Search results for: memory work
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14361

Search results for: memory work

12951 Co-Existence of Thai Muslim People and Other in an Ancient Community Located in the Heart of Bangkok: The Case Study of Petchaburi 7 Community

Authors: Saowapa Phaithayawat

Abstract:

The objectives of the study are the following: 1) To study the way of life in terms of one hundred years co-existence of the Muslim and local community in this area 2) To analyze factors affect to this community with happy co-existence. The study requires quantitative research to study a history together with the study of humanity. The result of this study showed that the area of Petchburi 7 community is an ancient area which has owned by the Muslim for almost 100 years. There is a sanctuary as the center of unity. Later Bangkok becomes more developed and provides more infrastructures like the motorway and other transportation: however, the owners of lands in this community still keep their lands and build many buildings to run the business. With this purpose, there are many non-Muslim people come to live here with co-existence. Not only do they convenient to work but also easy to transport by sky train. There are factors that make them live harmonious as following: 1) All Muslims in this area are strict to follow their rules and allocate their community for business. 2) All people, who come and live here, are middle-aged and working men and women. They rent rooms closed to their work. 3) There are Muslim food and desserts, especially Roti, the popular fried flour, and local Chachak, tea originated from the south of Thailand. All these food and deserts are famous for working men and women to home and join after work 4) All Muslim in this area are independent to lead their own lives although a society changes rapidly.

Keywords: co-existence, Muslims, other group of people, the ancient community, social sciences

Procedia PDF Downloads 333
12950 A Review Paper for Detecting Zero-Day Vulnerabilities

Authors: Tshegofatso Rambau, Tonderai Muchenje

Abstract:

Zero-day attacks (ZDA) are increasing day by day; there are many vulnerabilities in systems and software that date back decades. Companies keep discovering vulnerabilities in their systems and software and work to release patches and updates. A zero-day vulnerability is a software fault that is not widely known and is unknown to the vendor; attackers work very quickly to exploit these vulnerabilities. These are major security threats with a high success rate because businesses lack the essential safeguards to detect and prevent them. This study focuses on the factors and techniques that can help us detect zero-day attacks. There are various methods and techniques for detecting vulnerabilities. Various companies like edges can offer penetration testing and smart vulnerability management solutions. We will undertake literature studies on zero-day attacks and detection methods, as well as modeling approaches and simulations, as part of the study process.

Keywords: zero-day attacks, exploitation, vulnerabilities

Procedia PDF Downloads 90
12949 Analysing “The Direction of Artificial Intelligence Legislation from a Global Perspective” from the Perspective of “AIGC Copyright Protection” Content

Authors: Xiaochen Mu

Abstract:

Due to the diversity of stakeholders and the ambiguity of ownership boundaries, the current protection models for Artificial Intelligence Generated Content (AIGC) have many disadvantages. In response to this situation, there are three different protection models worldwide. The United States Copyright Office stipulates that works autonomously generated by artificial intelligence ‘lack’ the element of human creation, and non-human AI cannot create works. To protect and promote investment in the field of artificial intelligence, UK legislation, through Section 9(3) of the CDPA, designates the author of AI-generated works as ‘the person by whom the arrangements necessary for the creation of the work are undertaken.’ China neither simply excludes the work attributes of AI-generated content based on the lack of a natural person subject as the sole reason, nor does it generalize that AIGC should or should not be protected. Instead, it combines specific case circumstances and comprehensively evaluates the degree of originality of AIGC and the contributions of natural persons to AIGC. In China's first AI drawing case, the court determined that the image in question was the result of the plaintiff's design and selection through inputting prompt words and setting parameters, reflecting the plaintiff's intellectual investment and personalized expression, and should be recognized as a work in the sense of copyright law. Despite opposition, the ruling also established the feasibility of the AIGC copyright protection path. The recognition of the work attributes of AIGC will not lead to overprotection that hinders the overall development of the AI industry. Just as with the legislation and regulation of AI by various countries, there is a need for a balance between protection and development. For example, the provisional agreement reached on the EU AI Act, based on a risk classification approach, seeks a dynamic balance between copyright protection and the development of the AI industry.

Keywords: generative artificial intelligence, originality, works, copyright

Procedia PDF Downloads 26
12948 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 433
12947 Benjaminian Translatability and Elias Canetti's Life Component: The Other German Speaking Modernity

Authors: Noury Bakrim

Abstract:

