding

Procedia PDF Downloads 79
2095 Study on Resource Allocation of Cloud Operating System Based on Multi-Tenant Data Resource Sharing Technology

Authors: Lin Yunuo, Seow Xing Quan, Burra Venkata Durga Kumar

Abstract:

In this modern era, the cloud operating system is the world trend applied in various industries such as business, healthy, etc. In order to deal with the large capacity of requirements in cloud computing, research come up with multi-tenant cloud computing to maximize the benefits of server providers and clients. However, there are still issues in multi-tenant cloud computing especially regarding resource allocation. Issues such as inefficient resource utilization, large latency, lack of scalability and elasticity and poor data isolation had caused inefficient resource allocation in multi-tenant cloud computing. Without a doubt, these issues prevent multitenancy reaches its best condition. In fact, there are multiple studies conducted to determine the optimal resource allocation to solve these problems these days. This article will briefly introduce the cloud operating system, Multi-tenant cloud computing and resource allocation in cloud computing. It then discusses resource allocation in multi-tenant cloud computing and the current challenges it faces. According to the issue ‘ineffective resource utilization’, we will discuss an efficient dynamic scheduling technique for multitenancy, namely Multi-tenant Dynamic Resource Scheduling Model (MTDRSM). Moreover, there also have some recommendations to improve the shortcoming of this model in this paper’s final section.

Keywords: cloud computing, cloud operation system, multitenancy, resource allocation, utilization of cloud resources

Procedia PDF Downloads 84
2094 Using Surface Entropy Reduction to Improve the Crystallization Properties of a Recombinant Antibody Fragment RNA Crystallization Chaperone

Authors: Christina Roman, Deepak Koirala, Joseph A. Piccirilli

Abstract:

Phage displaying synthetic Fab libraries have been used to obtain Fabs that bind to specific RNA targets with high affinity and specificity. These Fabs have been demonstrated to facilitate RNA crystallization. However, the antibody framework used in the construction of these phage display libraries contains numerous bulky, flexible, and charged residues, which facilitate solubility and hinder aggregation. These residues can interfere with crystallization due to the entropic cost associated with burying them within crystal contacts. To systematically reduce the surface entropy of the Fabs and improve their crystallization properties, a protein engineering strategy termed surface entropy reduction (SER) is being applied to the Fab framework. In this approach, high entropy residues are mutated to smaller ones such as alanine or serine. Focusing initially on Fab BL3-6, which binds an RNA AAACA pentaloop with 20nM affinity, the SER P server (http://services.mbi.ucla.edu/SER/) was used and analysis was performed on existing RNA-Fab BL3-6 co-crystal structures. From this analysis twelve surface entropy reduced mutants were designed. These SER mutants were expressed and are now being measured for their crystallization and diffraction performance with various RNA targets. So far, one mutant has generated 3.02 angstrom diffraction with the yjdF riboswitch RNA. Ultimately, the most productive mutations will be combined into a new Fab framework to be used in a optimized phage displayed Fab library.

Keywords: antibody fragment, crystallography, RNA, surface entropy reduction

Procedia PDF Downloads 194
2093 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 102
2092 Synthetic Method of Contextual Knowledge Extraction

Authors: Olga Kononova, Sergey Lyapin

Abstract:

