Search results for: memory types
5142 Evaluation of the Urban Landscape Structures and Dynamics of Hawassa City, Using Satellite Images and Spatial Metrics Approaches, Ethiopia
Authors: Berhanu Terfa, Nengcheng C.
Abstract:
The study deals with the analysis of urban expansion and land transformation of Hawass City using remote sensing data and landscape metrics during last three decades (1987–2017). Remote sensing data from Various multi-temporal satellite images viz., TM (1987), TM (1995), ETM+ (2005) and OLI (2017) were used to examine the urban expansion, growth types, and spatial isolation within the urban landscape to develop an understanding the trends of built-up growth in Hawassa City, Ethiopia. Landscape metrics and built-up density were employed to analyze the pattern, process and overall growth status. The area under investigation was divided into concentric circles with a consecutive circle of 1 km incremental radius from the central pixel (Central Business District) for analysis. The result exhibited that the built-up area had increased by 541.32% between 1987 and 2017and an extension growth types (more than 67 %) was observed. The major growth took place in north-west direction followed by north direction in haphazard manner during 1987–1995 period, whereas predominant built-up development was observed in south and southwest direction during 1995–2017 period. Land scape metrics result revealed that the of urban patches density, total edge and edge density increased, while mean nearest neighbors’ distance decreased showing the tendency of sprawl.Keywords: landscape metrics, spatial patterns, remote sensing, multi-temporal, urban sprawl
Procedia PDF Downloads 2865141 Oi̇l Absorption Behavior and Its Effect on Charpy Impact Test of Glass Reinforced Polyester Composites Used in the Manufacture of Naval Ship Hulls
Authors: Bouhafara Djaber, Menail Younes, Mesrafet Farouk, Aissaoui Mohammed Islem
Abstract:
This article presents results of experimental investigations of the durability of (GFRP) composite exposed to typical environments of marine industries applications,The use of fiber-glass reinforced polyester composites in marine applications such as Hulls of voyage boats and hulls of small vessels for the military navy , this type of composite is becoming attractive because of their reduced weight and improved corrosion resistance. However,a deep understating of oil ageing effect on composite structures is essential to ensure long-term performance and durability. in this work evaluate the effect of oil ageing on absorptıon behavıor and ımpact properties of glass/polyester composites manufactured with two types of fiber fabrics (fibreglass mat and fiberglass woven roving) and isophthalic polyester resin. The specimens obtained from commercial (GFRP) profiles made of unsaturated polyester resin were subjected to immersion in (i) marine oil for boats and (ii) salt water at ambient temperature for up to 1 month. The effects of such exposure conditions on this types of profile we analysed in what concerns their (i) mass change,(ii) mechanical response in impact, namely on the mechanical response – oil immersion caused a higher level of degradation, compared with salt water immersion;fracture surface examination by scanning electron microscopy revealed delamination, fiber debonding and resin crumbling due to oil effect.Keywords: Marine Engine Oil, Absorption, Polyester, Glass Fibre
Procedia PDF Downloads 835140 The Role Support Groups Play in Decreasing Depression and PTSD in Cancer Survivors: A Literature Review
Authors: Julianne Macmullen
Abstract:
Due to advances in technology and early detection and treatment of cancer, many cancer patients are surviving longer than five years post-diagnosis. Most cancer patients suffer from depression, anxiety, and post-traumatic stress disorder (PTSD) at some point during diagnosis, treatment, and survivorship. A subgroup of patients will continue to suffer from depression and PTSD and require early intervention. Support groups provide patients with the emotional and informational support they require while also giving survivors a sense of community, friendship, and purpose. This type of support is recognized by researchers to improve the quality of life while also decreasing depression and PTSD symptoms. The gaps in the literature include cultural diversity, minorities, and support groups involving cancer types other than breast cancer. Another gap in the literature includes the perceptions of cancer patients as well as longitudinal studies to determine the relationships between support groups and decreased depression and PTSD rates over time. Future research is required to fill the gaps in the literature mentioned previously. Future research is also needed to analyze the difference in age groups and different types of support groups such as professionally-led, peer-led, and online. Implications for practice involve providers assessing for the symptoms of depression and PTSD in order to offer prompt treatment and support services to those patients. In conclusion, social support by way of support groups improves the quality of life, gives survivors a sense of purpose to help others while also gaining the support they need, and reduces the rate of depressive episodes related to PTSD.Keywords: cancer survivor, survivorship, post-traumatic stress disorder (PTSD), depression, support groups
Procedia PDF Downloads 1765139 Use of Non-woven Polyethylene Terephthalate Fabrics to Improve Certain Properties of Concrete
Authors: Sifatullah Bahij, Safiullah Omary, Francoise Feugeas, Amanullah Faqiri
Abstract:
Plastic packages have been broadly used for a long time. Such widespread usage of plastic has resulted in an increased amount of plastic wastes and many environmental impacts. Plastic wastes are one of the most significant types of waste materials because of their non-degradation and low biodegradability. It is why many researchers tried to find a safe and environmentally friendly solution for plastic wastes. In this goal, in the civil engineering industry, many types of plastic wastes have been incorporated, as a partial substitution of aggregates or as additive materials (fibers) in concrete mixtures because of their lengthier lifetime and lower weight. This work aims to study the mechanical properties (compressive, split tensile and flexural strengths) of concrete with a water-cement ratio (w/c) of 0.45 and with the incorporation of non-woven PET plastic sheets. Five configurations -without PET (reference), 1-layer sheet, 2-side, 3-side, and full sample wrapping- were applied. The 7, 14 and 28-days samples’ compressive strengths, flexural strength and split tensile strength were measured. The outcomes of the study show that the compressive strength was improved for the wrapped samples, particularly for the cylindrical specimens. Also, split tensile and flexural behaviors of the wrapped samples improved significantly compared to the reference ones. Moreover, reference samples were damaged into many parts after mechanical testing, while wrapped specimens were taken by the applied configurations and were not divided into many small fragments. Therefore, non-woven fabrics appeared to improve some properties of the concrete.Keywords: solid waste plastic, non-woven polyethylene terephthalate sheets, mechanical behaviors, crack pattern