Translatability is one of Walter Benjamin’s most influential notions, it is somehow representing the philosophy of language and history of what we might call and what we indeed coined as ‘the other German Speaking Modernity’ which could be shaped as a parallel thought form to the Marxian-Hegelian philosophy of history, the one represented by the school of Frankfurt. On the other hand, we should consider the influence of the plural German speaking identity and the Nietzschian and Goethean heritage, this last being focused on a positive will of power: the humanised human being. Having in perspective the benjaminian notion of translatability (Übersetzbarkeit), to be defined as an internal permanent hermeneutical possibility as well as a phenomenological potential of a translation relation, we are in fact touching this very double limit of both historical and linguistic reason. By life component, we mean the changing conditions of genetic and neurolinguistic post-partum functions, to be grasped as an individuation beyond the historical determinism and teleology of an event. It is, so to speak, the retrospective/introspective canettian auto-fiction, the benjaminian crystallization of the language experience in the now-time of writing/transmission. Furthermore, it raises various questioning points when it comes to translatability, they are basically related to psycholinguistic separate poles, the fatherly ladino Spanish and the motherly Vienna German, but relating more in particular to the permanent ontological quest of a world loss/belonging. Another level of this quest would be the status of Veza Canetti-Taubner Calderón, german speaking Author, Canetti’s ‘literary wife’, writer’s love, his inverted logos, protective and yet controversial ‘official private life partner’, the permanence of the jewish experience in the exiled german language. It sheds light on a traumatic relation of an inadequate/possible language facing the reconstruction of an oral life, the unconscious split of the signifier and above all on the frustrating status of writing in Canetti’s work : Using a suffering/suffered written German to save his remembered acquisition of his tongue/mother tongue by saving the vanishing spoken multilingual experience. While Canetti’s only novel ‘Die Blendung’ designates that fictional referential dynamics focusing on the nazi worldless horizon: the figure of Kien is an onomastic signifier, the anti-Canetti figure, the misunderstood legacy of Kant, the system without thought. Our postulate would be the double translatability of his auto-fiction inventing the bios oral signifier basing on the new praxemes created by Canetti’s german as observed in the English, French translations of his memory corpus. We aim at conceptualizing life component and translatability as two major features of a german speaking modernity.

Keywords: translatability, language biography, presentification, bioeme, life Order

Procedia PDF Downloads 419
12946 The Effects of Normal Aging on Reasoning Ability: A Dual-Process Approach

Authors: Jamie A. Prowse Turner, Jamie I. D. Campbell, Valerie A. Thompson

Abstract:

The objective of the current research was to use a dual-process theory framework to explain these age-related differences in reasoning. Seventy-two older (M = 80.0 years) and 72 younger (M = 24.6 years) adults were given a variety of reasoning tests (i.e., a syllogistic task, base rate task, the Cognitive Reflection Test, and a perspective manipulation), as well as independent tests of capacity (working memory, processing speed, and inhibition), thinking styles, and metacognitive ability, to account for these age-related differences. It was revealed that age-related differences were limited to problems that required Type 2 processing and were related to differences in cognitive capacity, individual difference factors, and strategy choice. Furthermore, older adults’ performance can be improved by reasoning from another’s’ perspective and cannot, at this time, be explained by metacognitive differences between young and older adults. All of these findings fit well within a dual-process theory of reasoning, which provides an integrative framework accounting for previous findings and the findings presented in the current manuscript.

Keywords: aging, dual-process theory, performance, reasoning ability

Procedia PDF Downloads 183
12945 Program of Health/Safety Integration and the Total Worker Health Concept in the Improvement of Absenteeism of the Work Accommodation Management

Authors: L. R. Ferreira, R. Biscaro, C. C. Danziger, C. M. Galhardi, L. C. Biscaro, R. C. Biscaro, I. S. Vasconcelos, L. C. R. Ferreira, R. Reis, L. H. Oliveira

Abstract:

Introduction: There is a worldwide trend for the employer to be aware of investing in health promotion that goes beyond occupational hygiene approaches with the implementation of a comprehensive program with integration between occupational health and safety, and social/psychosocial responsibility in the workplace. Work accommodation is a necessity in most companies as it allows the worker to return to its function respecting its physical limitations. This study had the objective to verify if the integration of health and safety in the companies, with the inclusion of the concept of TWH promoted by an occupational health service has impacted in the management of absenteeism of workers in work accommodation. Method: A retrospective and paired cohort study was used, in which the impact of the implementation of the Program for the Health/Safety Integration and Total Worker Health Concept (PHSITWHC) was evaluated using the indices of absenteeism, health attestations, days and hours of sick leave of workers that underwent job accommodation/rehabilitation. This was a cohort study and the data were collected from January to September of 2017, prior to the initiation of the integration program, and compared with the data obtained from January to September of 2018, after the implementation of the program. For the statistical analysis, the student's t-test was used, with statistically significant differences being made at p < 0.05. Results: The results showed a 35% reduction in the number of absenteeism rate in 2018 compared to the same period in 2017. There was also a significant reduction in the total numbers of days of attestations/absences (mean of 2,8) as well as days of attestations, absence and sick leaves (mean of 5,2) in 2018 data after the implementation of PHSITWHC compared to 2017 data, means of 4,3 and 25,1, respectively, prior to the program. Conclusion: It can be concluded that the inclusion of the PHSITWHC was associated with a reduction in the rate of absenteeism of workers that underwent job accommodation. It was observed that, once health and safety were approached and integrated with the inclusion of the TWH concept, it was possible to reduce absenteeism, and improve worker’s quality of life and wellness, and work accommodation management.