Global information society requirements are transparency and reliability of data, as well as ability to manage information resources independently; particularly to search, to analyze, to evaluate information, thereby obtaining new expertise. Moreover, it is satisfying the society information needs that increases the efficiency of the enterprise management and public administration. The study of structurally organized thematic and semantic contexts of different types, automatically extracted from unstructured data, is one of the important tasks for the application of information technologies in education, science, culture, governance and business. The objectives of this study are the contextual knowledge typologization, selection or creation of effective tools for extracting and analyzing contextual knowledge. Explication of various kinds and forms of the contextual knowledge involves the development and use full-text search information systems. For the implementation purposes, the authors use an e-library 'Humanitariana' services such as the contextual search, different types of queries (paragraph-oriented query, frequency-ranked query), automatic extraction of knowledge from the scientific texts. The multifunctional e-library «Humanitariana» is realized in the Internet-architecture in WWS-configuration (Web-browser / Web-server / SQL-server). Advantage of use 'Humanitariana' is in the possibility of combining the resources of several organizations. Scholars and research groups may work in a local network mode and in distributed IT environments with ability to appeal to resources of any participating organizations servers. Paper discusses some specific cases of the contextual knowledge explication with the use of the e-library services and focuses on possibilities of new types of the contextual knowledge. Experimental research base are science texts about 'e-government' and 'computer games'. An analysis of the subject-themed texts trends allowed to propose the content analysis methodology, that combines a full-text search with automatic construction of 'terminogramma' and expert analysis of the selected contexts. 'Terminogramma' is made out as a table that contains a column with a frequency-ranked list of words (nouns), as well as columns with an indication of the absolute frequency (number) and the relative frequency of occurrence of the word (in %% ppm). The analysis of 'e-government' materials showed, that the state takes a dominant position in the processes of the electronic interaction between the authorities and society in modern Russia. The media credited the main role in these processes to the government, which provided public services through specialized portals. Factor analysis revealed two factors statistically describing the used terms: human interaction (the user) and the state (government, processes organizer); interaction management (public officer, processes performer) and technology (infrastructure). Isolation of these factors will lead to changes in the model of electronic interaction between government and society. In this study, the dominant social problems and the prevalence of different categories of subjects of computer gaming in science papers from 2005 to 2015 were identified. Therefore, there is an evident identification of several types of contextual knowledge: micro context; macro context; dynamic context; thematic collection of queries (interactive contextual knowledge expanding a composition of e-library information resources); multimodal context (functional integration of iconographic and full-text resources through hybrid quasi-semantic algorithm of search). Further studies can be pursued both in terms of expanding the resource base on which they are held, and in terms of the development of appropriate tools.

Keywords: contextual knowledge, contextual search, e-library services, frequency-ranked query, paragraph-oriented query, technologies of the contextual knowledge extraction

Procedia PDF Downloads 359
2091 Mining the Proteome of Fusobacterium nucleatum for Potential Therapeutics Discovery

Authors: Abdul Musaweer Habib, Habibul Hasan Mazumder, Saiful Islam, Sohel Sikder, Omar Faruk Sikder

Abstract:

The plethora of genome sequence information of bacteria in recent times has ushered in many novel strategies for antibacterial drug discovery and facilitated medical science to take up the challenge of the increasing resistance of pathogenic bacteria to current antibiotics. In this study, we adopted subtractive genomics approach to analyze the whole genome sequence of the Fusobacterium nucleatum, a human oral pathogen having association with colorectal cancer. Our study divulged 1499 proteins of Fusobacterium nucleatum, which has no homolog in human genome. These proteins were subjected to screening further by using the Database of Essential Genes (DEG) that resulted in the identification of 32 vitally important proteins for the bacterium. Subsequent analysis of the identified pivotal proteins, using the KEGG Automated Annotation Server (KAAS) resulted in sorting 3 key enzymes of F. nucleatum that may be good candidates as potential drug targets, since they are unique for the bacterium and absent in humans. In addition, we have demonstrated the 3-D structure of these three proteins. Finally, determination of ligand binding sites of the key proteins as well as screening for functional inhibitors that best fitted with the ligands sites were conducted to discover effective novel therapeutic compounds against Fusobacterium nucleatum.

