Search results for: social work field training
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 29911

Search results for: social work field training

28471 Gender Gap in Returns to Social Entrepreneurship

Authors: Saul Estrin, Ute Stephan, Suncica Vujic

Abstract:

Background and research question: Gender differences in pay are present at all organisational levels, including at the very top. One possible way for women to circumvent organizational norms and discrimination is to engage in entrepreneurship because, as CEOs of their own organizations, entrepreneurs largely determine their own pay. While commercial entrepreneurship plays an important role in job creation and economic growth, social entrepreneurship has come to prominence because of its promise of addressing societal challenges such as poverty, social exclusion, or environmental degradation through market-based rather than state-sponsored activities. This opens the research question whether social entrepreneurship might be a form of entrepreneurship in which the pay of men and women is the same, or at least more similar; that is to say there is little or no gender pay gap. If the gender gap in pay persists also at the top of social enterprises, what are the factors, which might explain these differences? Methodology: The Oaxaca-Blinder Decomposition (OBD) is the standard approach of decomposing the gender pay gap based on the linear regression model. The OBD divides the gender pay gap into the ‘explained’ part due to differences in labour market characteristics (education, work experience, tenure, etc.), and the ‘unexplained’ part due to differences in the returns to those characteristics. The latter part is often interpreted as ‘discrimination’. There are two issues with this approach. (i) In many countries there is a notable convergence in labour market characteristics across genders; hence the OBD method is no longer revealing, since the largest portion of the gap remains ‘unexplained’. (ii) Adding covariates to a base model sequentially either to test a particular coefficient’s ‘robustness’ or to account for the ‘effects’ on this coefficient of adding covariates might be problematic, due to sequence-sensitivity when added covariates are correlated. Gelbach’s decomposition (GD) addresses latter by using the omitted variables bias formula, which constructs a conditional decomposition thus accounting for sequence-sensitivity when added covariates are correlated. We use GD to decompose the differences in gaps of pay (annual and hourly salary), size of the organisation (revenues), effort (weekly hours of work), and sources of finances (fees and sales, grants and donations, microfinance and loans, and investors’ capital) between men and women leading social enterprises. Database: Our empirical work is made possible by our collection of a unique dataset using respondent driven sampling (RDS) methods to address the problem that there is as yet no information on the underlying population of social entrepreneurs. The countries that we focus on are the United Kingdom, Spain, Romania and Hungary. Findings and recommendations: We confirm the existence of a gender pay gap between men and women leading social enterprises. This gap can be explained by differences in the accumulation of human capital, psychological and social factors, as well as cross-country differences. The results of this study contribute to a more rounded perspective, highlighting that although social entrepreneurship may be a highly satisfying occupation, it also perpetuates gender pay inequalities.

Keywords: Gelbach’s decomposition, gender gap, returns to social entrepreneurship, values and preferences

Procedia PDF Downloads 247
28470 The Reasons behind Individuals to Join Terrorist Organizations: Recruitment from Outside

Authors: Murat Sözen

Abstract:

Today terrorism is gaining momentum again. Parallel to this, it hurts more than before because it has victims from not only its own locations but also remote places. As victims are from outside, militants are likewise from own location and outside. What made these individuals join the terrorist organizations and how these organizations recruit militants are still unanswered. The purpose of this work is to find reasons of joining and power of recruiting. In addition, the role of most popular tool of recruiting, ‘social media’ will be examined.

Keywords: recruitment, social media, recruitment, militants

Procedia PDF Downloads 353
28469 The Effects of the Parent Training Program for Obesity Reduction on Health Behaviors of School-Age Children

Authors: Muntanavadee Maytapattana

Abstract:

The purposes of the study were to evaluate the effectiveness of the Parent Training Program for Obesity Reduction (PTPOR) on health behaviors of school-age children. An Ecological Systems Theory (EST) was approached the study and a randomized control trial was used in this study. Participants were school-age overweight or obese children and their parents. One hundred and one parent-child dyads were recruited and random assigned into the PTPOR (N=30), Educational Intervention or EI (N=32), and control group (N=39). The parents in the PTPOR group participated in five sessions including an educational session, a cooking session, aerobic exercise training, 2-time group discussion sessions, and 4-time telephoned counseling sessions. Repeated Measure ANCOVA was used to analyze data. The results presented that the outcomes of the PTPOR group were better than the EI and the control groups at 1st, 8th, and 32nd weeks after finishing the program such as child exercise behavior (F(2,97) = 3.98, p = .02) and child dietary behavior (F(2,97) = 9.42, p = .00). The results suggest that nurses and health care providers should utilize the PTPOR for child weight reduction and for the health promotion of a lifestyle among overweight and obese children.