Keywords: absenteeism, health/safety integration, work accommodation management, total worker health

Procedia PDF Downloads 149
12944 Sirhindi Family's Islamic Movements in Sindh, Pakistan

Authors: Nasurullah Qureshi

Abstract:

Shaikh Ahmad Sirhindi Mujadid Alif Thani (1564-1624) and his philosophy had influenced sub-continent as the whole; its rulers and nation. In his reign, he convinced the rulers toward Islamic way of life and succeed in his goal. After his death in 1624, his family consecutively produced prominent scholars to present. Some of them moved to Afghanistan and Pakistan's cities i.e., Jalalabad, Qandhar, Peshawar, Queta, Shikarpur, Hyderabad, and Sehwan. They played a vital role in their areas and transmitted spiritual and legal Islamic teachings to people. This research is aimed to elaborate efforts of the family's Sindh settled branch from 1898-present in fields of politics and Islamic education. Their link with Shaikh Ahmad Sirhindi will be provided in the introduction. After that, the work will explain their scholarly published work briefly in different fields of Islamic studies such as Quran exegeses and its translation in Sindhi language, Hadith and its sciences, Islamic Jurisprudence, Sufism and etc. In addition, their political role will be briefly discussed in the research throughout the period, especially their noticeable role in the separate homeland for Muslims in the subcontinent. Furthermore, the impact of their scholarly work, political influence and spirituality will be enlightened. Lastly, the research will present the critical viewpoint on their struggle.

Keywords: Shaikh Ahmad Sirhindi, Sirhindi scholars, Sindh, Sufism

Procedia PDF Downloads 237
12943 Overview and Future Opportunities of Sarcasm Detection on Social Media Communications

Authors: Samaneh Nadali, Masrah Azrifah Azmi Murad, Nurfadhlina Mohammad Sharef

Abstract:

Sarcasm is a common phenomenon in social media which is a nuanced form of language for stating the opposite of what is implied. Due to the intentional ambiguity, analysis of sarcasm is a difficult task not only for a machine but even for a human. Although sarcasm detection has an important effect on sentiment, it is usually ignored in social media analysis because sarcasm analysis is too complicated. While there is a few systems exist which can detect sarcasm, almost no work has been carried out on a study and the review of the existing work in this area. This survey presents a nearly full image of sarcasm detection techniques and the related fields with brief details. The main contributions of this paper include the illustration of the recent trend of research in the sarcasm analysis and we highlight the gaps and propose a new framework that can be explored.

Keywords: sarcasm detection, sentiment analysis, social media, sarcasm analysis

Procedia PDF Downloads 448
12942 2D Point Clouds Features from Radar for Helicopter Classification

Authors: Danilo Habermann, Aleksander Medella, Carla Cremon, Yusef Caceres

Abstract:

This paper aims to analyze the ability of 2d point clouds features to classify different models of helicopters using radars. This method does not need to estimate the blade length, the number of blades of helicopters, and the period of their micro-Doppler signatures. It is also not necessary to generate spectrograms (or any other image based on time and frequency domain). This work transforms a radar return signal into a 2D point cloud and extracts features of it. Three classifiers are used to distinguish 9 different helicopter models in order to analyze the performance of the features used in this work. The high accuracy obtained with each of the classifiers demonstrates that the 2D point clouds features are very useful for classifying helicopters from radar signal.

Keywords: helicopter classification, point clouds features, radar, supervised classifiers

Procedia PDF Downloads 214
12941 Sleep Scheduling Schemes Integrating Relay Node and User Equipment in LTE-A

Authors: Chun-Chuan Yang, Jeng-Yueng Chen, Yi-Ting Mai, Hsieh-Hua Liu

Abstract:

By introduction of Relay Nodes (RNs), LTE-Advanced can provide enhanced coverage and capacity at cell edges and hot-spot areas. The authors have been researching the issue of power saving in mobile communications technology such as WiMax and LTE for some years. Based on the idea of Load-Based Power Saving (LBPS), three efficient power saving schemes for the user equipment (UE) were proposed in the authors’ previous work. In this paper, three revised schemes of the previous work in order to integrate RN and UE in power saving are proposed. Simulation study shows the proposed schemes can achieve significantly better power saving efficiency than the standard based scheme at the cost of moderately increased delay.

Keywords: DRX, LTE-A, power saving, RN

Procedia PDF Downloads 515
12940 An Unexpected Helping Hand: Consequences of Redistribution on Personal Ideology

Authors: Simon B.A. Egli, Katja Rost

Abstract:

Literature on redistributive preferences has proliferated in past decades. A core assumption behind it is that variation in redistributive preferences can explain different levels of redistribution. In contrast, this paper considers the reverse. What if it is redistribution that changes redistributive preferences? The core assumption behind the argument is that if self-interest - which we label concrete preferences - and ideology - which we label abstract preferences - come into conflict, the former will prevail and lead to an adjustment of the latter. To test the hypothesis, data from a survey conducted in Switzerland during the first wave of the COVID-19 crisis is used. A significant portion of the workforce at the time unexpectedly received state money through the short-time working program. Short-time work was used as a proxy for self-interest and was tested (1) on the support given to hypothetical, ailing firms during the crisis and (2) on the prioritization of justice principles guiding state action. In a first step, several models using OLS-regressions on political orientation were estimated to test our hypothesis as well as to check for non-linear effects. We expected support for ailing firms to be the same regardless of ideology but only for people on short-time work. The results both confirm our hypothesis and suggest a non-linear effect. Far-right individuals on short-time work were disproportionally supportive compared to moderate ones. In a second step, ordered logit models were estimated to test the impact of short-time work and political orientation on the rankings of the distributive justice principles need, performance, entitlement, and equality. The results show that being on short-time work significantly alters the prioritization of justice principles. Right-wing individuals are much more likely to prioritize need and equality over performance and entitlement when they receive government assistance. No such effect is found among left-wing individuals. In conclusion, we provide moderate to strong evidence that unexpectedly finding oneself at the receiving end changes redistributive preferences if personal ideology is antithetical to redistribution. The implications of our findings on the study of populism, personal ideologies, and political change are discussed.

