Search results for: internet protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2653

Search results for: internet protocol

1243 The Pedagogical Functions of Arts and Cultural-Heritage Education with ICTs in Museums – A Case Study of FINNA and Google Art

Authors: Pei Zhao, Sara Sintonen, Heikki Kynäslahti

Abstract:

Digital museums and arts galleries have become popular in museum education and management. Museum and arts galleries website is one of the most effective and efficient ways. Google, a corporation specializing in Internet-related services and projects, not only puts high-resolution arts images online, but also uses augmented-reality in digital art gallery. The Google Art Project, Google’s production, provides users a platform in appreciating and learning arts. After Google Art Project, more and more countries released their own museum and arts gallery websites, like British Paining in BBC, and FINNA in Finland. Pedagogical function in these websites is one of the most important functions. In this paper, we use Google Art Project and FINNA as the case studies to investigate what kinds of pedagogical functions exist in these websites. Finally, this paper will give the recommendation to digital museums and websites development, especially the pedagogical functions development, in the future.

Keywords: arts education, cultural-heritage education, education with ICTs, pedagogical functions

Procedia PDF Downloads 530
1242 Rethinking News Aggregation to Achieve Depolarization

Authors: Kushagra Khandelwal, Chinmay Anand, Sharmistha Banerjee

Abstract:

This paper presents an approach to news aggregation that is aimed at solving the issues centered on depolarization and manipulation of news information and stories. Largest democracies across the globe face numerous issues related to news democratization. With the advancements in technology and increasing outreach, web has become an important information source which is inclusive of news. Research was focused on the current millennial population consisting of modern day internet users. The study involved literature review, an online survey, an expert interview with a journalist and a focus group discussion with the user groups. The study was aimed at investigating problems associated with the current news system from both the consumer as well as distributor point of view. The research findings helped in producing five key potential opportunity areas which were explored for design intervention. Upon ideation, we identified five design features which include opinion aggregation. Categorized opinions, news tracking, online discussion and ability to take actions that support news democratization.

Keywords: citizen journalism, democratization, depolarized news, napsterization, news aggregation, opinions

Procedia PDF Downloads 194
1241 Nigerian Central Bank Governor’s Autonomy: Disregard of Procedure for Removal Vis-A-Vis the Rule of Law

Authors: Adeola Ayodele Oluwabiyi

Abstract:

The study undertook an in depth examination of the relevant sections of the Nigerian Constitution and the Central Bank of Nigeria (CBN) Act as it relates to the appointment and removal of the CBN Governor; It analysed the Constitutional issues that arose from the removal of the immediate past Governor of the CBN; and made recommendations as appropriate. The study relied on primary and secondary sources of information. The primary sources included the Constitution of the Federal Republic of Nigeria, Statutes, Conventions and Judicial decisions, while the secondary sources included Books, Journals Articles, Newspapers and Internet Materials. The study revealed that the removal of the CBN Governor was not in accordance with the Nigerian Constitution and the CBN Act that Guarantee such. It also revealed some of the arguments in support of the removal. The study concluded that the removal of the immediate past Governor of CBN was an outright disregard for the rule of law. The study concluded that if Government treat the laws in question with levity and contempt the confidence of the citizens in such government will be seriously eroded and the effect of that will be the beginning of anarchy in replacement of the rule of law. It could also have serious economic implications on the economy of any nation.

Keywords: central bank, governor, laws, Nigeria

Procedia PDF Downloads 378
1240 Automatic Classification of Periodic Heart Sounds Using Convolutional Neural Network

Authors: Jia Xin Low, Keng Wah Choo

Abstract:

This paper presents an automatic normal and abnormal heart sound classification model developed based on deep learning algorithm. MITHSDB heart sounds datasets obtained from the 2016 PhysioNet/Computing in Cardiology Challenge database were used in this research with the assumption that the electrocardiograms (ECG) were recorded simultaneously with the heart sounds (phonocardiogram, PCG). The PCG time series are segmented per heart beat, and each sub-segment is converted to form a square intensity matrix, and classified using convolutional neural network (CNN) models. This approach removes the need to provide classification features for the supervised machine learning algorithm. Instead, the features are determined automatically through training, from the time series provided. The result proves that the prediction model is able to provide reasonable and comparable classification accuracy despite simple implementation. This approach can be used for real-time classification of heart sounds in Internet of Medical Things (IoMT), e.g. remote monitoring applications of PCG signal.

Keywords: convolutional neural network, discrete wavelet transform, deep learning, heart sound classification

Procedia PDF Downloads 330
1239 Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations

Authors: Mohamed Rasslan, Doaa Abdelrahman, Mahmoud M. Nasreldin, Ghada Farouk, Heba K. Aslan

Abstract:

Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated.

