Search results for: writing task
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2788

Search results for: writing task

1378 Unauthorized License Verifier and Secure Access to Vehicle

Authors: G. Prakash, L. Mohamed Aasiq, N. Dhivya, M. Jothi Mani, R. Mounika, B. Gomathi

Abstract:

In our day to day life, many people met with an accident due to various reasons like over speed, overload in the vehicle, violation of the traffic rules, etc. Driving license system is difficult task for the government to monitor. To prevent non-licensees from driving who are causing most of the accidents, a new system is proposed. The proposed system consists of a smart card capable of storing the license details of a particular person. Vehicles such as cars, bikes etc., should have a card reader capable of reading the particular license. A person, who wishes to drive the vehicle, should insert the card (license) in the vehicle and then enter the password in the keypad. If the license data stored in the card and database about the entire license holders in the microcontroller matches, he/she can proceed for ignition after the automated opening of the fuel tank valve, otherwise the user is restricted to use the vehicle. Moreover, overload detector in our proposed system verifies and then prompts the user to avoid overload before driving. This increases the security of vehicles and also ensures safe driving by preventing accidents.

Keywords: license, verifier, EEPROM, secure, overload detection

Procedia PDF Downloads 238
1377 Performance Comparison of AODV and Soft AODV Routing Protocol

Authors: Abhishek, Seema Devi, Jyoti Ohri

Abstract:

A mobile ad hoc network (MANET) represents a system of wireless mobile nodes that can self-organize freely and dynamically into arbitrary and temporary network topology. Unlike a wired network, wireless network interface has limited transmission range. Routing is the task of forwarding data packets from source to a given destination. Ad-hoc On Demand Distance Vector (AODV) routing protocol creates a path for a destination only when it required. This paper describes the implementation of AODV routing protocol using MATLAB-based Truetime simulator. In MANET's node movements are not fixed while they are random in nature. Hence intelligent techniques i.e. fuzzy and ANFIS are used to optimize the transmission range. In this paper, we compared the transmission range of AODV, fuzzy AODV and ANFIS AODV. For soft computing AODV, we have taken transmitted power and received threshold as input and transmission range as output. ANFIS gives better results as compared to fuzzy AODV.

Keywords: ANFIS, AODV, fuzzy, MANET, reactive routing protocol, routing protocol, truetime

Procedia PDF Downloads 492
1376 Frequent-Pattern Tree Algorithm Application to S&P and Equity Indexes

Authors: E. Younsi, H. Andriamboavonjy, A. David, S. Dokou, B. Lemrabet

Abstract:

Software and time optimization are very important factors in financial markets, which are competitive fields, and emergence of new computer tools further stresses the challenge. In this context, any improvement of technical indicators which generate a buy or sell signal is a major issue. Thus, many tools have been created to make them more effective. This worry about efficiency has been leading in present paper to seek best (and most innovative) way giving largest improvement in these indicators. The approach consists in attaching a signature to frequent market configurations by application of frequent patterns extraction method which is here most appropriate to optimize investment strategies. The goal of proposed trading algorithm is to find most accurate signatures using back testing procedure applied to technical indicators for improving their performance. The problem is then to determine the signatures which, combined with an indicator, outperform this indicator alone. To do this, the FP-Tree algorithm has been preferred, as it appears to be the most efficient algorithm to perform this task.

Keywords: quantitative analysis, back-testing, computational models, apriori algorithm, pattern recognition, data mining, FP-tree

Procedia PDF Downloads 359
1375 Higher Order Thinking Skills Workshop: Faculty Professional Development and Its Effect on Their Teaching Strategies

Authors: Amani Hamdan

Abstract:

A post-workshop of higher-order thinking skills (HOTS), for faculty from diverse academic disciplines, was conducted and the researcher surveyed the participants’ intentions and plans to include HOTS as a goal, as learning and teaching task in their practices. Follow-up interviews with a random sample of participants were used to determine if they fulfilled their intentions three 3 months after the workshop. The degree of planned and enacted HOTS then was analyzed against the post-workshop HOT ability and knowledge. This is one topic that has not been adequately explored in faculty professional development literature where measuring the effect of learning on their ability to use what they learned. This qualitative method study explored a group of male and female faculty members (n=85) enrolled in HOTS 2 day workshop. The results showed that 89% of faculty members although were mostly enthused to apply what they learned after a 3 months period they were caught up with routine presentations and lecturing.

Keywords: higher education, faculty development, Saudi Arabia, higher order thinking skills

Procedia PDF Downloads 456
1374 The Use of Videoconferencing in a Task-Based Beginners' Chinese Class

Authors: Sijia Guo

Abstract:

The development of new technologies and the falling cost of high-speed Internet access have made it easier for institutes and language teachers to opt different ways to communicate with students at distance. The emergence of web-conferencing applications, which integrate text, chat, audio / video and graphic facilities, offers great opportunities for language learning to through the multimodal environment. This paper reports on data elicited from a Ph.D. study of using web-conferencing in the teaching of first-year Chinese class in order to promote learners’ collaborative learning. Firstly, a comparison of four desktop videoconferencing (DVC) tools was conducted to determine the pedagogical value of the videoconferencing tool-Blackboard Collaborate. Secondly, the evaluation of 14 campus-based Chinese learners who conducted five one-hour online sessions via the multimodal environment reveals the users’ choice of modes and their learning preference. The findings show that the tasks designed for the web-conferencing environment contributed to the learners’ collaborative learning and second language acquisition.