Keywords: COVID-19, ideology, redistribution, redistributive preferences, self-interest

Procedia PDF Downloads 136
12939 The Integration of Patient Health Record Generated from Wearable and Internet of Things Devices into Health Information Exchanges

Authors: Dalvin D. Hill, Hector M. Castro Garcia

Abstract:

A growing number of individuals utilize wearable devices on a daily basis. The usage and functionality of these wearable devices vary from user to user. One popular usage of said devices is to track health-related activities that are typically stored on a device’s memory or uploaded to an account in the cloud; based on the current trend, the data accumulated from the wearable device are stored in a standalone location. In many of these cases, this health related datum is not a factor when considering the holistic view of a user’s health lifestyle or record. This health-related data generated from wearable and Internet of Things (IoT) devices can serve as empirical information to a medical provider, as the standalone data can add value to the holistic health record of a patient. This paper proposes a solution to incorporate the data gathered from these wearable and IoT devices, with that a patient’s Personal Health Record (PHR) stored within the confines of a Health Information Exchange (HIE).

Keywords: electronic health record, health information exchanges, internet of things, personal health records, wearable devices, wearables

Procedia PDF Downloads 118
12938 Simulating Drilling Using a CAD System

Authors: Panagiotis Kyratsis, Konstantinos Kakoulis

Abstract:

Nowadays, the rapid development of CAD systems’ programming environments results in the creation of multiple downstream applications, which are developed and becoming increasingly available. CAD based manufacturing simulations is gradually following the same trend. Drilling is the most popular hole-making process used in a variety of industries. A specially built piece of software that deals with the drilling kinematics is presented. The cutting forces are calculated based on the tool geometry, the cutting conditions and the tool/work piece materials. The results are verified by experimental work. Finally, the response surface methodology (RSM) is applied and mathematical models of the total thrust force and the thrust force developed because of the main cutting edges are proposed.

Keywords: CAD, application programming interface, response surface methodology, drilling, RSM

Procedia PDF Downloads 461
12937 Educational Plan and Program of the Subject: Maintenance of Electric Power Equipment

Authors: Rade M. Ciric, Sasa Mandic

Abstract:

Students of Higher Education Technical School of Professional Studies, in Novi Sad follow the subject Maintenance of electric power equipment at the Electrotechnical Department. This paper presents educational plan and program of the subject Maintenance of electric power equipment. The course deals with the problems of preventive and investing maintenance of transformer stations (TS), performing and maintenance of grounding of TS and pillars, as well as tracing and detection the location of the cables failure. There is a special elaborated subject concerning the safe work conditions for the electrician during network maintenance, as well as the basics of making and keeping technical documentation of the equipment.

Keywords: educational plan and program, electric power equipment, maintenance, technical documentation, safe work

Procedia PDF Downloads 454
12936 Study of the Design and Simulation Work for an Artificial Heart

Authors: Mohammed Eltayeb Salih Elamin

Abstract:

This study discusses the concept of the artificial heart using engineering concepts, of the fluid mechanics and the characteristics of the non-Newtonian fluid. For the purpose to serve heart patients and improve aspects of their lives and since the Statistics review according to world health organization (WHO) says that heart disease and blood vessels are the first cause of death in the world. Statistics shows that 30% of the death cases in the world by the heart disease, so simply we can consider it as the number one leading cause of death in the entire world is heart failure. And since the heart implantation become a very difficult and not always available, the idea of the artificial heart become very essential. So it’s important that we participate in the developing this idea by searching and finding the weakness point in the earlier designs and hoping for improving it for the best of humanity. In this study a pump was designed in order to pump blood to the human body and taking into account all the factors that allows it to replace the human heart, in order to work at the same characteristics and the efficiency of the human heart. The pump was designed on the idea of the diaphragm pump. Three models of blood obtained from the blood real characteristics and all of these models were simulated in order to study the effect of the pumping work on the fluid. After that, we study the properties of this pump by using Ansys15 software to simulate blood flow inside the pump and the amount of stress that it will go under. The 3D geometries modeling was done using SOLID WORKS and the geometries then imported to Ansys design modeler which is used during the pre-processing procedure. The solver used throughout the study is Ansys FLUENT. This is a tool used to analysis the fluid flow troubles and the general well-known term used for this branch of science is known as Computational Fluid Dynamics (CFD). Basically, Design Modeler used during the pre-processing procedure which is a crucial step before the start of the fluid flow problem. Some of the key operations are the geometry creations which specify the domain of the fluid flow problem. Next is mesh generation which means discretization of the domain to solve governing equations at each cell and later, specify the boundary zones to apply boundary conditions for the problem. Finally, the pre–processed work will be saved at the Ansys workbench for future work continuation.