Keywords: parent training program, obesity reduction, child health behaviors, school-age children

Procedia PDF Downloads 447
28468 Transit-Oriented Development as a Tool for Building Social Capital

Authors: Suneet Jagdev

Abstract:

Rapid urbanization has resulted in informal settlements on the periphery of nearly all big cities in the developing world due to lack of affordable housing options in the city. Residents of these communities have to travel long distances to get to work or search for jobs in these cities, and women, children and elderly people are excluded from urban opportunities. Affordable and safe public transport facilities can help them expand their possibilities. The aim of this research is to identify social capital as another important element of livable cities that can be protected and nurtured through transit-oriented development, as a tool to provide real resources that can help these transit-oriented communities become self-sustainable. Social capital has been referred to the collective value of all social networks and the inclinations that arise from these networks to do things for each other. It is one of the key component responsible to build and maintain democracy. Public spaces, pedestrian amenities and social equity are the other essential part of Transit Oriented Development models that will be analyzed in this research. The data has been collected through the analysis of several case studies, the urban design strategies implemented and their impact on the perception and on the community´s experience, and, finally, how these focused on the social capital. Case studies have been evaluated on several metrics, namely ecological, financial, energy consumption, etc. A questionnaire and other tools were designed to collect data to analyze the research objective and reflect the dimension of social capital. The results of the questionnaire indicated that almost all the participants have a positive attitude towards this dimensions of building a social capital with the aid of transit-oriented development. Statistical data of the identified key motivators against against demographic characteristics have been generated based on the case studies used for the paper. The findings suggested that there is a direct relation between urbanization, transit-oriented developments, and social capital.

Keywords: better opportunities, low-income settlements, social capital, social inclusion, transit oriented development

Procedia PDF Downloads 334
28467 Personnel Marketing as Perceived by HR Managers in Czech Republic: Results of a Qualitative Research Study

Authors: Lukáš Mazánek, Zdeňka Konečná

Abstract:

The article is devoted to the area of personnel marketing. A comprehensive review of scientific literature and articles published predominantly in personnel-oriented journals was carried out, followed by a qualitative exploratory research with the aim to explore and explain the perception of personnel marketing. Due to the lack of research in this field in Czech Republic, we have focused on Czech HR managers, more specifically, on how they understand the tasks of personnel marketing, which tools they use and whether the companies they work for try to be a preferred employer. The answers from our respondents were used to help us determine what is important within this field. All of the respondents strive to be a preferred employer and try to achieve it by using an extensive range of marketing tools. The most frequently used tools are advertising, job fairs presentations, employee care and employer brand promotion.

Keywords: Czech Republic, personnel marketing, preferred employer, qualitative research study

Procedia PDF Downloads 343
28466 A Serious Game to Upgrade the Learning of Organizational Skills in Nursing Schools

Authors: Benoit Landi, Hervé Pingaud, Jean-Benoit Culie, Michel Galaup

Abstract:

Serious games have been widely disseminated in the field of digital learning. They have proved their utility in improving skills through virtual environments that simulate the field where new competencies have to be improved and assessed. This paper describes how we created CLONE, a serious game whose purpose is to help nurses create an efficient work plan in a hospital care unit. In CLONE, the number of patients to take care of is similar to the reality of their job, going far beyond what is currently practiced in nurse school classrooms. This similarity with the operational field increases proportionally the number of activities to be scheduled. Moreover, very often, the team of nurses is composed of regular nurses and nurse assistants that must share the work with respect to the regulatory obligations. Therefore, on the one hand, building a short-term planning is a complex task with a large amount of data to deal with, and on the other, good clinical practices have to be systematically applied. We present how reference planning has been defined by addressing an optimization problem formulation using the expertise of teachers. This formulation ensures the gameplay feasibility for the scenario that has been produced and enhanced throughout the game design process. It was also crucial to steer a player toward a specific gaming strategy. As one of our most important learning outcomes is a clear understanding of the workload concept, its factual calculation for each caregiver along time and its inclusion in the nurse reasoning during planning elaboration are focal points. We will demonstrate how to modify the game scenario to create a digital environment in which these somewhat abstract principles can be understood and applied. Finally, we give input on an experience we had on a pilot of a thousand undergraduate nursing students.

Keywords: care planning, workload, game design, hospital nurse, organizational skills, digital learning, serious game

Procedia PDF Downloads 193
28465 Cicadas: A Clinician-assisted, Closed-loop Technology, Mobile App for Adolescents with Autism Spectrum Disorders

Authors: Bruno Biagianti, Angela Tseng, Kathy Wannaviroj, Allison Corlett, Megan DuBois, Kyu Lee, Suma Jacob

Abstract:

Background: ASD is characterized by pervasive Sensory Processing Abnormalities (SPA) and social cognitive deficits that persist throughout the course of the illness and have been linked to functional abnormalities in specific neural systems that underlie the perception, processing, and representation of sensory information. SPA and social cognitive deficits are associated with difficulties in interpersonal relationships, poor development of social skills, reduced social interactions and lower academic performance. Importantly, they can hamper the effects of established evidence-based psychological treatments—including PEERS (Program for the Education and Enrichment of Relationship Skills), a parent/caregiver-assisted, 16-weeks social skills intervention—which nonetheless requires a functional brain capable of assimilating and retaining information and skills. As a matter of fact, some adolescents benefit from PEERS more than others, calling for strategies to increase treatment response rates. Objective: We will present interim data on CICADAS (Care Improving Cognition for ADolescents on the Autism Spectrum)—a clinician-assisted, closed-loop technology mobile application for adolescents with ASD. Via ten mobile assessments, CICADAS captures data on sensory processing abnormalities and associated cognitive deficits. These data populate a machine learning algorithm that tailors the delivery of ten neuroplasticity-based social cognitive training (NB-SCT) exercises targeting sensory processing abnormalities. Methods: In collaboration with the Autism Spectrum and Neurodevelopmental Disorders Clinic at the University of Minnesota, we conducted a fully remote, three-arm, randomized crossover trial with adolescents with ASD to document the acceptability of CICADAS and evaluate its potential as a stand-alone treatment or as a treatment enhancer of PEERS. Twenty-four adolescents with ASD (ages 11-18) have been initially randomized to 16 weeks of PEERS + CICADAS (Arm A) vs. 16 weeks of PEERS + computer games vs. 16 weeks of CICADAS alone (Arm C). After 16 weeks, the full battery of assessments has been remotely administered. Results: We have evaluated the acceptability of CICADAS by examining adherence rates, engagement patterns, and exit survey data. We found that: 1) CICADAS is able to serve as a treatment enhancer for PEERS, inducing greater improvements in sensory processing, cognition, symptom reduction, social skills and behaviors, as well as the quality of life compared to computer games; 2) the concurrent delivery of PEERS and CICADAS induces greater improvements in study outcomes compared to CICADAS only. Conclusion: While preliminary, our results indicate that the individualized assessment and treatment approach designed in CICADAS seems effective in inducing adaptive long-term learning about social-emotional events. CICADAS-induced enhancement of processing and cognition facilitates the application of PEERS skills in the environment of adolescents with ASD, thus improving their real-world functioning.