Keywords: Cryptocurrencies, Blockchain, Bitcoin, Smart Contracts, Peer-to-Peer Network, Security Issues, Privacy Techniques

Procedia PDF Downloads 61
1238 Addictive Use Due to Personality: Focused on Big Five Personality Traits and Game Addiction

Authors: Eui Jun Jeong, Hye Rim Lee, Ji Hye Yoo

Abstract:

Recent studies have verified the significant relationship of user personality with Internet use. However, in game studies, little research has emphasized on the effects of personality traits on game addiction. This study examined whether big five personality traits affect game addiction with control of psychological, social, and demographic factors. Specifically, using data from a survey of 789 game users in Korea, we conducted a regression analysis to see the associations of psychological (loneliness/depression), social (activities with family/friends), self-efficacy (game/general), gaming (daily gaming time/perception), demographic (age/gender), and personality traits (extraversion, neuroticism conscientiousness, agreeableness, & openness) with the degree of game addiction. Results showed that neuroticism increase game addiction with no effect of extraversion on the addiction. General self-efficacy negatively affected game addiction, whereas game self-efficacy increased the degree of game addiction. Loneliness enhanced game addiction while depression showed a negative effect on the addiction. Results and implications are discussed.

Keywords: game addiction, big five personality, social activities, self-efficacy, loneliness, depression

Procedia PDF Downloads 550
1237 Proposition on Improving Environmental Forensic System in China

Authors: Huilei Wang, Yuanfeng Wang

Abstract:

In the early period of China, economy developed rapidly at the cost of environment. Recently, it is generally recognized that the heavily polluted environment not only puts a brake on economic development but also paces negative impact on people’ health as well as probably next decades of generations. Accordingly, the latest Environmental Protection Law revised in 2014 makes a clear-cut division of environmental responsibility and regulates stricter penalties of breaching law. As the new environmental law is enforced gradually, environmental forensic is increasingly required in the process of ascertaining facts in judicial proceedings of environmental cases. Based on the outcomes of documentary analysis for all environmental cases judged on the basis of new environmental law, it is concluded that there still exists problems in present system of environmental forensic. Thus, this paper is aimed to make proposition on improving Chinese environmental forensic system, which involves: (i) promoting capability of environmental forensic system (EFS) to handle professional questions; (ii) develop price mechanism; (iii) multi-departments cooperate to establish unifying and complete EFS system;(iv) enhance the probative value of results of EFS. Such protocol for amending present regulation on environmental forensic is of significant importance because a quality report of environmental forensic will contributes to providing strong probative evidence of culprits’ activity of releasing contaminant into environment, degree of damages for victims and above all, causality between the behavior of public nuisance and damages.

Keywords: China, environmental cases, environmental forensic system, proposition

Procedia PDF Downloads 357
1236 Sentiment Analysis: An Enhancement of Ontological-Based Features Extraction Techniques and Word Equations

Authors: Mohd Ridzwan Yaakub, Muhammad Iqbal Abu Latiffi

Abstract:

Online business has become popular recently due to the massive amount of information and medium available on the Internet. This has resulted in the huge number of reviews where the consumers share their opinion, criticisms, and satisfaction on the products they have purchased on the websites or the social media such as Facebook and Twitter. However, to analyze customer’s behavior has become very important for organizations to find new market trends and insights. The reviews from the websites or the social media are in structured and unstructured data that need a sentiment analysis approach in analyzing customer’s review. In this article, techniques used in will be defined. Definition of the ontology and description of its possible usage in sentiment analysis will be defined. It will lead to empirical research that related to mobile phones used in research and the ontology used in the experiment. The researcher also will explore the role of preprocessing data and feature selection methodology. As the result, ontology-based approach in sentiment analysis can help in achieving high accuracy for the classification task.

Keywords: feature selection, ontology, opinion, preprocessing data, sentiment analysis

Procedia PDF Downloads 183
1235 Online Escape Room for Intergenerational Play

Authors: David Kaufman

Abstract:

Despite the ‘silver Tsunami’ that is occurring worldwide, ageism is still a problem in modern society. As well, families are becoming increasingly separated geographically. This paper will discuss these issues and one potential solution - an online escape room game that is played by two players over the internet while talking to each other. The payers can be two seniors or one senior and one youth, e.g., a grandchild. Each player sees a different view of the game environment and players must collaborate in order to solve the puzzles presented and escape from the three rooms, all connected by a maze. The game was developed by Masters students at the Centre for Digital Media in Vancouver, BC in collaboration with a team of post-doctoral scholar, graduate students and faculty member, as well as 10 seniors who assisted. This paper will describe the game, development process and results of our pilot studies. The research study conducted comprises several stages: 1. several formative evaluation sessions with seniors to obtain feedback to assist further design, and 2. field testing of the game. Preliminary results have been extremely positive and results of our field tests will be presented in this paper.