Keywords: computer-mediated communication (CMC), CALL evaluation, TBLT, web-conferencing, online Chinese teaching

Procedia PDF Downloads 304
1373 Generative AI: A Comparison of Conditional Tabular Generative Adversarial Networks and Conditional Tabular Generative Adversarial Networks with Gaussian Copula in Generating Synthetic Data with Synthetic Data Vault

Authors: Lakshmi Prayaga, Chandra Prayaga. Aaron Wade, Gopi Shankar Mallu, Harsha Satya Pola

Abstract:

Synthetic data generated by Generative Adversarial Networks and Autoencoders is becoming more common to combat the problem of insufficient data for research purposes. However, generating synthetic data is a tedious task requiring extensive mathematical and programming background. Open-source platforms such as the Synthetic Data Vault (SDV) and Mostly AI have offered a platform that is user-friendly and accessible to non-technical professionals to generate synthetic data to augment existing data for further analysis. The SDV also provides for additions to the generic GAN, such as the Gaussian copula. We present the results from two synthetic data sets (CTGAN data and CTGAN with Gaussian Copula) generated by the SDV and report the findings. The results indicate that the ROC and AUC curves for the data generated by adding the layer of Gaussian copula are much higher than the data generated by the CTGAN.

Keywords: synthetic data generation, generative adversarial networks, conditional tabular GAN, Gaussian copula

Procedia PDF Downloads 74
1372 Critical Review of the Democracy in Pakistan in Light of Dr. Israr Ahmed and Western Philosophers

Authors: Zoaib Mirza

Abstract:

Pakistan is an Islamic country that got its partition from India in 1947 so that the people could practice the religion of Islam. The ideology of Pakistan was based on the notion that sovereignty only belonged to God Almighty (in Arabic, God means “Allah”), and Muslims will live in accordance with Islam principles. The Quran (Holy Book) and Sunnah (authentic practices of Prophet Mohammad, Peace Be Upon Him, that explains the application of the Quran) are foundations of the Islamic principles. It has been over 75 years, but unfortunately, Pakistan, due to its own political, social, and economic mistakes, is responsible for not being able to become a true Islamic nation to justify its partition from India. The rationale for writing this paper is to analyze the factors that led to changes in the democratic movements impacting the country's political, social, and economic growth. The methodology to examine the historical and political context of Pakistan’s history is by referencing the scholarly work of Israr Ahmed, a Pakistani Islamic theologian, philosopher, and Islamic scholar. While from a Western perspective, Karl Marx, Mar Weber, Hannah Arendt, Sheldon Wolin, Paulo Freire, and Jacques Ranciere's philosophies specific to totalitarianism, politics, military rule, religion, capitalism, and superpower are used as the framework to analyze Pakistan’s democracy. The study's findings conclude that Pakistan's democracy is unstable and has been impacted by military and civilian governance, which led to political, social, and economic downfall. To improve the current situation, the citizens of Pakistan have to realize that the success of a nation is only dependent on the level of consciousness of the leader and not the political system. Therefore, it is the responsibility of every citizen to be conscious of how they select their leader and take responsibility for the current situation in Pakistan.

Keywords: Pakistan, Islam, democracy, totalitarianism, military, religion, capitalism

Procedia PDF Downloads 85
1371 Enhancement Dynamic Cars Detection Based on Optimized HOG Descriptor

Authors: Mansouri Nabila, Ben Jemaa Yousra, Motamed Cina, Watelain Eric

Abstract:

Research and development efforts in intelligent Advanced Driver Assistance Systems (ADAS) seek to save lives and reduce the number of on-road fatalities. For traffic and emergency monitoring, the essential but challenging task is vehicle detection and tracking in reasonably short time. This purpose needs first of all a powerful dynamic car detector model. In fact, this paper presents an optimized HOG process based on shape and motion parameters fusion. Our proposed approach mains to compute HOG by bloc feature from foreground blobs using configurable research window and pathway in order to overcome the shortcoming in term of computing time of HOG descriptor and improve their dynamic application performance. Indeed we prove in this paper that HOG by bloc descriptor combined with motion parameters is a very suitable car detector which reaches in record time a satisfactory recognition rate in dynamic outside area and bypasses several popular works without using sophisticated and expensive architectures such as GPU and FPGA.