Keywords: ASD, social skills, cognitive training, mobile app

Procedia PDF Downloads 218
28464 Mobile Cloud Application in Design Build Bridge Construction

Authors: Meng Sun, Bin Wei

Abstract:

In the past decades, design-build has become a more popular project delivery system especially for the large scaled infrastructure project in North America. It provides a one-stop shopping system for the client therefore improves the efficiency of construction, and reduces the risks and overall cost for the clients. Compared to the project with traditional delivery method, design-build project requires contractor and designer to work together efficiently to deliver the best-value solutions through the construction process. How to facilitate a solid integration and efficient interaction between contractor and designer often affects the schedule, budget and quality of the construction therefore becomes a key factor to the success of a design-build project. This paper presents a concept of using modern mobile cloud technology to provide an integrated solution during the design-build construction. It uses mobile cloud architecture to provide a platform for real-time field progress, change request approval, job progress log, and project time entry with devices integration for field information and communications. The paper uses a real filed change notice as an example to demonstrate how mobile cloud technology applies in a design-build project and how it can improve the project efficiency.

Keywords: cloud, design-build, field change notice, mobile application

Procedia PDF Downloads 250
28463 Neutron Contamination in 18 MV Medical Linear Accelerator

Authors: Onur Karaman, A. Gunes Tanir

Abstract:

Photon radiation therapy used to treat cancer is one of the most important methods. However, photon beam collimator materials in Linear Accelerator (LINAC) head generally contains heavy elements is used and the interaction of bremsstrahlung photon with such heavy nuclei, the neutron can be produced inside the treatment rooms. In radiation therapy, neutron contamination contributes to the risk of secondary malignancies in patients, also physicians working in this field. Since the neutron is more dangerous than photon, it is important to determine neutron dose during radiotherapy treatment. In this study, it is aimed to analyze the effect of field size, distance from axis and depth on the amount of in-field and out-field neutron contamination for ElektaVmat accelerator with 18 MV nominal energy. The photon spectra at the distance of 75, 150, 225, 300 cm from target and on the isocenter of beam were scored for 5x5, 10x10, 20x20, 30x30 and 40x40 cm2 fields. Results demonstrated that the neutron spectra and dose are dependent on field size and distances. Beyond 225 cm of isocenter, the dependence of the neutron dose on field size is minimal. As a result, it is concluded that as the open field increases, neutron dose determined decreases. It is important to remember that when treating with high energy photons, the dose from contamination neutrons must be considered as it is much greater than the photon dose.

Keywords: radiotherapy, neutron contamination, linear accelerators, photon

Procedia PDF Downloads 351
28462 Visual Template Detection and Compositional Automatic Regular Expression Generation for Business Invoice Extraction

Authors: Anthony Proschka, Deepak Mishra, Merlyn Ramanan, Zurab Baratashvili

Abstract:

Small and medium-sized businesses receive over 160 billion invoices every year. Since these documents exhibit many subtle differences in layout and text, extracting structured fields such as sender name, amount, and VAT rate from them automatically is an open research question. In this paper, existing work in template-based document extraction is extended, and a system is devised that is able to reliably extract all required fields for up to 70% of all documents in the data set, more than any other previously reported method. The approaches are described for 1) detecting through visual features which template a given document belongs to, 2) automatically generating extraction rules for a given new template by composing regular expressions from multiple components, and 3) computing confidence scores that indicate the accuracy of the automatic extractions. The system can generate templates with as little as one training sample and only requires the ground truth field values instead of detailed annotations such as bounding boxes that are hard to obtain. The system is deployed and used inside a commercial accounting software.

Keywords: data mining, information retrieval, business, feature extraction, layout, business data processing, document handling, end-user trained information extraction, document archiving, scanned business documents, automated document processing, F1-measure, commercial accounting software

Procedia PDF Downloads 134
28461 Educational Psychologists in Instructional and Mentoring Contexts: The Significance of Multicultural Competence

Authors: Yassir Semmar

Abstract:

During the past two decades, the topic of multicultural competence has gained much attention in the psychology field, most notably in the clinical and counseling specializations. While higher education institutions have been placing a premium on sensitizing their faculty, staff, and student bodies to various diversity and multicultural issues, little emphasis has been directed towards mandating multicultural training for graduate learners in the educational psychology specialty. Given the increasingly diverse student population, it is imperative for educational psychologists to become multiculturally competent particularly in instructional and mentoring contexts. Strategies and conditions for attaining multicultural competence are discussed.