Keywords: digital game, online escape room, intergenerational play, seniors

Procedia PDF Downloads 340
1234 Cryoinjuries in Sperm Cells: Effect of Adaptation of Steps in Cryopreservation Protocol for Boar Semen upon Post-Thaw Sperm Quality

Authors: Aftab Ali

Abstract:

Cryopreservation of semen is one of the key factors for a successful breeding business along with other factors. To achieve high fertility in boar, one should know about spermatozoa response to different treatments proceeds during cryopreservation. The running project is highly focused on cryopreservation and its effects on sperm quality parameters in both boar and bull semen. Semen sample from A, B, C, and D, were subjected to different thawing conditions and were analyzed upon different treatments in the study. Parameters like sperm cell motility, viability, acrosome, DNA integrity, and phospholipase C zeta were detected by different established methods. Different techniques were used to assess different parameters. Motility was detected using computer assisted sperm analysis, phospholipase C zeta using luminometry while viability, acrosome integrity, and DNA integrity were analyzed using flow cytometry. Thawing conditions were noted to have an effect on sperm quality parameters with motility being the most critical parameter. The results further indicated that the most critical step during cryopreservation of boar semen is when sperm cells are subjected to freezing and thawing. The findings of the present study provide insight that; boar semen cryopreservation is still suboptimal in comparison to bull semen cryopreservation. Thus, there is a need to conduct more research to improve the fertilizing potential of cryopreserved boar semen.

Keywords: cryopreservation, computer assisted sperm, flow cytometry, luminometry

Procedia PDF Downloads 129
1233 Repositioning Nigerian University Libraries for Effective Information Provision and Delivery in This Age of Globalization

Authors: S. O. Uwaifo

Abstract:

The paper examines the pivotal role of the library in university education through the provision of a wide range of information materials (print and non- print) required for the teaching, learning and research activities of the university. However certain impediments to the effectiveness of Nigerian university libraries, such as financial constraints, high foreign exchange, global disparities in accessing the internet, lack of local area networks, erratic electric power supply, absence of ICT literacy, poor maintenance culture, etc., were identified. Also, the necessity of repositioning Nigerian university libraries for effective information provision and delivery was stressed by pointing out their dividends, such as users’ access to Directory of Open Access Journals (DOAJ), Online Public Access Catalogue (OPAC), Institutional Repositories, Electronic Document Delivery, Social Media Networks, etc. It therefore becomes necessary for the libraries to be repositioned by way of being adequately automated or digitized for effective service delivery, in this age of globalization. Based on the identified barriers by this paper, some recommendations were proffered.

Keywords: repositioning, Nigerian university libraries, effective information provision and delivery, globalization

Procedia PDF Downloads 311
1232 Comics Scanlation and Publishing Houses Translation

Authors: Sharifa Alshahrani

Abstract:

Comics is a multimodal text wherein meaning is created by taking in all modes of expression at once. It uses two different semiotic modes, the verbal and the visual modes, together to make meaning and these different semiotic modes can be socially and culturally shaped to give meaning. Therefore, comics translation cannot treat comics as a monomodal text by translating only the verbal mode inside or outside the speech balloons as the cultural differences are encoded in the visual mode as well. Due to the development of the internet and editing software, comics translation is not anymore confined to the publishing houses and official translation as scanlation, or the fan translation took the initiative in translating comics for being emotionally attracted to the culture and genre. Scanlation is carried out by volunteering fans who translate out of passion. However, quality is one of the debatable issues relating to scanlation and fan translation. This study will investigate how the dynamic multimodal relationship in comics is exploited and interpreted in the translation by exploring the translation strategies and procedures adopted by the publishing houses and scanlation in interpreting comics into Arabic using three analytical frameworks; cultural references model, multimodal relation model and translation strategies and procedures models.