Keywords: car-detector, HOG, motion, computing time

Procedia PDF Downloads 320
1370 The Influence of Educational Board Games on Chinese Learning Motivation and Flow Experience

Authors: Ju May Wen, Chun Hung Lin, Eric Zhi Feng Liu

Abstract:

Flow theory implies that people are persuaded by happiness. By focusing on an activity, people turn a blind eye to external factors. This study explores the influence of educational board games and fundamental Chinese language teaching on students’ learning motivation and flow experience. Fifty-three students studying Chinese language fundamental courses were used in the study. These students were divided into three groups: (1) flash card teaching group; (2) educational original board game teaching group; and (3) educational Chinese board game teaching group. Chinese language teaching was integrated with the educational board game titled ‘Transportation GO.’ The students were observed playing this game as the teacher collected quantitative and qualitative data. Quantitative data was collected from the learning motivation scale and flow experience scale. Qualitative data was collected through observing, recording, and visiting. The first result found that the three groups integrated with Chinese language teaching could maintain students’ high learning motivation and high flow experience. Second, there was no significant difference between the flow experience of the flash card group and the educational original board game group. Third, there was a significant difference in the flow experience and learning motivation of the educational Chinese board game group vs. the other groups. This study suggests that the experimental model can be applied to advanced Chinese language teaching. Apart from oral and literacy skills, the study of educational board games integrated with Chinese language teaching to enforce student writing skills will be continued.

Keywords: Chinese language instruction, educational board game, learning motivation, flow experience

Procedia PDF Downloads 176
1369 Teaching English to Rural Students: A Case Study of a Select Batch at SSN College of Engineering, Chennai

Authors: Martha Karunakar

Abstract:

There exists a wide divide between the urban and the rural students in a vast country like India. This dichotomy is seen in the resources available to them, like the learning facilities, the infra-structure, the learning ambience and meeting of their basic needs of food, clothing and shelter. This paper discusses the effect of English language teaching as a Bridge course on a select batch of rural students at an Engineering college in Chennai, one of the four Metros of India. The study aims to understand how the teacher input and the teacher- peer-student interaction facilitates the acquisition of the basic structures of the English language to a group that is minimally exposed to the language. The objective in conducting the Bridge Course is to integrate these rural students into the mainstream and empower them in terms of English speaking ability; to enable them to comprehend their respective engineering classes where the medium of instruction is English and also to be able to interact with their urban peers. This program is conducted prior to the start of a regular academic session to equip them face the rigors of engineering education. The study is placed within the framework of Interaction theory in second language acquisition. The study evaluates the impact of linking theory and practice by implementing meaningful interaction not only within classrooms but also in the common areas. By providing intensive comprehensible input, it is anticipated that participant’s level of English language improves. The teaching methods and classroom activities included individual and group participation, encompassing all the four skills of listening, speaking, reading and writing (LSRW). The diagnostic tests that were administered before the commencement of the course and the exit test after the completion were used to record the impact of the training.

Keywords: comprehensible input, interaction, rural students, teaching English

Procedia PDF Downloads 380
1368 Identitarian Speech in Exile by Representatives of Central Europe

Authors: Georgiana Ciobotaru

Abstract:

The experience of exile is a defining one for the mittleeuropean writers, which is also the generator of an identity discourse manifested in the plan of fiction. In exile, the authors often build their marginality in opposition to that deserted mundi center. The Polish Gombrowicz carried out his existence, for more than twenty-three years, in a geographical exile, distancing himself from his country, and, from a cultural point of view, the writing meant a possibility of escape, of plunge into a literary exile that often constituted a way of conditioning the practice of writers. He opted for one of the attitudes that a writer in exile may have, namely he preferred to continue speaking Polish, although he was far from his homeland, turning to the public in his homeland, his entire literary creation in exile being promoted through Kulturia, the Paris-based immigration magazine. The problem of exile must be constantly related to three essential aspects, namely: territory, identity and language. The exile, both the writer and his characters, displays a characteristic attitude towards the abandoned land, but also towards the adoptive, towards the mother tongue, but also towards the idiom encountered, thus proving an original manner in terms of how it asserts, de-builds or re-builds its identity. In these texts written after leaving Poland, a series of open works by Trans-Atlantic, Gombrowicz assumes and internalizes the inadequacy between his self and the reality outside to make it the principle of his perception of the world. The expression of marginality that characterized the texts developed when the writer was still in Poland seems to acquire a certain coherence against the background of a logic imposed on the new experience, namely that of exile. Texts created during his exile in Argentina appear in a different context, in other words, in a situation of inadequacy towards the world: ignorance of the language, poverty, isolation that characterizes especially the first years spent there. This study aims to highlight how the Polish author de-builds and reconstructs his Mittel-European identity profile through language.

Keywords: discourse, exile, identity, immigration

Procedia PDF Downloads 133
1367 Estimation of Functional Response Model by Supervised Functional Principal Component Analysis

Authors: Hyon I. Paek, Sang Rim Kim, Hyon A. Ryu

Abstract:

In functional linear regression, one typical problem is to reduce dimension. Compared with multivariate linear regression, functional linear regression is regarded as an infinite-dimensional case, and the main task is to reduce dimensions of functional response and functional predictors. One common approach is to adapt functional principal component analysis (FPCA) on functional predictors and then use a few leading functional principal components (FPC) to predict the functional model. The leading FPCs estimated by the typical FPCA explain a major variation of the functional predictor, but these leading FPCs may not be mostly correlated with the functional response, so they may not be significant in the prediction for response. In this paper, we propose a supervised functional principal component analysis method for a functional response model with FPCs obtained by considering the correlation of the functional response. Our method would have a better prediction accuracy than the typical FPCA method.