Keywords: multicultural competence, instruction, pedagogical practices, mentoring

Procedia PDF Downloads 445
28460 An Overview of Nano-Particles Effect on Mechanical Properties of Composites

Authors: Ganiyu I. Lawal, Olatunde I. Sekunowo, Stephen I. Durowaye

Abstract:

Composites depending on the nature of their constituents and mode of production are regarded as one of the advanced materials that drive today’s technology. This paper attempts a short review of the subject matter with a general aim of pushing to the next level the frontier of knowledge as it impacts the technology of nano-particles manufacturing. The objectives entail an effort to; aggregate recent research efforts in this field, analyse research findings and observations, streamline research efforts and support industry in taking decision on areas of fund deployment. It is envisaged that this work will serve as a quick hand-on compendium material for researchers in this field and a guide to relevant government departments wishing to fund a research whose outcomes have the potential of improving the nation’s GDP.

Keywords: advanced materials, composites, mechanical properties, nano-particles

Procedia PDF Downloads 280
28459 Experiences of Students in a Cultural Competence Learning Project in Hong Kong- Themes from Qualitative Analysis

Authors: Diana Kwok

Abstract:

Introduction: There is a rising concern on the educational needs of school guidance teachers, counselors, and sex educators to work effectively with students from multicultural groups, such as racial minorities, gender minorities, sexual minorities, and disability groups etc., and to respect cultural diversities. A specialized training model, the multicultural framework based on contact theory is recognized as necessary training model for professional training programs. Methodology: While the major focus of this project is on improving teaching and learning in teacher training courses within the department of Special Education and Counselling, it specifically aims to enhance the cultural competence of 102 participants enrolled in counseling and sexuality education courses by integrating the following teaching and learning strategies: 1) Panel presentation; 2) Case studies; 3) Experiential learning. Data sources from the participants consisted of the following: (a) questionnaires (MCKAS and ATLG) administered in classes; (b) weekly reflective journals, and c) focus group interviews with panel members. The focus group interviews with panel members were documented. Qualitatively, the weekly reflections were content analyzed. The presentation in this specific conference put focus on themes we found from qualitative content analysis of weekly reflective journals from 102 participants. Findings: Content analysis had found the following preliminary emergent themes: Theme I) Cultural knowledge and challenges to personal limitation. Students had gained a new perspective that specific cultural knowledge involved unique values and worldview. Awareness of limitation of counsellors is very important after actively acquiring the cultural knowledge. Theme 2 - Observation, engagement and active learning. Through the sharing and case studies, as well as visits to the communities, students recognized that observation and listening to the needs of cultural group members were the essential steps before taking any intervention steps. Theme 3 - Curiosity and desire for further inter-group dialogue. All students expressed their desire, curiosity, and motivation to have further inter-group dialogue in their future work settings. Theme 4: Experience with teaching and learning strategies. Students shared their perspectives on how teaching and learning strategies had facilitated their acquisition of cultural competence. Results of this analysis suggests that diverse teaching and learning strategies based on contact perspective had stimulated their curiosity to re-examine their values and motivated them to acquire cultural knowledge relevant to the cultural groups. Acknowledgment: The teaching and learning project was funded by the Teaching and Development Grant, Hong Kong Institute of Education (Project Number T0142).

Keywords: cultural competence, Chinese teacher students, teaching and learning, contacts

Procedia PDF Downloads 243
28458 Smart Automated Furrow Irrigation: A Preliminary Evaluation

Authors: Jasim Uddin, Rod Smith, Malcolm Gillies

Abstract:

Surface irrigation is the most popular irrigation method all over the world. However, two issues: low efficiency and huge labour involvement concern irrigators due to scarcity in recent years. To address these issues, a smart automated furrow is conceptualised that can be operated using digital devices like smartphone, iPad or computer and a preliminary evaluation was conducted in this study. The smart automated system is the integration of commercially available software and hardware. It includes real-time surface irrigation optimisation software (SISCO) and Rubicon Water’s surface irrigation automation hardware and software. The automated system consists of automatic water delivery system with 300 mm flexible pipes attached to both sides of a remotely controlled valve to operate the irrigation. A water level sensor to obtain the real-time inflow rate from the measured head in the channel, advance sensors to measure the advance time to particular points of an irrigated field, a solar-powered telemetry system including a base station to communicate all the field sensors with the main server. On the basis of field data, the software (SISCO) is optimised the ongoing irrigation and determine the optimum cut-off for particular irrigation and send this information to the control valve to stop the irrigation in a particular (cut-off) time. The preliminary evaluation shows that the automated surface irrigation worked reasonably well without manual intervention. The evaluation of farmers managed irrigation events show the potentials to save a significant amount of water and labour. A substantial amount of economic and social benefits are expected in rural industries by adopting this system. The future outcome of this work would be a fully tested commercial adaptive real-time furrow irrigation system able to compete with the pressurised alternative of centre pivot or lateral move machines on capital cost, water and labour savings but without the massive energy costs.

Keywords: furrow irrigation, smart automation, infiltration, SISCO, real-time irrigation, adoptive control

Procedia PDF Downloads 455
28457 Adversarial Attacks and Defenses on Deep Neural Networks

Authors: Jonathan Sohn

Abstract:

Deep neural networks (DNNs) have shown state-of-the-art performance for many applications, including computer vision, natural language processing, and speech recognition. Recently, adversarial attacks have been studied in the context of deep neural networks, which aim to alter the results of deep neural networks by modifying the inputs slightly. For example, an adversarial attack on a DNN used for object detection can cause the DNN to miss certain objects. As a result, the reliability of DNNs is undermined by their lack of robustness against adversarial attacks, raising concerns about their use in safety-critical applications such as autonomous driving. In this paper, we focus on studying the adversarial attacks and defenses on DNNs for image classification. There are two types of adversarial attacks studied which are fast gradient sign method (FGSM) attack and projected gradient descent (PGD) attack. A DNN forms decision boundaries that separate the input images into different categories. The adversarial attack slightly alters the image to move over the decision boundary, causing the DNN to misclassify the image. FGSM attack obtains the gradient with respect to the image and updates the image once based on the gradients to cross the decision boundary. PGD attack, instead of taking one big step, repeatedly modifies the input image with multiple small steps. There is also another type of attack called the target attack. This adversarial attack is designed to make the machine classify an image to a class chosen by the attacker. We can defend against adversarial attacks by incorporating adversarial examples in training. Specifically, instead of training the neural network with clean examples, we can explicitly let the neural network learn from the adversarial examples. In our experiments, the digit recognition accuracy on the MNIST dataset drops from 97.81% to 39.50% and 34.01% when the DNN is attacked by FGSM and PGD attacks, respectively. If we utilize FGSM training as a defense method, the classification accuracy greatly improves from 39.50% to 92.31% for FGSM attacks and from 34.01% to 75.63% for PGD attacks. To further improve the classification accuracy under adversarial attacks, we can also use a stronger PGD training method. PGD training improves the accuracy by 2.7% under FGSM attacks and 18.4% under PGD attacks over FGSM training. It is worth mentioning that both FGSM and PGD training do not affect the accuracy of clean images. In summary, we find that PGD attacks can greatly degrade the performance of DNNs, and PGD training is a very effective way to defend against such attacks. PGD attacks and defence are overall significantly more effective than FGSM methods.

Keywords: deep neural network, adversarial attack, adversarial defense, adversarial machine learning

Procedia PDF Downloads 198
28456 Impact of 6-Week Brain Endurance Training on Cognitive and Cycling Performance in Highly Trained Individuals

Authors: W. Staiano, S. Marcora

Abstract:

Introduction: It has been proposed that acute negative effect of mental fatigue (MF) could potentially become a training stimulus for the brain (Brain endurance training (BET)) to adapt and improve its ability to attenuate MF states during sport competitions. Purpose: The aim of this study was to test the efficacy of 6 weeks of BET on cognitive and cycling tests in a group of well-trained subjects. We hypothesised that combination of BET and standard physical training (SPT) would increase cognitive capacity and cycling performance by reducing rating of perceived exertion (RPE) and increase resilience to fatigue more than SPT alone. Methods: In a randomized controlled trial design, 26 well trained participants, after a familiarization session, cycled to exhaustion (TTE) at 80% peak power output (PPO) and, after 90 min rest, at 65% PPO, before and after random allocation to a 6 week BET or active placebo control. Cognitive performance was measured using 30 min of STROOP coloured task performed before cycling performance. During the training, BET group performed a series of cognitive tasks for a total of 30 sessions (5 sessions per week) with duration increasing from 30 to 60 min per session. Placebo engaged in a breathing relaxation training. Both groups were monitored for physical training and were naïve to the purpose of the study. Physiological and perceptual parameters of heart rate, lactate (LA) and RPE were recorded during cycling performances, while subjective workload (NASA TLX scale) was measured during the training. Results: Group (BET vs. Placebo) x Test (Pre-test vs. Post-test) mixed model ANOVA’s revealed significant interaction for performance at 80% PPO (p = .038) or 65% PPO (p = .011). In both tests, groups improved their TTE performance; however, BET group improved significantly more compared to placebo. No significant differences were found for heart rate during the TTE cycling tests. LA did not change significantly at rest in both groups. However, at completion of 65% TTE, it was significantly higher (p = 0.043) in the placebo condition compared to BET. RPE measured at ISO-time in BET was significantly lower (80% PPO, p = 0.041; 65% PPO p= 0.021) compared to placebo. Cognitive results in the STROOP task showed that reaction time in both groups decreased at post-test. However, BET decreased significantly (p = 0.01) more compared to placebo despite no differences accuracy. During training sessions, participants in the BET showed, through NASA TLX questionnaires, constantly significantly higher (p < 0.01) mental demand rates compared to placebo. No significant differences were found for physical demand. Conclusion: The results of this study provide evidences that combining BET and SPT seems to be more effective than SPT alone in increasing cognitive and cycling performance in well trained endurance participants. The cognitive overload produced during the 6-week training of BET can induce a reduction in perception of effort at a specific power, and thus improving cycling performance. Moreover, it provides evidence that including neurocognitive interventions will benefit athletes by increasing their mental resilience, without affecting their physical training load and routine.

Keywords: cognitive training, perception of effort, endurance performance, neuro-performance

Procedia PDF Downloads 124
28455 Using Action Based Research to Examine the Effects of Co-Teaching on Middle School and High School Student Achievement in Math and Language Arts

Authors: Kathleen L. Seifert

Abstract:

Students with special needs are expected to achieve the same academic standards as their general education peers, yet many students with special needs are pulled-out of general content instruction. Because of this, many students with special needs are denied content knowledge from a content expert and instead receive content instruction in a more restrictive setting. Collaborative teaching, where a general education and special education teacher work alongside each other in the same classroom, has become increasingly popular as a means to meet the diverse needs of students in America’s public schools. The idea behind co-teaching is noble; to ensure students with special needs receive content area instruction from a content expert while also receiving the necessary supports to be successful. However, in spite of this noble effort, the effects of co-teaching are not always positive. The reasons why have produced several hypotheses, one of which has to do with lack of proper training and implementation of effective evidence-based co-teaching practices. In order to examine the effects of co-teacher training, eleven teaching pairs from a small mid-western school district in the United States participated in a study. The purpose of the study was to examine the effects of co-teacher training on middle and high school student achievement in Math and Language Arts. A local university instructor provided teachers with training in co-teaching via a three-day workshop. In addition, co-teaching pairs were given the opportunity for direct observation and feedback using the Co-teaching Core Competencies Observation Checklist throughout the academic year. Data are in the process of being collected on both the students enrolled in the co-taught classes as well as on the teachers themselves. Student data compared achievement on standardized assessments and classroom performance across three domains: 1. General education students compared to students with special needs in co-taught classrooms, 2. Students with special needs in classrooms with and without co-teaching, 3. Students in classrooms where teachers were given observation and feedback compared to teachers who refused the observation and feedback. Teacher data compared the perceptions of the co-teaching initiative between teacher pairs who received direct observation and feedback from those who did not. The findings from the study will be shared with the school district and used for program improvement.