Keywords: colorectal cancer, drug target, Fusobacterium nucleatum, homology modeling, ligands

Procedia PDF Downloads 388
2090 Challenges to Developing a Trans-European Programme for Health Professionals to Recognize and Respond to Survivors of Domestic Violence and Abuse

Authors: June Keeling, Christina Athanasiades, Vaiva Hendrixson, Delyth Wyndham

Abstract:

Recognition and education in violence, abuse, and neglect for medical and healthcare practitioners (REVAMP) is a trans-European project aiming to introduce a training programme that has been specifically developed by partners across seven European countries to meet the needs of medical and healthcare practitioners. Amalgamating the knowledge and experience of clinicians, researchers, and educators from interdisciplinary and multi-professional backgrounds, REVAMP has tackled the under-resourced and underdeveloped area of domestic violence and abuse. The team designed an online training programme to support medical and healthcare practitioners to recognise and respond appropriately to survivors of domestic violence and abuse at their point of contact with a health provider. The REVAMP partner countries include Europe: France, Lithuania, Germany, Greece, Iceland, Norway, and the UK. The training is delivered through a series of interactive online modules, adapting evidence-based pedagogical approaches to learning. Capturing and addressing the complexities of the project impacted the methodological decisions and approaches to evaluation. The challenge was to find an evaluation methodology that captured valid data across all partner languages to demonstrate the extent of the change in knowledge and understanding. Co-development by all team members was a lengthy iterative process, challenged by a lack of consistency in terminology. A mixed methods approach enabled both qualitative and quantitative data to be collected, at the start, during, and at the conclusion of the training for the purposes of evaluation. The module content and evaluation instrument were accessible in each partner country's language. Collecting both types of data provided a high-level snapshot of attainment via the quantitative dataset and an in-depth understanding of the impact of the training from the qualitative dataset. The analysis was mixed methods, with integration at multiple interfaces. The primary focus of the analysis was to support the overall project evaluation for the funding agency. A key project outcome was identifying that the trans-European approach posed several challenges. Firstly, the project partners did not share a first language or a legal or professional approach to domestic abuse and neglect. This was negotiated through complex, systematic, and iterative interaction between team members so that consensus could be achieved. Secondly, the context of the data collection in several different cultural, educational, and healthcare systems across Europe challenged the development of a robust evaluation. The participants in the pilot evaluation shared that the training was contemporary, well-designed, and of great relevance to inform practice. Initial results from the evaluation indicated that the participants were drawn from more than eight partner countries due to the online nature of the training. The primary results indicated a high level of engagement with the content and achievement through the online assessment. The main finding was that the participants perceived the impact of domestic abuse and neglect in very different ways in their individual professional contexts. Most significantly, the participants recognised the need for the training and the gap that existed previously. It is notable that a mixed-methods evaluation of a trans-European project is unusual at this scale.

Keywords: domestic violence, e-learning, health professionals, trans-European

Procedia PDF Downloads 83
2089 Non-Invasive Imaging of Tissue Using Near Infrared Radiations

Authors: Ashwani Kumar Aggarwal

Abstract:

NIR Light is non-ionizing and can pass easily through living tissues such as breast without any harmful effects. Therefore, use of NIR light for imaging the biological tissue and to quantify its optical properties is a good choice over other invasive methods. Optical tomography involves two steps. One is the forward problem and the other is the reconstruction problem. The forward problem consists of finding the measurements of transmitted light through the tissue from source to detector, given the spatial distribution of absorption and scattering properties. The second step is the reconstruction problem. In X-ray tomography, there is standard method for reconstruction called filtered back projection method or the algebraic reconstruction methods. But this method cannot be applied as such, in optical tomography due to highly scattering nature of biological tissue. A hybrid algorithm for reconstruction has been implemented in this work which takes into account the highly scattered path taken by photons while back projecting the forward data obtained during Monte Carlo simulation. The reconstructed image suffers from blurring due to point spread function. This blurred reconstructed image has been enhanced using a digital filter which is optimal in mean square sense.