Keywords: supervised, functional principal component analysis, functional response, functional linear regression

Procedia PDF Downloads 71
1366 Retrieval-Induced Forgetting Effects in Retrospective and Prospective Memory in Normal Aging: An Experimental Study

Authors: Merve Akca

Abstract:

Retrieval-induced forgetting (RIF) refers to the phenomenon that selective retrieval of some information impairs memory for related, but not previously retrieved information. Despite age differences in retrieval-induced forgetting regarding retrospective memory being documented, this research aimed to highlight age differences in RIF of the prospective memory tasks for the first time. By using retrieval-practice paradigm, this study comparatively examined RIF effects in retrospective memory and event-based prospective memory in young and old adults. In this experimental study, a mixed factorial design with age group (Young, Old) as a between-subject variable, and memory type (Prospective, Retrospective) and item type (Practiced, Non-practiced) as within-subject variables was employed. Retrieval-induced forgetting was observed in the retrospective but not in the prospective memory task. Therefore, the results indicated that selective retrieval of past events led to suppression of other related past events in both age groups but not the suppression of memory for future intentions.

Keywords: prospective memory, retrieval-induced forgetting, retrieval inhibition, retrospective memory

Procedia PDF Downloads 311
1365 Hierarchical Tree Long Short-Term Memory for Sentence Representations

Authors: Xiuying Wang, Changliang Li, Bo Xu

Abstract:

A fixed-length feature vector is required for many machine learning algorithms in NLP field. Word embeddings have been very successful at learning lexical information. However, they cannot capture the compositional meaning of sentences, which prevents them from a deeper understanding of language. In this paper, we introduce a novel hierarchical tree long short-term memory (HTLSTM) model that learns vector representations for sentences of arbitrary syntactic type and length. We propose to split one sentence into three hierarchies: short phrase, long phrase and full sentence level. The HTLSTM model gives our algorithm the potential to fully consider the hierarchical information and long-term dependencies of language. We design the experiments on both English and Chinese corpus to evaluate our model on sentiment analysis task. And the results show that our model outperforms several existing state of the art approaches significantly.

Keywords: deep learning, hierarchical tree long short-term memory, sentence representation, sentiment analysis

Procedia PDF Downloads 348
1364 Establishing Feedback Partnerships in Higher Education: A Discussion of Conceptual Framework and Implementation Strategies

Authors: Jessica To

Abstract:

Feedback is one of the powerful levers for enhancing students’ performance. However, some students are under-engaged with feedback because they lack responsibility for feedback uptake. To resolve this conundrum, recent literature proposes feedback partnerships in which students and teachers share the power and responsibilities to co-construct feedback. During feedback co-construction, students express feedback needs to teachers, and teachers respond to individuals’ needs in return. Though this approach can increase students’ feedback ownership, its application is lagging as the field lacks conceptual clarity and implementation guide. This presentation aims to discuss the conceptual framework of feedback partnerships and feedback co-construction strategies. It identifies the components of feedback partnerships and strategies which could facilitate feedback co-construction. A systematic literature review was conducted to answer the questions. The literature search was performed using ERIC, PsycINFO, and Google Scholar with the keywords “assessment partnership”, “student as partner,” and “feedback engagement”. No time limit was set for the search. The inclusion criteria encompassed (i) student-teacher partnerships in feedback, (ii) feedback engagement in higher education, (iii) peer-reviewed publications, and (iv) English as the language of publication. Those without addressing conceptual understanding and implementation strategies were excluded. Finally, 65 publications were identified and analysed using thematic analysis. For the procedure, the texts relating to the questions were first extracted. Then, codes were assigned to summarise the ideas of the texts. Upon subsuming similar codes into themes, four themes emerged: students’ responsibilities, teachers’ responsibilities, conditions for partnerships development, and strategies. Their interrelationships were examined iteratively for framework development. Establishing feedback partnerships required different responsibilities of students and teachers during feedback co-construction. Students needed to self-evaluate performance against task criteria, identify inadequacies and communicate their needs to teachers. During feedback exchanges, they interpreted teachers’ comments, generated self-feedback through reflection, and co-developed improvement plans with teachers. Teachers had to increase students’ understanding of criteria and evaluation skills and create opportunities for students’ expression of feedback needs. In feedback dialogue, teachers responded to students’ needs and advised on the improvement plans. Feedback partnerships would be best grounded in an environment with trust and psychological safety. Four strategies could facilitate feedback co-construction. First, students’ understanding of task criteria could be increased by rubrics explanation and exemplar analysis. Second, students could sharpen evaluation skills if they participated in peer review and received teacher feedback on the quality of peer feedback. Third, provision of self-evaluation checklists and prompts and teacher modeling of self-assessment process could aid students in articulating feedback needs. Fourth, the trust could be fostered when teachers explained the benefits of feedback co-construction, showed empathy, and provided personalised comments in dialogue. Some strategies were applied in interactive cover sheets in which students performed self-evaluation and made feedback requests on a cover sheet during assignment submission, followed by teachers’ response to individuals’ requests. The significance of this presentation lies in unpacking the conceptual framework of feedback partnerships and outlining feedback co-construction strategies. With a solid foundation in theory and practice, researchers and teachers could better enhance students’ engagement with feedback.