Keywords: Artificial heart, computational fluid dynamic heart chamber, design, pump

Procedia PDF Downloads 452
12935 Development of a Real-Time Brain-Computer Interface for Interactive Robot Therapy: An Exploration of EEG and EMG Features during Hypnosis

Authors: Maryam Alimardani, Kazuo Hiraki

Abstract:

This study presents a framework for development of a new generation of therapy robots that can interact with users by monitoring their physiological and mental states. Here, we focused on one of the controversial methods of therapy, hypnotherapy. Hypnosis has shown to be useful in treatment of many clinical conditions. But, even for healthy people, it can be used as an effective technique for relaxation or enhancement of memory and concentration. Our aim is to develop a robot that collects information about user’s mental and physical states using electroencephalogram (EEG) and electromyography (EMG) signals and performs costeffective hypnosis at the comfort of user’s house. The presented framework consists of three main steps: (1) Find the EEG-correlates of mind state before, during, and after hypnosis and establish a cognitive model for state changes, (2) Develop a system that can track the changes in EEG and EMG activities in real time and determines if the user is ready for suggestion, and (3) Implement our system in a humanoid robot that will talk and conduct hypnosis on users based on their mental states. This paper presents a pilot study in regard to the first stage, detection of EEG and EMG features during hypnosis.

Keywords: hypnosis, EEG, robotherapy, brain-computer interface (BCI)

Procedia PDF Downloads 249
12934 Environmental Factors Affecting Knowledge Transfer between the Context of the Training Institution and the Context of the Work Environment: The Case of Agricultural Vocational Training

Authors: Oussedik Lydia, Zaouani-Denoux Souâd

Abstract:

Given the evolution of professions, training is becoming a solution to meet the current requirements of the labor market. Notably, the amount of money invested in training activities is considerable and continuously increasing globally. The justification of this investment becomes an obligation for those responsible for training. Therefore, the impact of training can be measured by the degree to which the knowledge, skills, and attitudes acquired through training are transferred to the workplace. Further, knowledge transfer is fundamental because the objective of any training is to be close to a professional environment in order to improve the productivity of participants. Hence, the need to better understand the knowledge transfer process in order to determine the factors that may influence it. The objective of this research is to understand the process of knowledge transfer that can occur between two contexts: professional training and the workplace, which will provide further insight to identify the environmental factors that can hinder or promote it. By examining participants' perceptions of the training and work contexts, this qualitative approach seeks to understand the knowledge transfer process that occurs between the two contexts. It also aims to identify the factors that influence it. The results will help managers identify environmental factors in the training and work context that may impact knowledge transfer. These results can be used to promote the knowledge transfer process and the performance of the trainees.

Keywords: knowledge transfer, professional training, professional training in agriculture, training context, professional context

Procedia PDF Downloads 149
12933 Application of Applied Behavior Analysis Treatment to Children with Down Syndrome

Authors: Olha Yarova

Abstract:

This study is a collaborative project between the American University of Central Asia and parent association of children with Down syndrome ‘Sunterra’ that took place in Bishkek, Kyrgyzstan. The purpose of the study was to explore whether principles and techniques of applied behavior analysis (ABA) could be used to teach children with Down syndrome socially significant behaviors. ABA is considered to be one of the most effective treatment for children with autism, but little research is done on the particularity of using ABA to children with Down syndrome. The data for the study was received during clinical observations; work with children with Down syndrome and interviews with their mothers. The results show that many ABA principles make the work with children with Down syndrome more effective. Although such children very rarely demonstrate aggressive behavior, they show a lot of escape-driven and attention seeking behaviors that are reinforced by their parents and educators. Thus functional assessment can be done to assess the function of problem behavior and to determine appropriate treatment. Prompting and prompting fading should be used to develop receptive and expressive language skills, and enhance motor development. Even though many children with Down syndrome work for praise, it is still relevant to use tangible reinforcement and to know how to remove them. Based on the results of the study, the training for parents of children with Down syndrome will be developed in Kyrgyzstan, country, where children with Down syndrome are not accepted to regular kindergartens and where doctors in maternity hospitals tell parents that their child will never talk, walk and recognize them

Keywords: down syndrome, applied behavior analysis, functional assessment, problem behavior, reinforcement

Procedia PDF Downloads 266
12932 Role of Psychological Capital in Organizational and Personal Outcomes: An Exploratory Study of Medical Professionals in Pakistan

Authors: Shazia Almas, Jaffar Iqbal, Nazia Almas

Abstract:

In most of the South Asian countries like Pakistan medical profession is one the most valued and respectful professions yet being a medical professional requires an enormous amount of responsibilities and work overload at the same time which possibly can be in contrast with family role of a doctor. Job and family are two primary spheres of a person's life no matter whatever the profession one adopts and the type of family one is running. There is a bi-directional relationship between job and family. The type and nature of work, time schedules, working shifts in medical profession are very demanding in the countries like Pakistan where number of patients is far more higher than the number of doctors available. The work life also have significant impact on family life and vice versa. Because of the sensitivity and interdependency of these relations, today’s overarching and competing demands remain dissatisfactory. The main objective of the current research is to investigate how interpersonal relationships affect work and work affects interpersonal relationships of medical professionals. In line with identifying these facts, the current study aimed to examine the predictive role of psychological capital (self-efficacy, hope, optimism, and resilience), in organizational outcome (job satisfaction) and personal outcome (family satisfaction) amongst male and medical professionals. A total of 350 participants from public and private sector hospitals of Pakistan were recruited through simple random and stratified sampling techniques, with age ranges from 26-50 years. The questionnaire including established and certified self-report measures of Psychological Capital Questionnaire, Job Satisfaction, and Family Satisfaction were adopted to collect the data. The reliability and validity of mentioned instruments were established through Cronbach’s alpha and factor analyses (exploratory and confirmatory) respectively using Structural Equation Modeling (SEM) by AMOS. The proposed hypotheses were tested using Pearson’s Correlation and Regression analyses for predicting effect whereas, t-Test was deployed to verify the difference between male and female health professionals. The results revealed that self-efficacy and optimism predicted job satisfaction while, self-efficacy, hope, and resilience predicted family satisfaction. Moreover, the results depicted significant gender differences in job satisfaction where females were higher on job satisfaction as compared to male medical professionals but no significant differences were observed in levels of family satisfaction between both genders. The study has implications for social, organizational and work policy designers. The study also paves for more researches with positive psychological approach to promote work-family harmony.

Keywords: family satisfaction, job satisfaction, medical professionals, psychological capital

Procedia PDF Downloads 242
12931 An Audit of Climate Change and Sustainability Teaching in Medical School

Authors: M. Tiachachat, M. Mihoubi

Abstract:

The Bell polynomials are special polynomials in combinatorial analysis that have a wide range of applications in mathematics. They have interested many authors. The exponential partial Bell polynomials have been well reduced to some special combinatorial sequences. Numerous researchers had already been interested in the above polynomials, as evidenced by many articles in the literature. Inspired by this work, in this work, we propose a family of special polynomials named after the 2-successive partial Bell polynomials. Using the combinatorial approach, we prove the properties of these numbers, derive several identities, and discuss some special cases. This family includes well-known numbers and polynomials such as Stirling numbers, Bell numbers and polynomials, and so on. We investigate their properties by employing generating functions

Keywords: 2-associated r-Stirling numbers, the exponential partial Bell polynomials, generating function, combinatorial interpretation

Procedia PDF Downloads 100
12930 Voices of Dissent: Case Study of a Digital Archive of Testimonies of Political Oppression

Authors: Andrea Scapolo, Zaya Rustamova, Arturo Matute Castro

Abstract:

The “Voices in Dissent” initiative aims at collecting and making available in a digital format, testimonies, letters, and other narratives produced by victims of political oppression from different geographical spaces across the Atlantic. By recovering silenced voices behind the official narratives, this open-access online database will provide indispensable tools for rewriting the history of authoritarian regimes from the margins as memory debates continue to provoke controversy among academic and popular transnational circles. In providing an extensive database of non-hegemonic discourses in a variety of political and social contexts, the project will complement the existing European and Latin-American studies, and invite further interdisciplinary and trans-national research. This digital resource will be available to academic communities and the general audience and will be organized geographically and chronologically. “Voices in Dissent” will offer a first comprehensive study of these personal accounts of persecution and repression against determined historical backgrounds and their impact on collective memory formation in contemporary societies. The digitalization of these texts will allow to run metadata analyses and adopt comparatist approaches for a broad range of research endeavors. Most of the testimonies included in our archive are testimonies of trauma: the trauma of exile, imprisonment, torture, humiliation, censorship. The research on trauma has now reached critical mass and offers a broad spectrum of critical perspectives. By putting together testimonies from different geographical and historical contexts, our project will provide readers and scholars with an extraordinary opportunity to investigate how culture shapes individual and collective memories and provides or denies resources to make sense and cope with the trauma. For scholars dealing with the epistemological and rhetorical analysis of testimonies, an online open-access archive will prove particularly beneficial to test theories on truth status and the formation of belief as well as to study the articulation of discourse. An important aspect of this project is also its pedagogical applications since it will contribute to the creation of Open Educational Resources (OER) to support students and educators worldwide. Through collaborations with our Library System, the archive will form part of the Digital Commons database. The texts collected in this online archive will be made available in the original languages as well as in English translation. They will be accompanied by a critical apparatus that will contextualize them historically by providing relevant background information and bibliographical references. All these materials can serve as a springboard for a broad variety of educational projects and classroom activities. They can also be used to design specific content courses or modules. In conclusion, the desirable outcomes of the “Voices in Dissent” project are: 1. the collections and digitalization of political dissent testimonies; 2. the building of a network of scholars, educators, and learners involved in the design, development, and sustainability of the digital archive; 3. the integration of the content of the archive in both research and teaching endeavors, such as publication of scholarly articles, design of new upper-level courses, and integration of the materials in existing courses.

Keywords: digital archive, dissent, open educational resources, testimonies, transatlantic studies

Procedia PDF Downloads 101
12929 Human Activities Recognition Based on Expert System

Authors: Malika Yaici, Soraya Aloui, Sara Semchaoui

Abstract:

Recognition of human activities from sensor data is an active research area, and the main objective is to obtain a high recognition rate. In this work, we propose a recognition system based on expert systems. The proposed system makes the recognition based on the objects, object states, and gestures, taking into account the context (the location of the objects and of the person performing the activity, the duration of the elementary actions, and the activity). This work focuses on complex activities which are decomposed into simple easy to recognize activities. The proposed method can be applied to any type of activity. The simulation results show the robustness of our system and its speed of decision.