Keywords: least-squares optimization, filtering, tomography, laser interaction, light scattering

Procedia PDF Downloads 316
2088 Reconstruction of Wujiaochang Plaza: A Potential Avenue Towards Sustainability

Authors: Caiwei Chen, Jianhao Li, Jiasong Zhu

Abstract:

The reform and opening-up stimulated economic and technological take-off in China while resulting in massive urbanization and motorization. Wujiaochang area was set as a secondary business district in Shanghai to meet the growing demand, with the reconstruction of Wujiaochang Plaza in 2005 being a milestone of this intended urban renewal. Wujiaochang is now an economically dynamic area providing much larger traffic and transit capacity transportation-wise. However, this rebuilding has completely changed the face of the district. It is, therefore, appropriate to evaluate its impact on neighborhoods and communities while assessing the overall sustainability of such an operation. In this study, via an online questionnaire survey among local residents and daily visitors, we assess the perceptions and the estimated impact of Wujiaochang Plaza's reconstruction. We then confront these results to the 62 answers from local residents to a questionnaire collected on paper. The analysis of our data, along with observation and other forms of information -such as maps analysis or online applications (Dianping)- demonstrate major improvement in economic sustainability but also significant losses in environmental sustainability, especially in terms of active transportation. As for the social viewpoint, local residents' opinions tend to be rather positive, especially regarding traffic safety and access to consumption, despite the lack of connectivity and radical changes induced by Wujiaochang massive transformations. In general, our investigation exposes the overall positive outcomes of Wujiaochang Plaza reconstruction but also unveils major drawbacks, especially in terms of soft mobility and traffic fluidity. We gather that our approach could be of tremendous help for future major urban interventions, as such approaches in municipal regeneration are widely implemented in Chinese cities and yet still need to be thoroughly assessed in terms of sustainability.

Keywords: China's reform and opening-up, economical revitalization, neighborhood identity, sustainability assessment, urban renewal

Procedia PDF Downloads 237
2087 The Impact of E-Commerce on the Physical Space of Traditional Retail System

Authors: Sumayya S.

Abstract:

Making cities adaptive and inclusive is one among the inherent goal and challenge for contemporary cities. This is a serious concern when the urban transformations occur in varying magnitude due to visible and invisible factors. One type of visibly invisible factor is ecommerce and its expanding operation that is understood to cause changes to the conventional spatial structure positively and negatively. With the continued growth in e-commerce activities and its future potential, market analysts, media, and even retailers have questioned the importance of a future presence of traditional Brick-and-mortar stores in cities as a critical element, with some even referring to the repeated announcement of the closure of some store chains as the end of the online shopping era. Essentially this raises the question of how adaptive and inclusive the cities are to the dynamics of transformative changes that are often unseen. People have become more comfortable with seating inside and door delivery systems, and this increased change in usage of public spaces, especially the commercial corridors. Through this research helped in presetting a new approach for planning and designing commercial activities centers and also presents the impact of ecommerce on the urban fabric, such as division and fragmentation of space, showroom syndrome, reconceptualization of space, etc., in a critical way. The changes are understood by analyzing the e-commerce logistic process. Based on the inferences reach at the conclusion for the need of an integrated approach in the field of planning and designing of public spaces for the sustainable omnichannel retailing. This study was carried out with the following objectives Monitoring the impact of e commerce on the traditional shopping space. Explore the new challenges and opportunities faced by the urban form. Explore how adaptive and inclusive our cities are to the dynamics of transformative changes caused by ecommerce.

Keywords: E-commerce, shopping streets, online environment, offline environment, shopping factors

Procedia PDF Downloads 88
2086 Estimation of Seismic Drift Demands for Inelastic Shear Frame Structures

Authors: Ali Etemadi, Polat H. Gulkan

Abstract:

The drift spectrum derived through the continuous shear-beam and wave propagation theory is known to be useful appliance to measure of the demand of pulse like near field ground motions on building structures. As regards, many of old frame buildings with poor or non-ductile column elements, pass the elastic limits and blurt the post yielding hysteresis degradation responses when subjected to such impulsive ground motions. The drift spectrum which, is based on a linear system cannot be predicted the overestimate drift demands arising from inelasticity in an elastic plastic systems. A simple procedure to estimate the drift demands in shear-type frames which, respond over the elastic limits is described and effect of hysteresis degradation behavior on seismic demands is clarified. Whereupon the modification factors are proposed to incorporate the hysteresis degradation effects parametrically. These factors are defined with respected to the linear systems. The method can be applicable for rapid assessment of existing poor detailed, non-ductile buildings.