Keywords: conceptual framework, feedback co-construction, feedback partnerships, implementation strategies

Procedia PDF Downloads 87
1363 Semantic Textual Similarity on Contracts: Exploring Multiple Negative Ranking Losses for Sentence Transformers

Authors: Yogendra Sisodia

Abstract:

Researchers are becoming more interested in extracting useful information from legal documents thanks to the development of large-scale language models in natural language processing (NLP), and deep learning has accelerated the creation of powerful text mining models. Legal fields like contracts benefit greatly from semantic text search since it makes it quick and easy to find related clauses. After collecting sentence embeddings, it is relatively simple to locate sentences with a comparable meaning throughout the entire legal corpus. The author of this research investigated two pre-trained language models for this task: MiniLM and Roberta, and further fine-tuned them on Legal Contracts. The author used Multiple Negative Ranking Loss for the creation of sentence transformers. The fine-tuned language models and sentence transformers showed promising results.

Keywords: legal contracts, multiple negative ranking loss, natural language inference, sentence transformers, semantic textual similarity

Procedia PDF Downloads 100
1362 Amharic Text News Classification Using Supervised Learning

Authors: Misrak Assefa

Abstract:

The Amharic language is the second most widely spoken Semitic language in the world. There are several new overloaded on the web. Searching some useful documents from the web on a specific topic, which is written in the Amharic language, is a challenging task. Hence, document categorization is required for managing and filtering important information. In the classification of Amharic text news, there is still a gap in the domain of information that needs to be launch. This study attempts to design an automatic Amharic news classification using a supervised learning mechanism on four un-touch classes. To achieve this research, 4,182 news articles were used. Naive Bayes (NB) and Decision tree (j48) algorithms were used to classify the given Amharic dataset. In this paper, k-fold cross-validation is used to estimate the accuracy of the classifier. As a result, it shows those algorithms can be applicable in Amharic news categorization. The best average accuracy result is achieved by j48 decision tree and naïve Bayes is 95.2345 %, and 94.6245 % respectively using three categories. This research indicated that a typical decision tree algorithm is more applicable to Amharic news categorization.

Keywords: text categorization, supervised machine learning, naive Bayes, decision tree

Procedia PDF Downloads 201
1361 Static and Dynamic Analysis of Microcantilever Beam

Authors: S. B. Kerur, B. S. Murgayya

Abstract:

The development of micro and nano particle is challenging task and the study of the behavior of material at the micro level is gaining importance as their behavior at micro/nano level is different. These micro particle are being used as a sensing element to measure and detects the hazardous chemical, gases, explosives and biological agents. In the present study, finite element method is used for static and dynamic analysis of simple and composite cantilever beams of different shapes. The present FE model is validated with available analytical results and various parameters like shape, materials properties, damped and undamped conditions are considered for the numerical study. The results show the effects of shape change on the natural frequency and as these are used with fluid for chemical applications, the effect of damping due to viscous nature of fluid are simulated by considering different damping coefficient effect on the dynamic behavior of cantilever beams. The obtained results show the effect of these parameters can be effectively utilized based on system requirements.

Keywords: micro, FEM, dynamic, cantilever beam

Procedia PDF Downloads 376
1360 Writing a Parametric Design Algorithm Based on Recreation and Structural Analysis of Patkane Model: The Case Study of Oshtorjan Mosque

Authors: Behnoush Moghiminia, Jesus Anaya Diaz

Abstract:

The current study attempts to present the relationship between the structure development and Patkaneh as one of the Iranian geometric patterns and parametric algorithms by introducing two practical methods. While having a structural function, Patkaneh is also used as an ornamental element. It can be helpful in the scientific and practical review of Patkaneh. The current study aims to use Patkaneh as a parametric form generator based on the algorithm. The current paper attempts to express how can a more complete algorithm of this covering be obtained based on the parametric study and analysis of a sample of a Patkaneh and also investigate the relationship between the development of the geometrical pattern of Patkaneh as a structural-decorative element of Iranian architecture and digital design. In this regard, to achieve the research purposes, researchers investigated the oldest type of Patkaneh in the architecture history of Iran, such as the Northern Entrance Patkaneh of Oshtorjan Jame’ Mosque. An accurate investigation was done on the history of the background to answer the questions. Then, by investigating the structural behavior of Patkaneh, the decorative or structural-decorative role of Patkaneh was investigated to eliminate the ambiguity. Then, the geometrical structure of Patkaneh was analyzed by introducing two practical methods. The first method is based on the constituent units of Patkaneh (Square and diamond) and investigating the interactive relationships between them in 2D and 3D. This method is appropriate for cases where there are rational and regular geometrical relationships. The second method is based on the separation of the floors and the investigation of their interrelation. It is practical when the constituent units are not geometrically regular and have numerous diversity. Finally, the parametric form algorithm of these methods was codified.