Procedia PDF Downloads 1295138 ACL Tear Prevention Program
Authors: Ervin Meqikukiqi
Abstract:
It is difficult to assess how athletes can best modify their movements to prevent non contact ACL injuries. Speaking with an athletic trainer, physical therapist, or sports medicine specialist is a good place to start. Recent research has allowed therapists and clinicians to easily identify and target weak muscle areas (e.g., weak hips, which leads to knock-kneed landing positions) and identify ways to improve strength and thus help prevent injury. In addition, other risk factors such as reduced hamstring strength and increased joint range of motion can be further assessed by a physical therapist or athletic trainer to improve performance-or rehabilitation efforts after an injury has occurred. Current studies also demonstrate that specific types of training, such as jump routines and learning to pivot properly, help athletes prevent ACL injuries. These types of exercises and training programs are more beneficial if athletes start when they are young. It may be optimal to integrate prevention programs during early adolescence, prior to when young athletes develop certain habits that increase the risk of an ACL injury. This is a 20 minute program designed to reduce the risk of tears of the Anterior Cruciate Ligament. It should be started at least four and preferably six weeks prior to start of competition.Ideally it is done five times per week preseason and three times per week in season.The coach or trainer must constantly observe athletes during these exercises to correct and maintain proper technique. Once the athletes understand the principles, they can monitor and coach each other. Four phases: Warm-up, Strengthening, Plyometrics, Agility and Balance.Keywords: athletes, acl, prevention, injuries, plyoemtric, proprioception, agillity
Procedia PDF Downloads 4225137 Variations of Metaphors: Wittgenstein's Contribution to Literary Studies
Authors: Dorit Lemberger
Abstract:
Wittgenstein directly used the term "metaphor" only infrequently and with reservations, but his writings include a number of metaphors that have become imprinted in the philosophical memory of Western thought. For example, the ladder in his book Tractatus, or in Philosophical investigations - the ancient city, the beetle in a box, the fly in the fly-bottle, and the duck-rabbit. In light of Wittgenstein's stressing, throughout his investigations, that the only language that exists is ordinary language, and that there is no "second-order" language, the question should be asked: How do these metaphors function, specifically, and in general, how are we to relate to language use that exceeds the normal? Wittgenstein did not disregard such phenomena, but he proposed viewing them in a different way, that would enable understanding them as uses in ordinary language, without necessarily exceeding such language. Two important terms that he coined in this context are "secondary sense" and "experience of meaning". Each denotes language use as reflective of a subjective element characteristic of the speaker, such as intent, experience, or emphasis of a certain aspect. More recent Wittgenstein scholars added the term "quasi-metaphor", that refers to his discussion of the possibility of aesthetic judgment. This paper will examine how, according to Wittgenstein, these terms function without exceeding ordinary language, and will illustrate how they can be applied, in an analysis of the poem "Butterfly" by Nelly Sachs.Keywords: metaphor, quasi-metaphor, secondary sense, experience of meaning
Procedia PDF Downloads 4375136 A Pilot Study to Investigate the Use of Machine Translation Post-Editing Training for Foreign Language Learning
Authors: Hong Zhang
Abstract:
The main purpose of this study is to show that machine translation (MT) post-editing (PE) training can help our Chinese students learn Spanish as a second language. Our hypothesis is that they might make better use of it by learning PE skills specific for foreign language learning. We have developed PE training materials based on the data collected in a previous study. Training material included the special error types of the output of MT and the error types that our Chinese students studying Spanish could not detect in the experiment last year. This year we performed a pilot study in order to evaluate the PE training materials effectiveness and to what extent PE training helps Chinese students who study the Spanish language. We used screen recording to record these moments and made note of every action done by the students. Participants were speakers of Chinese with intermediate knowledge of Spanish. They were divided into two groups: Group A performed PE training and Group B did not. We prepared a Chinese text for both groups, and participants translated it by themselves (human translation), and then used Google Translate to translate the text and asked them to post-edit the raw MT output. Comparing the results of PE test, Group A could identify and correct the errors faster than Group B students, Group A did especially better in omission, word order, part of speech, terminology, mistranslation, official names, and formal register. From the results of this study, we can see that PE training can help Chinese students learn Spanish as a second language. In the future, we could focus on the students’ struggles during their Spanish studies and complete the PE training materials to teach Chinese students learning Spanish with machine translation.Keywords: machine translation, post-editing, post-editing training, Chinese, Spanish, foreign language learning
Procedia PDF Downloads 1445135 Effects of Learner-Content Interaction Activities on the Context of Verbal Learning Outcomes in Interactive Courses
Authors: Alper Tolga Kumtepe, Erdem Erdogdu, M. Recep Okur, Eda Kaypak, Ozlem Kaya, Serap Ugur, Deniz Dincer, Hakan Yildirim
Abstract:
Interaction is one of the most important components of open and distance learning. According to Moore, who proposed one of the keystones on interaction types, there are three basic types of interaction: learner-teacher, learner-content, and learner-learner. From these interaction types, learner-content interaction, without doubt, can be identified as the most fundamental one on which all education is based. Efficacy, efficiency, and attraction of open and distance learning systems can be achieved by the practice of effective learner-content interaction. With the development of new technologies, interactive e-learning materials have been commonly used as a resource in open and distance learning, along with the printed books. The intellectual engagement of the learners with the content that is course materials may also affect their satisfaction for the open and distance learning practices in general. Learner satisfaction holds an important place in open and distance learning since it will eventually contribute to the achievement of learning outcomes. Using the learner-content interaction activities in course materials, Anadolu University, by its Open Education system, tries to involve learners in deep and