Keywords: comics, multimodality, translation, scanlation

Procedia PDF Downloads 194
1231 Conceptualizing IoT Based Framework for Enhancing Environmental Accounting By ERP Systems

Authors: Amin Ebrahimi Ghadi, Morteza Moalagh

Abstract:

This research is carried out to find how a perfect combination of IoT architecture (Internet of Things) and ERP system can strengthen environmental accounting to incorporate both economic and environmental information. IoT (e.g., sensors, software, and other technologies) can be used in the company’s value chain from raw material extraction through materials processing, manufacturing products, distribution, use, repair, maintenance, and disposal or recycling products (Cradle to Grave model). The desired ERP software then will have the capability to track both midpoint and endpoint environmental impacts on a green supply chain system for the whole life cycle of a product. All these enable environmental accounting to calculate, and real-time analyze the operation environmental impacts, control costs, prepare for environmental legislation and enhance the decision-making process. In this study, we have developed a model on how to use IoT devices in life cycle assessment (LCA) to gather emissions, energy consumption, hazards, and wastes information to be processed in different modules of ERP systems in an integrated way for using in environmental accounting to achieve sustainability.

Keywords: ERP, environmental accounting, green supply chain, IOT, life cycle assessment, sustainability

Procedia PDF Downloads 155
1230 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing

Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas

Abstract:

This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.

Keywords: cyber security, threat intelligence, forensics, heath care

Procedia PDF Downloads 43
1229 Feature-Based Summarizing and Ranking from Customer Reviews

Authors: Dim En Nyaung, Thin Lai Lai Thein

Abstract:

Due to the rapid increase of Internet, web opinion sources dynamically emerge which is useful for both potential customers and product manufacturers for prediction and decision purposes. These are the user generated contents written in natural languages and are unstructured-free-texts scheme. Therefore, opinion mining techniques become popular to automatically process customer reviews for extracting product features and user opinions expressed over them. Since customer reviews may contain both opinionated and factual sentences, a supervised machine learning technique applies for subjectivity classification to improve the mining performance. In this paper, we dedicate our work is the task of opinion summarization. Therefore, product feature and opinion extraction is critical to opinion summarization, because its effectiveness significantly affects the identification of semantic relationships. The polarity and numeric score of all the features are determined by Senti-WordNet Lexicon. The problem of opinion summarization refers how to relate the opinion words with respect to a certain feature. Probabilistic based model of supervised learning will improve the result that is more flexible and effective.

Keywords: opinion mining, opinion summarization, sentiment analysis, text mining

Procedia PDF Downloads 312
1228 The Role of Smartphones on Iranian Couples' Relationship: An Analysis

Authors: Niloofar Hooman

Abstract:

The present study aims at investigating the positive and negative effects of using Smartphones on couples committed relationships. Despite the fact that many couples may benefit from the positive aspects of Smartphones, it is not clear how their feeling of trust, intimacy and connection in their relationships get affected by Smartphones. This is important as it highlights the ambivalent influences of Smartphones on couple’s relationships. On the one hand, Smartphones can enhance their social and emotional interactions and on the other hand, they can cause mistrust and isolation between them. Trust, intimacy and honesty are of important factors through which a stable relationship can be constructed. Nevertheless, some characteristics of Smartphones such as being fluid and personalized can harm the relationship and consequently destroy it. Thus, it is necessary to investigate how Iranian couples in committed relationships use Smartphone to manage their relationship and how couples feel Smartphone have enhanced or detracted a sense of trust, intimacy and connection with their partner? In the first phase of the study, in-depth-interview will be conducted with 30 couples and data will be analyzed using NVIVO software. In the next phase of the study, 1500 participants aged 20 and above will be selected based on cluster sampling. Data will be analyzed both qualitatively and quantitatively.

Keywords: couple, family, internet, intimacy, Smartphone, trust

Procedia PDF Downloads 373
1227 An Agent-Based Modelling Simulation Approach to Calculate Processing Delay of GEO Satellite Payload

Authors: V. Vicente E. Mujica, Gustavo Gonzalez

Abstract:

The global coverage of broadband multimedia and internet-based services in terrestrial-satellite networks demand particular interests for satellite providers in order to enhance services with low latencies and high signal quality to diverse users. In particular, the delay of on-board processing is an inherent source of latency in a satellite communication that sometimes is discarded for the end-to-end delay of the satellite link. The frame work for this paper includes modelling of an on-orbit satellite payload using an agent model that can reproduce the properties of processing delays. In essence, a comparison of different spatial interpolation methods is carried out to evaluate physical data obtained by an GEO satellite in order to define a discretization function for determining that delay. Furthermore, the performance of the proposed agent and the development of a delay discretization function are together validated by simulating an hybrid satellite and terrestrial network. Simulation results show high accuracy according to the characteristics of initial data points of processing delay for Ku bands.