Keywords: drift spectrum, shear-type frame, stiffness and strength degradation, pinching, smooth hysteretic model, quasi static analysis

Procedia PDF Downloads 524
2085 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 446
2084 Privacy Rights of Children in the Social Media Sphere: The Benefits and Challenges Under the EU and US Legislative Framework

Authors: Anna Citterbergova

Abstract:

This study explores the safeguards and guarantees to children’s personal data protection under the current EU and US legislative framework, namely the GDPR (2018) and COPPA (2000). Considering that children are online for the majority of their free time, one cannot overlook the negative side effects that may be associated with online participation, which may put children’s wellbeing and their fundamental rights at risk. The question of whether the current relevant legislative framework in relation to the responsibilities of the internet service providers (ISPs) are adequate safeguards and guarantees to children’s personal data protection has been an evolving debate both in the US and in the EU. From a children’s rights perspective, processors of personal data have certain obligations that must meet the international human rights principles (e. g. the CRC, ECHR), which require taking into account the best interest of the child. Accordingly, the need to protect children’s privacy online remains strong and relevant with the expansion of the number and importance of social media platforms to human life. At the same time, the landscape of the internet is rapidly evolving, and commercial interests are taking a more targeted approach in seeking children’s data. Therefore, it is essential to constantly evaluate the ongoing and evolving newly adopted market policies of ISPs that may misuse the gap in the current letter of the law. Previous studies in the field have already pointed out that both GDPR and COPPA may theoretically not be sufficient in protecting children’s personal data. With the focus on social media platforms, this study uses the doctrinal-descriptive method to identifiy the mechanisms enshrined in the GDPR and COPPA designed to protect children’s personal data. In its second part, the study includes a data gathering phase by the national data protection authorities responsible for monitoring and supervision of the GDPR in relation to children’s personal data protection who monitor the enforcement of the data protection rules throughout the European Union an contribute to their consistent application. These gathered primary source of data will later be used to outline the series of benefits and challenges to children’s persona lata protection faced by these institutes and the analysis that aims to suggest if and/or how to hold ISPs accountable while striking a fair balance between the commercial rights and the right to protection of the personal data of children. The preliminary results can be divided into two categories. First, conclusions in the doctrinal-descriptive part of the study. Second, specific cases and situations from the practice of national data protection authorities. While for the first part, concrete conclusions can already be presented, the second part is currently still in the data gathering phase. The result of this research is a comprehensive analysis on the safeguards and guarantees to children’s personal data protection under the current EU and US legislative framework, based on doctrinal-descriptive approach and original empirical data.

Keywords: personal data of children, personal data protection, GDPR, COPPA, ISPs, social media

Procedia PDF Downloads 96
2083 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 264
2082 Conceptual Model of a Residential Waste Collection System Using ARENA Software

Authors: Bruce G. Wilson

Abstract:

The collection of municipal solid waste at the curbside is a complex operation that is repeated daily under varying circumstances around the world. There have been several attempts to develop Monte Carlo simulation models of the waste collection process dating back almost 50 years. Despite this long history, the use of simulation modeling as a planning or optimization tool for waste collection is still extremely limited in practice. Historically, simulation modeling of waste collection systems has been hampered by the limitations of computer hardware and software and by the availability of representative input data. This paper outlines the development of a Monte Carlo simulation model that overcomes many of the limitations contained in previous models. The model uses a general purpose simulation software program that is easily capable of modeling an entire waste collection network. The model treats the stops on a waste collection route as a queue of work to be processed by a collection vehicle (or server). Input data can be collected from a variety of sources including municipal geographic information systems, global positioning system recorders on collection vehicles, and weigh scales at transfer stations or treatment facilities. The result is a flexible model that is sufficiently robust that it can model the collection activities in a large municipality, while providing the flexibility to adapt to changing conditions on the collection route.

Keywords: modeling, queues, residential waste collection, Monte Carlo simulation

Procedia PDF Downloads 400