meaningful learning practices. Especially, during the e-learning material design and production processes, identifying appropriate learner-content interaction activities within the context of learning outcomes holds a big importance. Considering the lack of studies adopting this approach, as well as its being a study on the use of e-learning materials in Open Education system, this research holds a big value in open and distance learning literature. In this respect, the present study aimed to investigate a) which learner-content interaction activities included in interactive courses are the most effective in learners’ achievement of verbal information learning outcomes and b) to what extent distance learners are satisfied with these learner-content interaction activities. For this study, the quasi-experimental research design was adopted. The 120 participants of the study were from Anadolu University Open Education Faculty students living in Eskişehir. The students were divided into 6 groups randomly. While 5 of these groups received different learner-content interaction activities as a part of the experiment, the other group served as the control group. The data were collected mainly through two instruments: pre-test and post-test. In addition to those tests, learners’ perceived learning was assessed with an item at the end of the program. The data collected from pre-test and post-test were analyzed by ANOVA, and in the light of the findings of this approximately 24-month study, suggestions for the further design of e-learning materials within the context of learner-content interaction activities will be provided at the conference. The current study is planned to be an antecedent for the following studies that will examine the effects of activities on other learning domains.Keywords: interaction, distance education, interactivity, online courses
Procedia PDF Downloads 1945134 Difference in Virulence Factor Genes Between Transient and Persistent Streptococcus Uberis Intramammary Infection in Dairy Cattle
Authors: Anyaphat Srithanasuwan, Noppason Pangprasit, Montira Intanon, Phongsakorn Chuammitri, Witaya Suriyasathaporn, Ynte H. Schukken
Abstract:
Streptococcus uberis is one of the most common mastitis-causing pathogens, with a wide range of intramammary infection (IMI) durations and pathogenicity. This study aimed to compare shared or unique virulence factor gene clusters distinguishing persistent and transient strains of S. uberis. A total of 139 S. uberis strains were isolated from three small-holder dairy herds with a high prevalence of S. uberis mastitis. The duration of IMI was used to categorize bacteria into two groups: transient and persistent strains with an IMI duration of less than 1 month and longer than 2 months, respectively. Six representative S. uberis strains, three from each group (transience and persistence) were selected for analysis. All transient strains exhibited multi-locus sequence types (MLST), indicating a highly diverse population of transient S. uberis. In contrast, MLST of persistent strains was available in an online database (pubMLST). Identification of virulence genes was performed using whole-genome sequencing (WGS) data. Differences in genomic size and number of virulent genes were found. For example, the BCA gene or alpha-c protein and the gene associated with capsule formation (hasAB), found in persistent strains, are important for attachment and invasion, as well as the evasion of the antimicrobial mechanisms and survival persistence, respectively. These findings suggest a genetic-level difference between the two strain types. Consequently, a comprehensive study of 139 S. uberis isolates will be conducted to perform an in-depth genetic assessment through WGS analysis on an Illumina platform.Keywords: Streptococcus Uberis, mastitis, whole genome sequence, intramammary infection, persistent S. Uberis, transient s. Uberis
Procedia PDF Downloads 655133 The Underground Ecosystem of Credit Card Frauds
Authors: Abhinav Singh
Abstract:
Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem
Procedia PDF Downloads 4395132 The Effects of Normal Aging on Reasoning Ability: A Dual-Process Approach
Authors: Jamie A. Prowse Turner, Jamie I. D. Campbell, Valerie A. Thompson
Abstract:
The objective of the current research was to use a dual-process theory framework to explain these age-related differences in reasoning. Seventy-two older (M = 80.0 years) and 72 younger (M = 24.6 years) adults were given a variety of reasoning tests (i.e., a syllogistic task, base rate task, the Cognitive Reflection Test, and a perspective manipulation), as well as independent tests of capacity (working memory, processing speed, and inhibition), thinking styles, and metacognitive ability, to account for these age-related differences. It was revealed that age-related differences were limited to problems that required Type 2 processing and were related to differences in cognitive capacity, individual difference factors, and strategy choice. Furthermore, older adults’ performance can be improved by reasoning from another’s’ perspective and cannot, at this time, be explained by metacognitive differences between young and older adults. All of these findings fit well within a dual-process theory of reasoning, which provides an integrative framework accounting for previous findings and the findings presented in the current manuscript.Keywords: aging, dual-process theory, performance, reasoning ability
Procedia PDF Downloads 1915131 Knowledge and Information Sharing in the Opinion of the Polish Academic Community
Authors: Marzena Świgoń
Abstract:
The purpose of this paper is to describe the perceptions of knowledge and information sharing by the Polish academic community. An electronic questionnaire was used to gather opinions of respondents. The presented results are a part of the findings of empirical studies carried out amongst academics from various types of universities and academia located throughout Poland.Keywords: academics, information sharing, knowledge sharing, scholarly communication
Procedia PDF Downloads 4145130 The Response of the Accumulated Biomass and the Efficiency of Water Use in Five Varieties of Durum Wheat Lines under Water Stress
Authors: Fellah Sihem
Abstract:
The optimal use of soil moisture by culture, is related to the leaf area index, which stood in the cycle and its modulation according to the prevailing stress intensity. For a given stock of water in the soil, cultivar adapted and saving water is one that is no luxury consumption during the preanthesis. It modulates the leaf area index to regulate sweating in the degree of its water supply. In plants water saving, avoidance of dehydration is related to the reduction of water loss by cuticular and stomatal pathways. Muchow and Sinclair reported that the test of relative water content (TRE) is considered the best indicator of leaf water status. The search for indicators of the ability of the plant to make good use of the water, under water stress is a prerequisite for progress in improving performance under water stress. This experiment aims to characterize a set of durum wheat varieties, tested jars and vegetation under different levels of water stress to the surface of the leaf, relative water content, cell integrity, the accumulated biomass and efficiency of water use. The experiment was conducted during the 2005/2006 academic year, at the Agricultural Research Station of the Field Crop Institute of Setif, under semi-controlled conditions. Five genotypes of durum wheat (Triticum durum Desf) were evaluated for their ability to tolerate moderate and severe water stress. The results showed that geno types respond differently to water stress. Dry matter accumulation and growth rate varied among geno types and were significantly reduced. At severe water stress biomass accumulated by Boussalam was the least affected.Keywords: water stress, triticum durum, biomass, cell membrane integrity, relative water content