Keywords: geometric properties, parametric design, Patkaneh, structural analysis

Procedia PDF Downloads 148
1359 Organizational Learning, Job Satisfaction and Work Performance among Nurses

Authors: Rafia Rafique, Arifa Khadim

Abstract:

This research investigates the moderating role of job satisfaction between organizational learning and work performance among nurses. Correlation research design was used. Non-probability purposive sampling technique was utilized to recruit a sample of 110 nurses from public hospitals situated in the city of Lahore. The construct of organizational learning was measured using subscale of Integrated Scale for Measuring Organizational Learning. Job satisfaction was measured with the help of Job Satisfaction Survey. Performance of employees (task performance, contextual performance and counterproductive work behavior) was assessed by Individual Work Performance Questionnaire. Job satisfaction negatively moderates the relationship between organizational learning and counterproductive work behavior. Education has a significant positive relationship with organizational learning. Age, current hospital experience, marital satisfaction and salary of the nurses have positive relationship while number of children has significant negative relationship with counterproductive work behavior. These outcomes can be insightful in understanding the dynamics involved in work performance. Based on the result of this study relevant solutions can be proposed to improve the work performance of nurses.

Keywords: counterproductive work behavior, nurses, organizational learning, work performance

Procedia PDF Downloads 438
1358 A Software Engineering Methodology for Developing Secure Obfuscated Software

Authors: Carlos Gonzalez, Ernesto Linan

Abstract:

We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.

Keywords: development methodology, obfuscated software, secure software development, software engineering

Procedia PDF Downloads 246
1357 Assessing Firm Readiness to Implement Cloud Computing: Toward a Comprehensive Model

Authors: Seyed Mohammadbagher Jafari, Elahe Mahdizadeh, Masomeh Ghahremani

Abstract:

Nowadays almost all organizations depend on information systems to run their businesses. Investment on information systems and their maintenance to keep them always in best situation to support firm business is one of the main issues for every organization. The new concept of cloud computing was developed as a technical and economic model to address this issue. In cloud computing the computing resources, including networks, applications, hardwares and services are configured as needed and are available at the moment of request. However, migration to cloud is not an easy task and there are many issues that should be taken into account. This study tries to provide a comprehensive model to assess a firm readiness to implement cloud computing. By conducting a systematic literature review, four dimensions of readiness were extracted which include technological, human, organizational and environmental dimensions. Every dimension has various criteria that have been discussed in details. This model provides a framework for cloud computing readiness assessment. Organizations that intend to migrate to cloud can use this model as a tool to assess their firm readiness before making any decision on cloud implementation.

Keywords: cloud computing, human readiness, organizational readiness, readiness assessment model

Procedia PDF Downloads 392
1356 A Study of Numerical Reaction-Diffusion Systems on Closed Surfaces

Authors: Mei-Hsiu Chi, Jyh-Yang Wu, Sheng-Gwo Chen

Abstract:

The diffusion-reaction equations are important Partial Differential Equations in mathematical biology, material science, physics, and so on. However, finding efficient numerical methods for diffusion-reaction systems on curved surfaces is still an important and difficult problem. The purpose of this paper is to present a convergent geometric method for solving the reaction-diffusion equations on closed surfaces by an O(r)-LTL configuration method. The O(r)-LTL configuration method combining the local tangential lifting technique and configuration equations is an effective method to estimate differential quantities on curved surfaces. Since estimating the Laplace-Beltrami operator is an important task for solving the reaction-diffusion equations on surfaces, we use the local tangential lifting method and a generalized finite difference method to approximate the Laplace-Beltrami operators and we solve this reaction-diffusion system on closed surfaces. Our method is not only conceptually simple, but also easy to implement.

Keywords: closed surfaces, high-order approachs, numerical solutions, reaction-diffusion systems

Procedia PDF Downloads 368
1355 Improved Throttled Load Balancing Approach for Cloud Environment

Authors: Sushant Singh, Anurag Jain, Seema Sabharwal

Abstract:

Cloud computing is advancing with a rapid speed. Already, it has been adopted by a huge set of users. Easy to use and anywhere access like potential of cloud computing has made it more attractive relative to other technologies. This has resulted in reduction of deployment cost on user side. It has also allowed the big companies to sell their infrastructure to recover the installation cost for the organization. Roots of cloud computing have extended from Grid computing. Along with the inherited characteristics of its predecessor technologies it has also adopted the loopholes present in those technologies. Some of the loopholes are identified and corrected recently, but still some are yet to be rectified. Two major areas where still scope of improvement exists are security and performance. The proposed work is devoted to performance enhancement for the user of the existing cloud system by improving the basic throttled mapping approach between task and resources. The improved procedure has been tested using the cloud analyst simulator. The results are compared with the original and it has been found that proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, load balancing, throttled

Procedia PDF Downloads 246
1354 Contact Phenomena in Medieval Business Texts

Authors: Carmela Perta

Abstract:

Among the studies flourished in the field of historical sociolinguistics, mainly in the strand devoted to English history, during its Medieval and early modern phases, multilingual texts had been analysed using theories and models coming from contact linguistics, thus applying synchronic models and approaches to the past. This is true also in the case of contact phenomena which would transcend the writing level involving the language systems implicated in contact processes to the point of perceiving a new variety. This is the case for medieval administrative-commercial texts in which, according to some Scholars, the degree of fusion of Anglo-Norman, Latin and middle English is so high a mixed code emerges, and there are recurrent patterns of mixed forms. Interesting is a collection of multilingual business writings by John Balmayn, an Englishman overseeing a large shipment in Tuscany, namely the Cantelowe accounts. These documents display various analogies with multilingual texts written in England in the same period; in fact, the writer seems to make use of the above-mentioned patterns, with Middle English, Latin, Anglo-Norman, and the newly added Italian. Applying an atomistic yet dynamic approach to the study of contact phenomena, we will investigate these documents, trying to explore the nature of the switching forms they contain from an intra-writer variation perspective. After analysing the accounts and the type of multilingualism in them, we will take stock of the assumed mixed code nature, comparing the characteristics found in this genre with modern assumptions. The aim is to evaluate the possibility to consider the switching forms as core elements of a mixed code, used as professional variety among merchant communities, or whether such texts should be analysed from a switching perspective.