Keywords: terrestrial-satellite networks, latency, on-orbit satellite payload, simulation

Procedia PDF Downloads 250
1226 Cybersecurity Protective Behavior in Industrial Revolution 4.0 Era: A Conceptual Framework

Authors: Saif Hussein Abdallah Alghazo, Norshima Humaidi

Abstract:

Adopting cybersecurity protective behaviour among the employees is seriously considered in the organization, especially when the Internet of Things (IoT) is widely used in Industrial Revolution 4.0 (IR 4.0) era. Cybersecurity issues arise due to weaknesses of employees’ behaviour such as carelessness and failure to adopt good practices of information security behaviour. Therefore, this study aims to explore the dimensions that might influence employees’ behaviour to adopt good cybersecurity practices and to develop a new holistic model related to this concept. The study proposed this by reviewing the existing works of literature related to this field extensively, especially by focusing on the existing theory such as Protection Motivation Theory (PMT). Moreover, this study has also explored the role of cybersecurity competency among the security manager in the organization since this construct is essential to enhance the protective behaviour towards cybersecurity among the employees in the organization. The proposed research model is important to be quantitatively tested in the future as the findings will serve as the input to the act that will enhance employee’s cybersecurity protective behaviour in the IR 4.0 environment.

Keywords: cybersecurity protective behaviour, protection motivation theory, IR 4.0, cybersecurity competency

Procedia PDF Downloads 127
1225 Facility Anomaly Detection with Gaussian Mixture Model

Authors: Sunghoon Park, Hank Kim, Jinwon An, Sungzoon Cho

Abstract:

Internet of Things allows one to collect data from facilities which are then used to monitor them and even predict malfunctions in advance. Conventional quality control methods focus on setting a normal range on a sensor value defined between a lower control limit and an upper control limit, and declaring as an anomaly anything falling outside it. However, interactions among sensor values are ignored, thus leading to suboptimal performance. We propose a multivariate approach which takes into account many sensor values at the same time. In particular Gaussian Mixture Model is used which is trained to maximize likelihood value using Expectation-Maximization algorithm. The number of Gaussian component distributions is determined by Bayesian Information Criterion. The negative Log likelihood value is used as an anomaly score. The actual usage scenario goes like a following. For each instance of sensor values from a facility, an anomaly score is computed. If it is larger than a threshold, an alarm will go off and a human expert intervenes and checks the system. A real world data from Building energy system was used to test the model.

Keywords: facility anomaly detection, gaussian mixture model, anomaly score, expectation maximization algorithm

Procedia PDF Downloads 254
1224 Crossbite Unilateral Correction Using Transpalatal Arch with Extension Arm Modification

Authors: Hanifa Maryani Ahmad, Muslim Yusuf

Abstract:

Background: Unilateral crossbite can be defined as an abnormal transverse relationship between the upper and lower teeth where the mandibular buccal cusp occluding to the maxillary buccal cusp and which involves only one side of the arch. This report describes the treatment of an adolescent female with Class III malocclussion unilateral crossbite resulting from a mildly constricted maxillary arch. The patient had a Class III skeletal relationship, Class III molar relationships, unilateral crossbite on the left side, and deviated midlines. Objectives: The treatment objectives were to correct the abnormal transverse relationship, achieve proper dental inclination, and correct the unilateral crossbites to improve the facial profile. Case management: The treatment protocol was using transpalatal arch with extension arm modification to expand the maxillary arch. Following the levelling and aligning stage of treatment, using a vertical loop while mandibular arch was expanded after getting an end to end relationship on the anterior side. Results: Corrections of the unilateral crossbite were achieved in 4 months. The treatment is still on process because the canines relationship were not corrected. Conclusions: This report highlights a treatment using transpalatal arch with extension arm modification that can be used to expand the transverse width of an arch to correct the discrepancy. Even though the treatment processes were still ongoing, the correction of the unilateral crossbite have been achieved in 4 months by only using the transpalatal arch.

Keywords: crossbite unilateral, late growing, non-extraction, transpalatal arch

Procedia PDF Downloads 203
1223 Artificial Intelligence for Cloud Computing

Authors: Sandesh Achar

Abstract:

Artificial intelligence is being increasingly incorporated into many applications across various sectors such as health, education, security, and agriculture. Recently, there has been rapid development in cloud computing technology, resulting in AI’s implementation into cloud computing to enhance and optimize the technology service rendered. The deployment of AI in cloud-based applications has brought about autonomous computing, whereby systems achieve stated results without human intervention. Despite the amount of research into autonomous computing, work incorporating AI/ML into cloud computing to enhance its performance and resource allocation remain a fundamental challenge. This paper highlights different manifestations, roles, trends, and challenges related to AI-based cloud computing models. This work reviews and highlights excellent investigations and progress in the domain. Future directions are suggested for leveraging AI/ML in next-generation computing for emerging computing paradigms such as cloud environments. Adopting AI-based algorithms and techniques to increase operational efficiency, cost savings, automation, reducing energy consumption and solving complex cloud computing issues are the major findings outlined in this paper.