Procedia PDF Downloads 4695129 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping
Authors: Andre Slonopas, Zona Kostic, Warren Thompson
Abstract:
Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory
Procedia PDF Downloads 1855128 Dermatological Study on Risk Factors for Pruritic Skin: Skin Properties of Elderly
Authors: Dianis Wulan Sari, Takeo Minematsu, Mikako Yoshida, Hiromi Sanada
Abstract:
Introduction: Pruritus is diagnosed as itching without macroscopic abnormalities on skin. It is the most skin complaint of elderly people. In the present study, we conducted a dermatological study to examine the risk factors of pruritic skin and predicted how to prevent pruritus especially in the elderly population. Pruritus is caused several types of inflammation, including epidermal innate immunity based on keratinocyte responses and acquired immunity regulated by type 1 or 2 helper T (Th) cells. The triggers of pruritus differ among inflammation types, therefore we did separately assess the pruritus-associated factors of each inflammation type in an effort to contribute to the identification of intervention targets for preventing pruritus. Therefore, this study aimed to investigate the factors related with actual condition of pruritic skin by examine the skin properties. Method: This study was conducted in elderly population of Indonesian nursing home. Basic characteristics and behaviors were obtained by interview. The properties of pruritic skin were collected by examination of skin biomarker using skin blotting as novel method of non-invasive skin assessment method and examination of skin barrier function using stratum corneum hydration and skin pH. Result: The average age of participants was 74 years with independent status was 66.8%. Age (β = -0.130, p = 0.044), cumulative lifetime sun exposure (β = 0.145, p = 0.026), bathing duration (β = 0.151, p = 0.022), clothing change frequency (β = 0.135, p = 0.029), and clothing type (β = -0.139, p = 0.021) were risk factors of pruritic skin in multivariate analysis. Conclusion: Risk factors of pruritic skin in elderly population were caused by internal factors such as skin senescence and external factors such as sun exposure, hygiene care and skin care behavior.Keywords: aging, hygiene care, pruritus, skin care, sun exposure
Procedia PDF Downloads 2265127 Screening of Antiviral Compounds in Medicinal Plants: Non-Volatiles
Authors: Tomas Drevinskas, Ruta Mickiene, Audrius Maruska, Nicola Tiso, Algirdas Salomskas, Raimundas Lelesius, Agneta Karpovaite, Ona Ragazinskiene, Loreta Kubiliene
Abstract:
Antiviral effect of substances accumulated by plants and natural products is known to ethno-pharmacy and modern day medicine. Antiviral properties are usually assigned to volatile compounds and polyphenols. This research work is divided into several parts and the task of this part was to investigate potential plants, potential substances and potential preparation conditions that can be used for the preparation of antiviral agents. Sixteen different medicinal plants, their parts and two types of propolis were selected for screening. Firstly, extraction conditions of non-volatile compounds were investigated: 3 pre-selected plants were extracted with 5 different ethanol – water mixtures (96%, 75%, 60%, 40%, 20 %, vol.) and bidistilled water. Total phenolic content, total flavonoid content and radical scavenging activity was determined. The results indicated that optimal extrahent is 40%, vol. of ethanol – water mixture. Further investigations were performed with the extrahent of 40%, vol. ethanol – water mixture. All 16 of selected plants, their parts and two types of propolis were extracted using selected extrahent. Determined total phenolic content, total flavonoid content and radical scavenging activity indicated that extracts of Origanum Vulgare L., Mentha piperita L., Geranium macrorrhizum L., Melissa officinalis L. and Desmodium canadence L. contains highest amount of extractable phenolic compounds (7.31, 5.48, 7.88, 8.02 and 7.16 rutin equivalents (mg/ ml) respectively), flavonoid content (2.14, 2.23, 2.49, 0.79 and 1.51 rutin equivalents (mg/ml) respectively) and radical scavenging activity (11.98, 8.72, 13.47, 13.22 and 12.22 rutin equivalents (mg/ml) respectively). Composition of the extracts is analyzed using HPLC.Keywords: antiviral effect, plants, propolis, phenols
Procedia PDF Downloads 3245126 Left Ventricular Adaptations of Elite Volleyball Players Based on the Playing Position
Authors: Shihab Aldin Al Riyami, Khosrow Ebrahim, Sajad Ahmadizad
Abstract:
Hemodynamic changes and ventricular loading during exercise lead to left ventricular (LV) hypertrophy. In athletes, volume load induces enlargement of the LV internal diameter and a proportional increase of wall thickness; while, pressure load would induce thickening of the ventricular wall. These adaptations are not similar in all athletes and are related to the types of sport. Volleyball players have different types of activity and roles based on their playing. Therefore, their physiological adaptations and requirements are different. The aim of the current study was to investigate the LV adaptationsinelite volleyball players based on their playing position. Sixty male elite volleyball players (age, 30.55±3.64 years)from Brazil, Serbia, Poland, Iran, Colombia, Cameroon, Japan, Egypt, Qatar, and Tunisia were investigated (from all five volleyball play positions). All participants had the experience of at least 3 years of participation at a professional level and international tournaments. LV characteristics were evaluated and measured using the echocardiography technique. Statistical analyses revealed significant differences (P<0.05)among the five groups of players forLV internal dimension (LVID), posterior wall thickness (PWT), and intact ventricular septum (IVS). Post-hoc analysis showed that opposite position players had significant higher value of LVID, PWT, and IVS when compared with other players, including outside hitter, middle blocker, setter, and libero (p<0.05). Additionally, in libero players, PWT was significantly lower when compared with other players (p<0.05). Based on the findings of the present study, it is concluded that LV adaptations in volleyball players are related to their playing position and that the opposite players had the highest LV adaptations when compared to other positions.Keywords: athletes, cardiac adaptations, echocardio graphy, heart, sport