Keywords: human activity recognition, ubiquitous computing, context-awareness, expert system

Procedia PDF Downloads 131
12928 Automated Resin Transfer Moulding of Carbon Phenolic Composites

Authors: Zhenyu Du, Ed Collings, James Meredith

Abstract:

The high cost of composite materials versus conventional materials remains a major barrier to uptake in the transport sector. This is exacerbated by a shortage of skilled labour which makes the labour content of a hand laid composite component (~40 % of total cost) an obvious target for reduction. Automation is a method to remove labour cost and improve quality. This work focuses on the challenges and benefits to automating the manufacturing process from raw fibre to trimmed component. It will detail the experimental work required to complete an automation cell, the control strategy used to integrate all machines and the final benefits in terms of throughput and cost.

Keywords: automation, low cost technologies, processing and manufacturing technologies, resin transfer moulding

Procedia PDF Downloads 283
12927 DCASH: Dynamic Cache Synchronization Algorithm for Heterogeneous Reverse Y Synchronizing Mobile Database Systems

Authors: Gunasekaran Raja, Kottilingam Kottursamy, Rajakumar Arul, Ramkumar Jayaraman, Krithika Sairam, Lakshmi Ravi

Abstract:

The synchronization server maintains a dynamically changing cache, which contains the data items which were requested and collected by the mobile node from the server. The order and presence of tuples in the cache changes dynamically according to the frequency of updates performed on the data, by the server and client. To synchronize, the data which has been modified by client and the server at an instant are collected, batched together by the type of modification (insert/ update/ delete), and sorted according to their update frequencies. This ensures that the DCASH (Dynamic Cache Synchronization Algorithm for Heterogeneous Reverse Y synchronizing Mobile Database Systems) gives priority to the frequently accessed data with high usage. The optimal memory management algorithm is proposed to manage data items according to their frequency, theorems were written to show the current mobile data activity is reverse Y in nature and the experiments were tested with 2g and 3g networks for various mobile devices to show the reduced response time and energy consumption.

Keywords: mobile databases, synchronization, cache, response time

Procedia PDF Downloads 391
12926 Manual Pit Emptiers and Their Heath: Profiles, Determinants and Interventions

Authors: Ivy Chumo, Sheillah Simiyu, Hellen Gitau, Isaac Kisiangani, Caroline Kabaria Kanyiva Muindi, Blessing Mberu

Abstract:

The global sanitation workforce bridges the gap between sanitation infrastructure and the provision of sanitation services through essential public service work. Manual pit emptiers often perform the work at the cost of their dignity, safety, and health as their work requires repeated heavy physical activities such as lifting, carrying, pulling, and pushing. This exposes them to occupational and environmental health hazards and risking illness, injury, and death. The study will extend the studies by presenting occupational health risks and suggestions for improvement in informal settlements of Nairobi, Kenya. This is a qualitative study conducted among sanitation stakeholders in Korogocho, Mukuru and Kibera informal settlements in Nairobi. Data were captured using digital voice recorders, transcribed and thematically analysed. The discussion notes were further supported by observational notes made during the interviews. These formed the basis for a robust picture of occupational health of manual pit emptiers; a lack or inappropriate use of protective clothing, and prolonged duration of working hours were described to contribute to the occupational health hazard. To continue working, manual pit emptiers had devised coping strategies which include working in groups, improvised protective clothing, sharing the available protective clothing, working at night and consuming alcohol drinks while at work. Many of these strategies are detrimental to their health. Occupational health hazards among pit emptiers are key for effective working and is as a result of a lack of collaboration amongst stakeholders linked to health, safety and lack of PPE of pit emptiers. Collaborations amongst sanitation stakeholders is paramount for health, safety, and in ensuring the provision and use of personal protective devices.

Keywords: sanitation, occupational health, manual emptiers, informal settlements

Procedia PDF Downloads 188
12925 A Geoprocessing Tool for Early Civil Work Notification to Optimize Fiber Optic Cable Installation Cost

Authors: Hussain Adnan Alsalman, Khalid Alhajri, Humoud Alrashidi, Abdulkareem Almakrami, Badie Alguwaisem, Said Alshahrani, Abdullah Alrowaished

Abstract:

Most of the cost of installing a new fiber optic cable is attributed to civil work-trenching-cost. In many cases, information technology departments receive project proposals in their eReview system, but not all projects are visible to everyone. Additionally, if there was no IT scope in the proposed project, it is not likely to be visible to IT. Sometimes it is too late to add IT scope after project budgets have been finalized. Finally, the eReview system is a repository of PDF files for each project, which commits the reviewer to manual work and limits automation potential. This paper details a solution to address the late notification of the eReview system by integrating IT Sites GIS data-sites locations-with land use permit (LUP) data-civil work activity, which is the first step before securing the required land usage authorizations and means no detailed designs for any relevant project before an approved LUP request. To address the manual nature of eReview system, both the LUP System and IT data are using ArcGIS Desktop, which enables the creation of a geoprocessing tool with either Python or Model Builder to automate finding and evaluating potentially usable LUP requests to reduce trenching between two sites in need of a new FOC. To achieve this, a weekly dump was taken from LUP system production data and loaded manually onto ArcMap Desktop. Then a custom tool was developed in model builder, which consisted of a table of two columns containing all the pairs of sites in need of new fiber connectivity. The tool then iterates all rows of this table, taking the sites’ pair one at a time and finding potential LUPs between them, which satisfies the provided search radius. If a group of LUPs was found, an iterator would go through each LUP to find the required civil work between the two sites and the LUP Polyline feature and the distance through the line, which would be counted as cost avoidance if an IT scope had been added. Finally, the tool will export an Excel file named with sites pair, and it will contain as many rows as the number of LUPs, which met the search radius containing trenching and pulling information and cost. As a result, multiple projects have been identified – historical, missed opportunity, and proposed projects. For the proposed project, the savings were about 75% ($750,000) to install a new fiber with the Euclidean distance between Abqaiq GOSP2 and GOSP3 DCOs. In conclusion, the current tool setup identifies opportunities to bundle civil work on single projects at a time and between two sites. More work is needed to allow the bundling of multiple projects between two sites to achieve even more cost avoidance in both capital cost and carbon footprint.

Keywords: GIS, fiber optic cable installation optimization, eliminate redundant civil work, reduce carbon footprint for fiber optic cable installation

Procedia PDF Downloads 213
12924 Exploring the Visual Roots of Classical Rhetoric and Its Implication for Gender Politics: Reflection upon Roman Rhetoric from a Bakhtin's Perspective

Authors: Hsiao-Yung Wang

Abstract:

This study aims to explore the visual roots of classical rhetoric and its implication for gender politics by the constant reference to Mikhail Bakhtin’s theory of novelist time. First, it attempts to clarify the argument that “visuality always has been integral to rhetorical consciousness” by critically re-reading the rhetorical theories of roman rhetorician such as Cicero and Quintilian. Thereby, the vague clues of visuality would be realized from the so-called ‘five canons of rhetoric’ (invention, arrangement, style, memory, and delivery), which originally deriving from verbal and spoken rhetorical tradition. Drawing on Mikhail Bakhtin’s elaboration of novelist time in contrast to epic time, it addresses the specific timeline inherent in the dynamics of visual rhetoric involves the refusing the ‘absolute past’, the focusing on unfinalized contemporary reality, and the expecting for open future. Taking the primary visions of Taipei LGBT parade over the past 13 years as research cases, it mentions that visuality could not only activate the rhetorical functions of classical rhetoric, but also inspire gender politics in the contemporary era.

Keywords: classical rhetoric, gender politics, Mikhail Bakhtin, visuality

Procedia PDF Downloads 369
12923 Memory Types in Hemodialysis (HD) Patients; A Study Based on Hemodialysis Duration, Zahedan: South East of Iran

Authors: Behnoush Sabayan, Ali Alidadi, Saeid Ebarhimi, N. M. Bakhshani

Abstract:

Hemodialysis (HD) patients are at a high risk of atherosclerotic and vascular disease; also little information is available for the HD impact on brain structure of these patients. We studied the brain abnormalities in HD patients. The aim of this study was to investigate the effect of long term HD on brain structure of HD patients. Non-contrast MRI was used to evaluate imaging findings. Our study included 80 HD patients of whom 39 had less than six months of HD and 41 patients had a history of HD more than six months. The population had a mean age of 51.60 years old and 27.5% were female. According to study, HD patients who have been hemodialyzed for a long time (median time of HD was up to 4 years) had small vessel ischemia than the HD patients who underwent HD for a shorter term, which the median time was 3 to 5 months. Most of the small vessel ischemia was located in pre-ventricular, subcortical and white matter (1.33± .471, 1.23± .420 and 1.39±.490). However, the other brain damages like: central pons abnormality, global brain atrophy, thinning of corpus callosum and frontal lobe atrophy were found (P<0.01). The present study demonstrated that HD patients who were under HD for a longer time had small vessel ischemia and we conclude that this small vessel ischemia might be a causative mechanism of brain atrophy in chronic hemodialysis patients. However, additional researches are needed in this area.

Keywords: Hemodialysis Patients, Duration of Hemodialysis, MRI, Zahedan

Procedia PDF Downloads 206
12922 Computational Fluid Dynamics Simulations of Thermal and Flow Fields inside a Desktop Personal Computer Cabin

Authors: Mohammad Salehi, Mohammad Erfan Doraki

Abstract:

In this paper, airflow analysis inside a desktop computer case is performed by simulating computational fluid dynamics. The purpose is to investigate the cooling process of the central processing unit (CPU) with thermal capacities of 80 and 130 watts. The airflow inside the computer enclosure, selected from the microATX model, consists of the main components of heat production such as CPU, hard disk drive, CD drive, floppy drive, memory card and power supply unit; According to the amount of thermal power produced by the CPU with 80 and 130 watts of power, two different geometries have been used for a direct and radial heat sink. First, the independence of the computational mesh and the validation of the solution were performed, and after ensuring the correctness of the numerical solution, the results of the solution were analyzed. The simulation results showed that changes in CPU temperature and other components linearly increased with increasing CPU heat output. Also, the ambient air temperature has a significant effect on the maximum processor temperature.

Keywords: computational fluid dynamics, CPU cooling, computer case simulation, heat sink

Procedia PDF Downloads 111