Keywords: artificial intelligence, cloud computing, deep learning, machine learning, internet of things

Procedia PDF Downloads 87
1222 Characterizing Content Language Integrated Learning (CLIL) Teaching in an EFL Primary School: A Case Study

Authors: Alfia Sari

Abstract:

The implementation of the Content Language Integrated Learning (CLIL) approach in Indonesia has shown positive impacts in several educational institutions. Several studies have proven the benefits of implementing the CLIL approach, including the development of students’ language and content subject knowledge. Interestingly, one primary school in Surabaya, Indonesia, has been successfully implementing the CLIL approach. The students achieved high content and language subject scores, and the school was accredited A. A study on how the CLIL approach was practiced is important to investigate how teachers implemented it and how students benefited from it. Therefore, this present study attempted to investigate the implementation of the CLIL approach in this school to characterize good practices that can be implemented in other schools. A case study was conducted to observe its implementation in the third-grade classes (English, Science, and Math) by using the Protocol for Language Arts Teaching Observation (PLATO). The findings indicated that the CLIL teaching in this school accommodated the content and language well (scores 3-4). The content and language were clearly integrated, and the teachers successfully carried out the subjects in English. Teachers offered students opportunities to listen, speak, read, and write using the target language. This study described some characteristics of CLIL teaching in primary school that can be used as examples for future CLIL teachers to integrate the content and language in their teaching practices.

Keywords: CLIL, ELT, young learners, case study

Procedia PDF Downloads 24
1221 Challenges of Online Education and Emerging E-Learning Technologies in Nigerian Tertiary Institutions Using Adeyemi College of Education as a Case Study

Authors: Oluwatofunmi Otobo

Abstract:

This paper presents a review of the challenges of e-learning and e-learning technologies in tertiary institutions. This review is based on the researchers observations of the challenges of making use of ICT for learning in Nigeria using Adeyemi College of Education as a case study; this is in comparison to tertiary institutions in the UK, US and other more developed countries. In Nigeria and probably Africa as a whole, power is the major challenge. Its inconsistency and fluctuations pose the greatest challenge to making use of online education inside and outside the classroom. Internet and its supporting infrastructures in many places in Nigeria are slow and unreliable. This, in turn, could frustrate any attempt at making use of online education and e-learning technologies. Lack of basic knowledge of computer, its technologies and facilities could also prove to be a challenge as many young people up until now are yet to be computer literate. Personal interest on both the parts of lecturers and students is also a challenge. Many people are not interested in learning how to make use of technologies. This makes them resistant to changing from the ancient methods of doing things. These and others were reviewed by this paper, suggestions, and recommendations were proffered.

Keywords: education, e-learning, Nigeria, tertiary institutions

Procedia PDF Downloads 178
1220 Energy Efficient Clustering with Reliable and Load-Balanced Multipath Routing for Wireless Sensor Networks

Authors: Alamgir Naushad, Ghulam Abbas, Shehzad Ali Shah, Ziaul Haq Abbas

Abstract:

Unlike conventional networks, it is particularly challenging to manage resources efficiently in Wireless Sensor Networks (WSNs) due to their inherent characteristics, such as dynamic network topology and limited bandwidth and battery power. To ensure energy efficiency, this paper presents a routing protocol for WSNs, namely, Enhanced Hybrid Multipath Routing (EHMR), which employs hierarchical clustering and proposes a next hop selection mechanism between nodes according to a maximum residual energy metric together with a minimum hop count. Load-balancing of data traffic over multiple paths is achieved for a better packet delivery ratio and low latency rate. Reliability is ensured in terms of higher data rate and lower end-to-end delay. EHMR also enhances the fast-failure recovery mechanism to recover a failed path. Simulation results demonstrate that EHMR achieves a higher packet delivery ratio, reduced energy consumption per-packet delivery, lower end-to-end latency, and reduced effect of data rate on packet delivery ratio when compared with eminent WSN routing protocols.

Keywords: energy efficiency, load-balancing, hierarchical clustering, multipath routing, wireless sensor networks

Procedia PDF Downloads 60
1219 A Mechanism of Reusable, Portable, and Reliable Script Generator on Android

Authors: Kuei-Chun Liu, Yu-Yu Lai, Ching-Hong Wu

Abstract:

A good automated testing tool could reduce as much as possible the manual work done by testers. Traditional record-replay testing tool provides an automated testing solution by recording mouse coordinates as test scripts, but it will be easily broken if any change of resolutions. Therefore, more and more testers design multiple test scripts to automate the testing process for different devices. In order to improve the traditional record-replay approach and reduce the effort that the testers spending on writing test scripts, we propose an approach for generating the Android application test scripts based on accessibility service without connecting to a computer. This approach simulates user input actions and replays them correctly even at the different conditions such as the internet connection is unstable when the device under test, the different resolutions on Android devices. In this paper, we describe how to generate test scripts automatically and make a comparison with existing tools for Android such as Robotium, Appium, UIAutomator, and MonkeyTalk.