Procedia PDF Downloads 2735125 SSRUIC Students’ Attitude and Preference toward Error Corrections
Authors: Papitchaya Papangkorn
Abstract:
Matching the expectations of teachers and learners is significant for successful language learning. Moreover, teachers should discover what their learners think and feel about what and how they want to learn. Therefore, this study investigates International College, Suan Sunandha Rajabhat University students’ preferences toward error corrections in order to help SSRUIC teachers match their expectations and their learners because it is important for successful language learning. This study examined the learners’ attitude and preference toward error correction through 50 first year SSRUIC students both male (25) and female (25) in Bangkok, Thailand. The data were collected from a questionnaire and interviews to investigate the necessity and frequency, timing, type of errors, method of corrective feedback, and person who gives error correction in order to answer the overall research question and sub-questions. The findings indicate five suggestions regarding the overall research question. Firstly, errors should be treated, and always be treated. Secondly, treating errors after finish speaking is the most appropriate time. Thirdly, “errors that may cause problems in an understanding of listener” and “frequent spoken errors” should be treated. Fourthly, repetition and explicit feedback were the most popular types of feedback among males, whereas metalinguistic feedback was the most favoured types amongst females. Finally, teachers were the most preferred person to deliver corrective feedback for the learners. Although the results of the study are difficult to generalize to a larger population, which are Thai EFL learners because of the small sample, the findings provide useful information that may contribute to understanding of SSRUIC learners’ preferences toward error corrections and it might reduce the gap between what teachers employ and what students expect when receiving corrective feedback. The reduction of this gap may be useful for the learning process and could enhance the efforts of both teachers and learners in a Thai context.Keywords: attitude, corrective feedback, error, preference
Procedia PDF Downloads 3575124 A Machine Learning Based Method to Detect System Failure in Resource Constrained Environment
Authors: Payel Datta, Abhishek Das, Abhishek Roychoudhury, Dhiman Chattopadhyay, Tanushyam Chattopadhyay
Abstract:
Machine learning (ML) and deep learning (DL) is most predominantly used in image/video processing, natural language processing (NLP), audio and speech recognition but not that much used in system performance evaluation. In this paper, authors are going to describe the architecture of an abstraction layer constructed using ML/DL to detect the system failure. This proposed system is used to detect the system failure by evaluating the performance metrics of an IoT service deployment under constrained infrastructure environment. This system has been tested on the manually annotated data set containing different metrics of the system, like number of threads, throughput, average response time, CPU usage, memory usage, network input/output captured in different hardware environments like edge (atom based gateway) and cloud (AWS EC2). The main challenge of developing such system is that the accuracy of classification should be 100% as the error in the system has an impact on the degradation of the service performance and thus consequently affect the reliability and high availability which is mandatory for an IoT system. Proposed ML/DL classifiers work with 100% accuracy for the data set of nearly 4,000 samples captured within the organization.Keywords: machine learning, system performance, performance metrics, IoT, edge
Procedia PDF Downloads 1955123 The Integration of Patient Health Record Generated from Wearable and Internet of Things Devices into Health Information Exchanges
Authors: Dalvin D. Hill, Hector M. Castro Garcia
Abstract:
A growing number of individuals utilize wearable devices on a daily basis. The usage and functionality of these wearable devices vary from user to user. One popular usage of said devices is to track health-related activities that are typically stored on a device’s memory or uploaded to an account in the cloud; based on the current trend, the data accumulated from the wearable device are stored in a standalone location. In many of these cases, this health related datum is not a factor when considering the holistic view of a user’s health lifestyle or record. This health-related data generated from wearable and Internet of Things (IoT) devices can serve as empirical information to a medical provider, as the standalone data can add value to the holistic health record of a patient. This paper proposes a solution to incorporate the data gathered from these wearable and IoT devices, with that a patient’s Personal Health Record (PHR) stored within the confines of a Health Information Exchange (HIE).Keywords: electronic health record, health information exchanges, internet of things, personal health records, wearable devices, wearables
Procedia PDF Downloads 1285122 Didacticization of Code Switching as a Tool for Bilingual Education in Mali
Authors: Kadidiatou Toure
Abstract:
Mali has started experimentation of teaching the national languages at school through the convergent pedagogy in 1987. Then, it is in 1994 that it will become widespread with eleven of the thirteen former national languages used at primary school. The aim was to improve the Malian educational system because the use of French as the only medium of instruction was considered a contributing factor to the significant number of student dropouts and the high rate of repetition. The Convergent pedagogy highlights the knowledge acquired by children at home, their vision of the world and especially the knowledge they have of their mother tongue. That pedagogy requires the use of a specific medium only during classroom practices and teachers have been trained in this sense. The specific medium depends on the learning content, which sometimes is French, other times, it is the national language. Research has shown that bilingual learners do not only use the required medium in their learning activities, but they code switch. It is part of their learning processes. Currently, many scholars agree on the importance of CS in bilingual classes, and teachers have been told about the necessity of integrating it into their classroom practices. One of the challenges of the Malian bilingual education curriculum is the question of ‘effective languages management’. Theoretically, depending on the classrooms, an average have been established for each of the involved language. Following that, teachers make use of CS differently, sometimes, it favors the learners, other times, it contributes to the development of some linguistic weaknesses. The present research tries to fill that gap through a tentative model of didactization of CS, which simply means the practical management of the languages involved in the bilingual classrooms. It is to know how to use CS for effective learning. Moreover, the didactization of CS tends to sensitize the teachers about the functional role of CS so