Keywords: historical sociolinguistics, historical code switching, letters, medieval england

Procedia PDF Downloads 71
1353 Engaging With Sex, Gender and Sexuality Diversity at Higher Education Institutions

Authors: Shakila Singh

Abstract:

Dominant discourses constitute heterosexuality as natural, normal and the only legitimate sexuality, and diverse sexual subjectivities as abnormal, unnatural and socially taboo. Similarly, the cisgender subject is reified. There are ongoing debates about the inclusion and suitability of sexuality education in the school curriculum and research show that teachers are not adequately prepared to teach about such issues in the classroom. Not surprising then, that many young people enter these institutions having had limited previous exposure to, or education about, sex, gender and sexuality diversity. This paper discusses the presence of heterosexism and cissexism at multiple layers in higher education institutions, impacting students and staff. Increasing knowledge and awareness of sex, gender and sexuality diversities is also crucial to challenging existing perceptions of sex, gender and sexuality diversities that marginalise and subordinate a large proportion of students and staff. There is a persistent disjuncture between dominant discourses that generally position higher education institutions as socially progressive, open environments and the discourses that legitimate the ascendency of heterosexual and cisgender identities. This paper argues that such disjuncture must be addressed by providing inclusive physical and emotional spaces if universities are to affirm every individual and produce graduates across all disciplines with the cultural capability to engage with increasingly diverse communities. Given the key role of language in shaping cultural and social attitudes, using gender-inclusive language is a powerful way to promote gender equality and eradicate gender bias. This means speaking and writing in a way that does not discriminate against a particular sex, gender or sexual identity and does not perpetuate gender stereotypes. Individuals must be allowed to present themselves and identify in ways they choose and be addressed by their chosen pronouns.

Keywords: heteronormativity, inclusivity, gender, universities

Procedia PDF Downloads 116
1352 The Continuation of Trauma through Transcribing: Second Generation Survivors and the Inability for a 'Post-Holocaust'

Authors: Sarah Snyder

Abstract:

Historians use the term ‘post-Holocaust’ to indicate the period from 1945 onward; however, for survivors of the Holocaust and their families, the Holocaust did not end in 1945. In fact, for some, it was just the beginning of their struggles. There are those who could not return to their homes, find loved ones, or fight off night terrors. Additionally, they continue to suffer from mental illness or physical disease stemming from the Holocaust. In order for historians to have a clearer understanding of the trauma survivors have endured, it is must to approach time differently. Trauma does not operate on a timeline and thereby, our understanding of ‘before,’ ‘during’ and ‘after’ are flawed. In order to convey this flaw, this study will examine memoirs of second and third-generation survivors and of child survivors. Within the second and third generation group, there are two types of generational memoirs that are scrutinized for this case study. The first being when a child or grandchild records the stories of their parent(s) or grandparent(s) without any of the second or third generation’s stories implicitly written. ‘Implicitly’ is used in the context that it is impossible for any writer to not impose at least some stylistic portion of themselves into writing, but the intent was to focus on the parent or grandparent. The other type of memoir is when they write their parent(s) or grandparent(s) story intertwined with their own story. Additionally, the child survivor has a unique role in memory and trauma studies. Much like later generations who write about the Holocaust but have not experienced the trauma firsthand, the child survivor must write about what they lived through and experienced but cannot remember without the assistance of research or other survivors. This study shows that survivors continue to demonstrate trauma-related paranoia. They fear experiencing another Holocaust. In their minds, they replay the horrors that they had experienced. A pilgrimage to a 20th century Europe, unlike one of the 1940s, causes uncertainty, confusion, and additional paranoia. It is through these findings that it becomes evident that historians must learn to study trauma without placing strict timelines that prevent understanding of how trauma impacts those who have experienced complex trauma.