Keywords: accessibility service, Appium, automated testing, MonkeyTalk, Robotium, testing, UIAutomator

Procedia PDF Downloads 356
1218 Evaluation of the Patient Identification Process in Healthcare Facilities in a Brazilian City Area

Authors: Carmen Silvia Gabriel, Maria de Fátima Paiva Brito, Mariane de Paula Candido, Vanessa Barato Oliveira

Abstract:

Patient identification is a necessary practice to ensure patient safety in any healthcare environment, including emergency care units, test laboratories, home care and clinics. The present study aimed to provide evidence that can effectively contribute to practices concerning patient identification. Its objective was to investigate patient identification in basic healthcare units through patient safety standards. To do so, a descriptive and non-experimental research outline study was carried out to inquire how patient identification takes place in a particular situation. All technical manager nurses from the chosen healthcare facilities were included in the sample for the study. Data was collected in September of 2014 after approval from the Committee of Ethics. All researched institutions fit the same profile: they’re public facilities for general care with observation beds. None of them has a wristband identification protocol or policy. Only one institution mentioned using some kind of visual identification; namely, body tags separated by colors according to the type of care, but it still does not apply the recommended tags by the Brazilian Ministry of Health. This study allowed the authors to acknowledge how important the commitment from the whole healthcare team in the patient identification process is and also acknowledge how necessary it is to implement institutional policies that may aid the healthcare units in this area to promote a quality and safe patient care.

Keywords: patient safety, identification, nursing, emergency care units

Procedia PDF Downloads 388
1217 Influence of Instructors in Engaging Online Graduate Students in Active Learning in the United States

Authors: Ehi E. Aimiuwu

Abstract:

As of 2017, many online learning professionals, institutions, and journals are still wondering how instructors can keep student engaged in the online learning environment to facilitate active learning effectively. The purpose of this qualitative single-case and narrative research is to explore whether online professors understand their role as mentors and facilitators of students’ academic success by keeping students engaged in active learning based on personalized experience in the field. Data collection tools that were used in the study included an NVivo 12 Plus qualitative software, an interview protocol, a digital audiotape, an observation sheet, and a transcription. Seven online professors in the United States from LinkedIn and residencies were interviewed for this study. Eleven online teaching techniques from previous research were used as the study framework. Data analysis process, member checking, and key themes were used to achieve saturation. About 85.7% of professors agreed on rubric as the preferred online grading technique. About 57.1% agreed on professors logging in daily, students logging in about 2-5 times weekly, knowing students to increase accountability, email as preferred communication tool, and computer access for adequate online learning. About 42.9% agreed on syllabus for clear class expectations, participation to show what has been learned, and energizing students for creativity.

Keywords: class facilitation, class management, online teaching, online education, pedagogy

Procedia PDF Downloads 99
1216 The Effectiveness of Mindfulness Education on Emotional, Psychological, and Social Well-Being in 12th Grade Students in Tehran City

Authors: Fariba Dortaj, H. Bashir Nejad, Akram Dortaj,

Abstract:

Investigate the Effectiveness of Mindfulness Education on Emotional, Psychological, and Social Well-being in 12th grade students in Tehran city is the aim of present study. The research method is semi-experimental with pretest-posttest design with control group. The statistical population of the study includes all 12th grade students of the 12th district of Tehran city in the academic year of 2017 to 2018. From the mentioned population, 60 students had earned low scores in three dimensions of Subjective Well-Being Questionnaire of Keyes and Magyar-Moe (2003) by using random sampling method and they were selected and randomly assigned into 2 experimental and control groups. Then experimental groups were received a Mindfulness protocol in 8 sessions during 2 hours. After completion of the sessions, all subjects were re-evaluated. Data were analyzed by using multivariate analysis of covariance. The findings of this study showed that in the emotional well-being aspect with the components of positive emotional affection (P < 0.025, F = 17/80) and negative emotions (P <0.025, F = 5/41), in the psychological well-being of the components Self-esteem (P < 0.008, F = 25.26), life goal (P < 0.008, F = 38.19), environmental domination (P <0.008, F=82.82), relationships with others (P < 0.008, F = 19.12), personal development with (P < 0.008, F = 87.38), and in the social well-being aspect, the correlation coefficients with (P<0.01, F=12/21), admission and acceptability with (P <0.01, F =18.09) and realism with (P <0.01, F = 11.30), there was a significant difference between the experimental and control groups and it can be said that the education of mindfulness affects the improvement of components of psychological, social and emotional well-being in students.