that they may overcome their own weaknesses. The overall goal of this research is to make code switching a real tool for bilingual education. The specific objectives are: to identify the types of CS used during classroom activities to present the functional role of CS for the teachers as well as the pupils. to develop a tentative model of code-switching, which will help the teachers in transitional classes of bilingual schools to recognize the appropriate moment for making use of code switching in their classrooms. The methodology adopted is a qualitative one. The study is based on recorded videos of teachers of 3rd year of primary school during their classroom activities and interviews with the teachers in order to confirm the functional role of CS in bilingual classes. The theoretical framework adopted is the typology of CS proposed by Poplack (1980) to identify the types of CS used. The study reveals that teachers need to be trained on the types of CS and the different functions they assume and on the consequences of inappropriate use of language alternation.Keywords: bilingual curriculum, code switching, didactization, national languages
Procedia PDF Downloads 715121 Species Composition of Lepidoptera (Insecta: Lepidoptera) Inhabited on the Saxaul (Chenopodiáceae: Haloxylon spp.) in the Desert Area of South-East Kazakhstan
Authors: N. Tumenbayeva
Abstract:
At the present time in Kazakhstan, the area for saxaul growing is strongly depopulateddue to anthropogenic and other factors. To prevent further reduction of natural haloxylon forest area their artificial crops are offered. Seed germination and survival of young plants in such haloxylon crops are very low. Insects, as one of the most important nutrient factors have appreciable effect on seed germination and saxaul productivity at the all stages of its formation. Insects, feeding on leaves, flowers, seeds and developing inside the trunk, branches, twigs, roots have a change in its formation and influence on the lifespan of saxaul. Representatives of Lepidoptera troop (Lepidopteraare the most harmful pests forsaxaul. As a result of our research we have identified 15 species of Lepidoptera living on haloxylon which display very different cycles and different types of food relations. It allows them to inhabit a variety of habitats, and feeding on various parts of saxaul. Some of them cause significant and sometimes very heavy damage for saxaul. There are 17identified species of Lepidoptera from the Coleophoridaefamily - 1, Gelechidae - 5, Pyralidae - 4, Noctuidae - 4, Lymantridae- 1, Cossidae - 2 species. At the same time we found 8 species for the first time, which have not been mentioned in the literature before. According to food specialization they are divided into monophages (2 types), oligophages (6 species) and polyphages (3 species). By affinity to plant parts, leaves and seeds are fed by 8 species, shoots by 1 specie, scions by 5 species, flowers, scions, seeds by 1, and 2species damage the roots and trunks. In whole installed seasonal groups of Lepidoptera - saxaul pests in the desert area, confined to the certain parts of the year, as well as certain parts of the plant for feeding. Harmfulness, depending on their activity appear during the growing season is also different.Keywords: saxaul, Lepidoptera, insecta, haloxylon
Procedia PDF Downloads 3235120 Crystallinity, Antimicrobial Activity and Dyeing Properties of Chitosan-G-Poly(N-Acryloyl Morpholine) Copolymer
Authors: Fakhreia A. Al Sagheer, Enas I. Ibrahim, Khaled D. Khalil
Abstract:
N-Acryloyl morpholine, NAM, was grafted onto chitosan utilizing homogeneous conditions with 1% acetic acid as the solvent, and potassium persulfate and sodium sulfite as the redox initiator. The effects of various reaction parameters, such as time, temperature, and monomer and initiator concentrations, on the percentage of grafting (G%) and the grafting efficiency (E%) were determined. The graft copolymer showed a remarkably improved crystallinity, as compared to the unmodified chitosan, based on the FESEM, XRD, and DSC results. Chitosan-g-poly(N-acryloyl morpholine) (Cs-PNAM), the copolymer obtained by using this procedure, was characterized by utilizing FTIR, FESEM, TGA, and XRD analysis. As expected, the results of an evaluation of antibacterial and antifungal activities show that the grafted chitosan copolymers exhibit stronger inhibitory effects against both types of microbes than does chitosan. Moreover, the size of the inhibition zone created by the graft copolymer was observed to be proportional to its G% corresponding to its morpholine content. Fortunately, the graft copolymer showed a marked growth inhibition against candidiasis (C.Albicans and C.Kefyr). We conclude that the graft copolymer may be highly effective in the prevention and treatment of candidiasis. In addition, the extent and pH dependence of uptake of different types of dyes (acidic: EBT, and MV; and basic: MB) by grafted chitosan in pH 6.5 aqueous solutions was determined. The results show that, the grafted copolymer exhibited a greater affinity to absorb the acid dyes more than the basic ones especially at relatively low temperature. Thus the modified chitosan can be used, in wastewater treatment, as efficient economic absorbent especially for anionic dyes from the industrial processing effluents.Keywords: chitosan, N-Acryloyl morpholine, homogeneous grafting, antimicrobial activity, dye uptake
Procedia PDF Downloads 3705119 Strategies to Promote Entrepreneurship Among University Students: A Case Study from Al Akhawayn University
Authors: Sara atibi, Azzeddine Atibi, Salim Ahmed, Khadija El Kababi
Abstract:
The emergence of an entrepreneurial culture within academic institutions is increasingly seen as essential for preparing students for contemporary economic challenges. This study examines the effectiveness of educational programs and interventions aimed at promoting entrepreneurial spirit at Al Akhawayn University. The central issue explores the types of programs most efficient in instilling the necessary entrepreneurial skills and attitudes in students. The primary question about the ‘types of educational programs and interventions that are most effective in cultivating and reinforcing the entrepreneurial spirit among students at Al Akhawayn University' is broken down into sub-questions detailing the characteristics of current programs, factors influencing their success, the evolution of students' entrepreneurial skills, the role of teachers and mentors, best practices from other institutions, and the long-term impacts on graduates' entrepreneurial careers. To address this question, a mixed-methods approach, combining quantitative and qualitative methods, was adopted. Quantitative data collection includes questionnaires and surveys designed to evaluate students' attitudes, skills, and perceptions before and after participating in entrepreneurship programs. Simultaneously, semi-structured interviews, focus groups, and participant observations provide in-depth qualitative data on the experiences of students, teachers, and administrators. Quantitative data analysis employs descriptive and inferential statistical techniques, while qualitative analysis uses a thematic approach to identify key perceptions and experiences. This triangulation of data ensures robust and comprehensive results.Keywords: student entrepreneurship, pedagogical interventions, Al Akhawayn university, entrepreneurial culture, entrepreneurial skills