Keywords: holocaust, generational, memoirs, trauma

Procedia PDF Downloads 200
1351 Thinking Lean in ICU: A Time Motion Study Quantifying ICU Nurses’ Multitasking Time Allocation

Authors: Fatma Refaat Ahmed, PhD, RN. Assistant Professor, Department of Nursing, College of Health Sciences, University of Sharjah, UAE. ([email protected]). Sally Mohamed Farghaly, Nursing Administration Department, Faculty of Nursing, Alexandria University, Alexandria, Egypt. ([email protected])

Abstract:

Context: Intensive care unit (ICU) nurses often face pressure and constraints in their work, leading to the rationing of care when demands exceed available time and resources. Observations suggest that ICU nurses are frequently distracted from their core nursing roles by non-core tasks. This study aims to provide evidence on ICU nurses' multitasking activities and explore the association between nurses' personal and clinical characteristics and their time allocation. Research Aim: The aim of this study is to quantify the time spent by ICU nurses on multitasking activities and investigate the relationship between their personal and clinical characteristics and time allocation. Methodology: A self-observation form utilizing the "Diary" recording method was used to record the number of tasks performed by ICU nurses and the time allocated to each task category. Nurses also reported on the distractions encountered during their nursing activities. A convenience sample of 60 ICU nurses participated in the study, with each nurse observed for one nursing shift (6 hours), amounting to a total of 360 hours. The study was conducted in two ICUs within a university teaching hospital in Alexandria, Egypt. Findings: The results showed that ICU nurses completed 2,730 direct patient-related tasks and 1,037 indirect tasks during the 360-hour observation period. Nurses spent an average of 33.65 minutes on ventilator care-related tasks, 14.88 minutes on tube care-related tasks, and 10.77 minutes on inpatient care-related tasks. Additionally, nurses spent an average of 17.70 minutes on indirect care tasks per hour. The study identified correlations between nursing time and nurses' personal and clinical characteristics. Theoretical Importance: This study contributes to the existing research on ICU nurses' multitasking activities and their relationship with personal and clinical characteristics. The findings shed light on the significant time spent by ICU nurses on direct care for mechanically ventilated patients and the distractions that require attention from ICU managers. Data Collection: Data were collected using self-observation forms completed by participating ICU nurses. The forms recorded the number of tasks performed, the time allocated to each task category, and any distractions encountered during nursing activities. Analysis Procedures: The collected data were analyzed to quantify the time spent on different tasks by ICU nurses. Correlations were also examined between nursing time and nurses' personal and clinical characteristics. Question Addressed: This study addressed the question of how ICU nurses allocate their time across multitasking activities and whether there is an association between nurses' personal and clinical characteristics and time allocation. Conclusion: The findings of this study emphasize the need for a lean evaluation of ICU nurses' activities to identify and address potential gaps in patient care and distractions. Implementing lean techniques can improve efficiency, safety, clinical outcomes, and satisfaction for both patients and nurses, ultimately enhancing the quality of care and organizational performance in the ICU setting.

Keywords: motion study, ICU nurse, lean, nursing time, multitasking activities

Procedia PDF Downloads 65
1350 Socio-Cultural Representations through Lived Religions in Dalrymple’s Nine Lives

Authors: Suman

Abstract:

In the continuous interaction between the past and the present that historiography is, each time when history gets re/written, a new representation emerges. This new representation is a reflection of the earlier archives and their interpretations, fragmented remembrances of the past, as well as the reactions to the present. Memory, or lack thereof, and stereotyping generally play a major role in this representation. William Dalrymple’s Nine Lives: In Search of the Sacred in Modern India (2009) is one such written account that sets out to narrate the representations of religion and culture of India and contemporary reactions to it. Dalrymple’s nine saints belong to different castes, sects, religions, and regions. By dealing with their religions and expressions of those religions, and through the lived mysticism of these nine individuals, the book engages with some important issues like class, caste and gender in the contexts provided by historical as well as present India. The paper studies the development of religion and accompanied feeling of religiosity in modern as well as historical contexts through a study of these elements in the book. Since, the language used in creation of texts and the literary texts thus produced create a new reality that questions the stereotypes of the past, and in turn often end up creating new stereotypes or stereotypical representations at times, the paper seeks to actively engage with the text in order to identify and study such stereotypes, along with their changing representations. Through a detailed examination of the book, the paper seeks to unravel whether some socio-cultural stereotypes existed earlier, and whether there is development of new stereotypes from Dalrymple’s point of view as an outsider writing on issues that are deeply rooted in the cultural milieu of the country. For this analysis, the paper takes help from the psycho-literary theories of stereotyping and representation.

Keywords: stereotyping, representation, William Dalrymple, religion

Procedia PDF Downloads 307
1349 Mutual Information Based Image Registration of Satellite Images Using PSO-GA Hybrid Algorithm

Authors: Dipti Patra, Guguloth Uma, Smita Pradhan

Abstract:

Registration is a fundamental task in image processing. It is used to transform different sets of data into one coordinate system, where data are acquired from different times, different viewing angles, and/or different sensors. The registration geometrically aligns two images (the reference and target images). Registration techniques are used in satellite images and it is important in order to be able to compare or integrate the data obtained from these different measurements. In this work, mutual information is considered as a similarity metric for registration of satellite images. The transformation is assumed to be a rigid transformation. An attempt has been made here to optimize the transformation function. The proposed image registration technique hybrid PSO-GA incorporates the notion of Particle Swarm Optimization and Genetic Algorithm and is used for finding the best optimum values of transformation parameters. The performance comparision obtained with the experiments on satellite images found that the proposed hybrid PSO-GA algorithm outperforms the other algorithms in terms of mutual information and registration accuracy.

Keywords: image registration, genetic algorithm, particle swarm optimization, hybrid PSO-GA algorithm and mutual information

Procedia PDF Downloads 405