Keywords: mindfulness, emotional well-being, psychological well-being, social well-being

Procedia PDF Downloads 151
1215 Changing Trends in the Use of Induction Agents for General Anesthesia for Cesarean Section

Authors: Mahmoud Hassanin, Amita Gupta

Abstract:

Background: During current practice, Thiopentone is not cost-effectively added to resources wastage, risk of drug error with antibiotics, short shelf life, infection risk, and risk of delay while preparing during category one cesarean section. There is no significant difference or preference to the other alternative as per current use. Aims and Objectives: Patient safety, Cost-effective use of trust resources, problem awareness, Consider improvising on the current practice. Methods: In conjunction with the local department survey results, many studies support the change. Results: More than 50%(15 from 29) are already using Propofol, more than 75% of the participant are willing to shift to Propofol if it becomes standard, and the cost analysis also revealed that Thiopentone 10 X500=£60 Propofol 10X200= £5.20, Cost of Thiopentone/year =£2190. Approximately GA in a year =35-40 could cost approximately £20 Propofol, given it is a well-established practice. We could save not only money, but it will be environmentally friendly also to avoid adding any carbon footprints. Recommendation: Thiopentone is rarely used as an induction agent for the category one Caesarean section in our obstetric emergency theatres. Most obstetric anesthetists are using Propofol. Keep both Propofol and thiopentone(powder not withdrawn) in the cat one cesarean section emergency drugs tray ready until the department completely changes the practice protocol. A further retrospective study is required to compare the outcomes for these induction agents through the local database.

Keywords: thiopentone, propofol, category 1 caesarean, induction agents

Procedia PDF Downloads 121
1214 Using AI Based Software as an Assessment Aid for University Engineering Assignments

Authors: Waleed Al-Nuaimy, Luke Anastassiou, Manjinder Kainth

Abstract:

As the process of teaching has evolved with the advent of new technologies over the ages, so has the process of learning. Educators have perpetually found themselves on the lookout for new technology-enhanced methods of teaching in order to increase learning efficiency and decrease ever expanding workloads. Shortly after the invention of the internet, web-based learning started to pick up in the late 1990s and educators quickly found that the process of providing learning material and marking assignments could change thanks to the connectivity offered by the internet. With the creation of early web-based virtual learning environments (VLEs) such as SPIDER and Blackboard, it soon became apparent that VLEs resulted in higher reported computer self-efficacy among students, but at the cost of students being less satisfied with the learning process . It may be argued that the impersonal nature of VLEs, and their limited functionality may have been the leading factors contributing to this reported dissatisfaction. To this day, often faced with the prospects of assigning colossal engineering cohorts their homework and assessments, educators may frequently choose optimally curated assessment formats, such as multiple-choice quizzes and numerical answer input boxes, so that automated grading software embedded in the VLEs can save time and mark student submissions instantaneously. A crucial skill that is meant to be learnt during most science and engineering undergraduate degrees is gaining the confidence in using, solving and deriving mathematical equations. Equations underpin a significant portion of the topics taught in many STEM subjects, and it is in homework assignments and assessments that this understanding is tested. It is not hard to see that this can become challenging if the majority of assignment formats students are engaging with are multiple-choice questions, and educators end up with a reduced perspective of their students’ ability to manipulate equations. Artificial intelligence (AI) has in recent times been shown to be an important consideration for many technologies. In our paper, we explore the use of new AI based software designed to work in conjunction with current VLEs. Using our experience with the software, we discuss its potential to solve a selection of problems ranging from impersonality to the reduction of educator workloads by speeding up the marking process. We examine the software’s potential to increase learning efficiency through its features which claim to allow more customized and higher-quality feedback. We investigate the usability of features allowing students to input equation derivations in a range of different forms, and discuss relevant observations associated with these input methods. Furthermore, we make ethical considerations and discuss potential drawbacks to the software, including the extent to which optical character recognition (OCR) could play a part in the perpetuation of errors and create disagreements between student intent and their submitted assignment answers. It is the intention of the authors that this study will be useful as an example of the implementation of AI in a practical assessment scenario insofar as serving as a springboard for further considerations and studies that utilise AI in the setting and marking of science and engineering assignments.

Keywords: engineering education, assessment, artificial intelligence, optical character recognition (OCR)

Procedia PDF Downloads 111