Procedia PDF Downloads 305118 Unraveling the Puzzle of Out-of-Sequence Thrusting in the Higher Himalaya: Focus on Jhakri-Chaura-Sarahan Thrust, Himachal Pradesh, India
Authors: Rajkumar Ghosh
Abstract:
The study examines the structural analysis of Chaura Thrust in Himachal Pradesh, India, focusing on the activation timing of Main Central Thrust (MCT) and South Tibetan Detachment System (STDS), mylonitised zones, and the characterization of box fold and its signature in the regional geology of Himachal Himalaya. The research aims to document the Higher Himalayan Out-of-Sequence Thrust (OOST) in Himachal Pradesh, which activated the MCTL and in between a zone south of MCTU. The study also documents the GBM-associated temperature range and the activation of Higher Himalayan Out-of-Sequence Thrust (OOST) in Himachal Pradesh. The findings contribute to understanding the structural analysis of Chaura Thrust and its signature in the regional geology of Himachal Himalaya. The study highlights the significance of microscopic studies in documenting mylonitized zones and identifying various types of crenulated schistosity. The study concludes that Chaura Thrust is not a blind thrust and details the field evidence for the OOST. The study characterizes the box fold and its signature in the regional geology of Himachal Himalaya. The study also documents the activation timing and ages of MCT, STDS, MBT, and MFT and identifies various types of crenulated schistosity under the microscope. The study also highlights the significance of microscopic studies in the structural analysis of Chaura Thrust. Finally, the study documents the activation of Higher Himalayan Out-of-Sequence Thrust (OOST) in Himachal Pradesh and the expectations for strain variation near the OOST.Keywords: Chaura Thrust, Higher Himalaya, Jhakri Thrust, Main Central Thrust, Out-of-Sequence Thrust, Sarahan Thrust
Procedia PDF Downloads 895117 Development of a Real-Time Brain-Computer Interface for Interactive Robot Therapy: An Exploration of EEG and EMG Features during Hypnosis
Authors: Maryam Alimardani, Kazuo Hiraki
Abstract:
This study presents a framework for development of a new generation of therapy robots that can interact with users by monitoring their physiological and mental states. Here, we focused on one of the controversial methods of therapy, hypnotherapy. Hypnosis has shown to be useful in treatment of many clinical conditions. But, even for healthy people, it can be used as an effective technique for relaxation or enhancement of memory and concentration. Our aim is to develop a robot that collects information about user’s mental and physical states using electroencephalogram (EEG) and electromyography (EMG) signals and performs costeffective hypnosis at the comfort of user’s house. The presented framework consists of three main steps: (1) Find the EEG-correlates of mind state before, during, and after hypnosis and establish a cognitive model for state changes, (2) Develop a system that can track the changes in EEG and EMG activities in real time and determines if the user is ready for suggestion, and (3) Implement our system in a humanoid robot that will talk and conduct hypnosis on users based on their mental states. This paper presents a pilot study in regard to the first stage, detection of EEG and EMG features during hypnosis.Keywords: hypnosis, EEG, robotherapy, brain-computer interface (BCI)
Procedia PDF Downloads 2565116 Passive Voice in SLA: Armenian Learners’ Case Study
Authors: Emma Nemishalyan
Abstract:
It is believed that learners’ mother tongue (L1 hereafter) has a huge impact on their second language acquisition (L2 hereafter). This hypothesis has been exposed to both positive and negative criticism. Based on research results of a wide range of learners’ corpora (Chinese, Japanese, Spanish among others) the hypothesis has either been proved or disproved. However, no such study has been conducted on the Armenian learners. The aim of this paper is to understand the implication of the hypothesis on the Armenian learners’ corpus in terms of the use of the passive voice. To this end, the method of Contrastive Interlanguage Analysis (hereafter CIA) has been used on native speakers’ corpus (Louvain Corpus of Native English Essays (LOCNESS)) and Armenian learners’ corpus which has been compiled by me in compliance with International Corpus of Learner English (ICLE) guidelines. CIA compares the interlanguage (the language produced by learners) with the one produced by native speakers. With the help of this method, it is possible not only to highlight the mistakes that learners make, but also to underline the under or overuses. The choice of the grammar issue (passive voice) is conditioned by the fact that typologically Armenian and English are drastically different as they belong to different branches. Moreover, the passive voice is considered to be one of the most problematic grammar topics to be acquired by learners of the English language. Based on this difference, we hypothesized that Armenian learners would either overuse or underuse some types of the passive voice. With the help of Lancsbox software, we have identified the frequency rates of passive voice usage in LOCNESS and Armenian learners’ corpus to understand whether the latter have the same usage pattern of the passive voice as the native speakers. Secondly, we have identified the types of the passive voice used by the Armenian leaners trying to track down the reasons in their mother tongue. The results of the study showed that Armenian learners underused the passive voices in contrast to native speakers. Furthermore, the hypothesis that learners’ L1 has an impact on learners’ L2 acquisition and production was proved.Keywords: corpus linguistics, applied linguistics, second language acquisition, corpus compilation
Procedia PDF Downloads 1095115 Improvements and Implementation Solutions to Reduce the Computational Load for Traffic Situational Awareness with Alerts (TSAA)
Authors: Salvatore Luongo, Carlo Luongo
Abstract:
This paper discusses the implementation solutions to reduce the computational load for the Traffic Situational Awareness with Alerts (TSAA) application, based on Automatic Dependent Surveillance-Broadcast (ADS-B) technology. In 2008, there were 23 total mid-air collisions involving general aviation fixed-wing aircraft, 6 of which were fatal leading to 21 fatalities. These collisions occurred during visual meteorological conditions, indicating the limitations of the see-and-avoid concept for mid-air collision avoidance as defined in the Federal Aviation Administration’s (FAA). The commercial aviation aircraft are already equipped with collision avoidance system called TCAS, which is based on classic transponder technology. This system dramatically reduced the number of mid-air collisions involving air transport aircraft. In general aviation, the same reduction in mid-air collisions has not occurred, so this reduction is the main objective of the TSAA application. The major difference between the original conflict detection application and the TSAA application is that the conflict detection is focused on preventing loss of separation in en-route environments. Instead TSAA is devoted to reducing the probability of mid-air collision in all phases of flight. The TSAA application increases the flight crew traffic situation awareness providing alerts of traffic that are detected in conflict with ownship in support of the see-and-avoid responsibility. The relevant effort has been spent in the design process and the code generation in order to maximize the efficiency and performances in terms of computational load and memory consumption reduction. The TSAA architecture is divided into two high-level systems: the “Threats database” and the “Conflict detector”. The first one receives the traffic data from ADS-B device and provides the memorization of the target’s data history. Conflict detector module estimates ownship and targets trajectories in order to perform the detection of possible future loss of separation between ownship and each target. Finally, the alerts are verified by additional conflict verification logic, in order to prevent possible undesirable behaviors of the alert flag. In order to reduce the computational load, a pre-check evaluation module is used. This pre-check is only a computational optimization, so the performances of the conflict detector system are not modified in terms of number of alerts detected. The pre-check module uses analytical trajectories propagation for both target and ownship. This allows major accuracy and avoids the step-by-step propagation, which requests major computational load. Furthermore, the pre-check permits to exclude the target that is certainly not a threat, using an analytical and efficient geometrical approach, in order to decrease the computational load for the following modules. This software improvement is not suggested by FAA documents, and so it is the main innovation of this work. The efficiency and efficacy of this enhancement are verified using fast-time and real-time simulations and by the execution on a real device in several FAA scenarios. The final implementation also permits the FAA software certification in compliance with DO-178B standard. The computational load reduction allows the installation of TSAA application also on devices with multiple applications and/or low capacity in terms of available memory and computational capabilitiesKeywords: traffic situation awareness, general aviation, aircraft conflict detection, computational load reduction, implementation solutions, software certification
Procedia PDF Downloads 2855114 Right to Return and Narrative in Refugee Camps: Case Study in Palestinian Displacement
Authors: Naomi I. Austin
Abstract:
Following WWII, the Geneva Conventions and Universal Declaration of Human Rights declared the right to return an unalienable right. The right to return has been disputed by the Israeli government and upheld as an individual by prominent Palestinian activists. Those who contest the Palestinian right to return argue that it would effectively end the state of Israel. After the conquest of Lebanon, the concept of a two-state solution has been effectively shut down. This research paper will seek to utilize interviews from NGO actors and those displaced to be gathered from fieldwork conducted in refugee camps and bases of international actors, exploring durable and multilateral solutions for not only the refugee crisis but the forced displacement of Palestinians that go beyond state actors and government entities. The research will center on the perspective of those displaced to generate a plausible solution to mitigate negative effects on displaced persons. This paper will seek to address whether the right to return is plausible with the expansion of Israeli territorial conquest and the impact of the Israeli expansion on migrations within the Mediterranean region and the EU, especially with policies of integration into the host community.Keywords: durable solutions, forced displacement, protracted conflict, refugee studies, narrative building, memory, right to return
Procedia PDF Downloads 155113 Crash and Injury Characteristics of Riders in Motorcycle-Passenger Vehicle Crashes
Authors: Z. A. Ahmad Noor Syukri, A. J. Nawal Aswan, S. V. Wong
Abstract:
The motorcycle has become one of the most common type of vehicles used on the road, particularly in the Asia region, including Malaysia, due to its size-convenience and affordable price. This study focuses only on crashes involving motorcycles with passenger cars consisting 43 real world crashes obtained from in-depth crash investigation process from June 2016 till July 2017. The study collected and analyzed vehicle and site parameters obtained during crash investigation and injury information acquired from the patient-treating hospital. The investigation team, consisting of two personnel, is stationed at the Emergency Department of the treatment facility, and was dispatched to the crash scene once receiving notification of the related crashes. The injury information retrieved was coded according to the level of severity using the Abbreviated Injury Scale (AIS) and classified into different body regions. The data revealed that weekend crashes were significantly higher for the night time period and the crash occurrence was the highest during morning hours (commuting to work period) for weekdays. Bad weather conditions play a minimal effect towards the occurrence of motorcycle – passenger vehicle crashes and nearly 90% involved motorcycles with single riders. Riders up to 25 years old are heavily involved in crashes with passenger vehicles (60%), followed by 26-55 year age group with 35%. Male riders were dominant in each of the age segments. The majority of the crashes involved side impacts, followed by rear impacts and cars outnumbered the rest of the passenger vehicle types in terms of crash involvement with motorcycles. The investigation data also revealed that passenger vehicles were the most at-fault counterpart (62%) when involved in crashes with motorcycles and most of the crashes involved situations whereby both of the vehicles are travelling in the same direction and one of the vehicles is in a turning maneuver. More than 80% of the involved motorcycle riders had sustained yellow severity level during triage process. The study also found that nearly 30% of the riders sustained injuries to the lower extremities, while MAIS level 3 injuries were recorded for all body regions except for thorax region. The result showed that crashes in which the motorcycles were found to be at fault were more likely to occur during night and raining conditions. These types of crashes were also found to be more likely to involve other types of passenger vehicles rather than cars and possess higher likelihood in resulting higher ISS (>6) value to the involved rider. To reduce motorcycle fatalities, it first has to understand the characteristics concerned and focus may be given on crashes involving passenger vehicles as the most dominant crash partner on Malaysian roads.Keywords: motorcycle crash, passenger vehicle, in-depth crash investigation, injury mechanism
Procedia PDF Downloads 322