Keywords: collabortive teaching, collaboration, co-teaching, professional development

Procedia PDF Downloads 123
28454 Active Learning through a Game Format: Implementation of a Nutrition Board Game in Diabetes Training for Healthcare Professionals

Authors: Li Jiuen Ong, Magdalin Cheong, Sri Rahayu, Lek Alexander, Pei Ting Tan

Abstract:

Background: Previous programme evaluations from the diabetes training programme conducted in Changi General Hospital revealed that healthcare professionals (HCPs) are keen to receive advance diabetes training and education, specifically in medical, nutritional therapy. HCPs also expressed a preference for interactive activities over didactic teaching methods to enhance their learning. Since the War on Diabetes was initiated by MOH in 2016, HCPs are challenged to be actively involved in continuous education to be better equipped to reduce the growing burden of diabetes. Hence, streamlining training to incorporate an element of fun is of utmost importance. Aim: The nutrition programme incorporates game play using an interactive board game that aims to provide a more conducive and less stressful environment for learning. The board game could be adapted for training of community HCPs, health ambassadors or caregivers to cope with the increasing demand of diabetes care in the hospital and community setting. Methodology: Stages for game’s conception (Jaffe, 2001) were adopted in the development of the interactive board game ‘Sweet Score™ ’ Nutrition concepts and topics in diabetes self-management are embedded into the game elements of varying levels of difficulty (‘Easy,’ ‘Medium,’ ‘Hard’) including activities such as a) Drawing/ sculpting (Pictionary-like) b)Facts/ Knowledge (MCQs/ True or False) Word definition) c) Performing/ Charades To study the effects of game play on knowledge acquisition and perceived experiences, participants were randomised into two groups, i.e., lecture group (control) and game group (intervention), to test the difference. Results: Participants in both groups (control group, n= 14; intervention group, n= 13) attempted a pre and post workshop quiz to assess the effectiveness of knowledge acquisition. The scores were analysed using paired T-test. There was an improvement of quiz scores after attending the game play (mean difference: 4.3, SD: 2.0, P<0.001) and the lecture (mean difference: 3.4, SD: 2.1, P<0.001). However, there was no significance difference in the improvement of quiz scores between gameplay and lecture (mean difference: 0.9, 95%CI: -0.8 to 2.5, P=0.280). This suggests that gameplay may be as effective as a lecture in terms of knowledge transfer. All the13 HCPs who participated in the game rated 4 out of 5 on the likert scale for the favourable learning experience and relevance of learning to their job, whereas only 8 out of 14 HCPs in the lecture reported a high rating in both aspects. 16. Conclusion: There is no known board game currently designed for diabetes training for HCPs.Evaluative data from future training can provide insights and direction to improve the game format and cover other aspects of diabetes management such as self-care, exercise, medications and insulin management. Further testing of the board game to ensure learning objectives are met is important and can assist in the development of awell-designed digital game as an alternative training approach during the COVID-19 pandemic. Learning through gameplay increases opportunities for HCPs to bond, interact and learn through games in a relaxed social setting and potentially brings more joy to the workplace.

Keywords: active learning, game, diabetes, nutrition

Procedia PDF Downloads 177
28453 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan

Authors: Pema Choejey, David Murray, Chun Che Fung

Abstract:

Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.

Keywords: awareness and training, cybersecurity policy, risk management, security risks

Procedia PDF Downloads 350
28452 Non-Singular Gravitational Collapse of a Homogeneous Scalar Field in Deformed Phase Space

Authors: Amir Hadi Ziaie

Abstract:

In the present work, we revisit the collapse process of a spherically symmetric homogeneous scalar field (in FRW background) minimally coupled to gravity, when the phase-space deformations are taken into account. Such a deformation is mathematically introduced as a particular type of noncommutativity between the canonical momenta of the scale factor and of the scalar field. In the absence of such deformation, the collapse culminates in a spacetime singularity. However, when the phase-space is deformed, we find that the singularity is removed by a non-singular bounce, beyond which the collapsing cloud re-expands to infinity. More precisely, for negative values of the deformation parameter, we identify the appearance of a negative pressure, which decelerates the collapse to finally avoid the singularity formation. While in the un-deformed case, the horizon curve monotonically decreases to finally cover the singularity, in the deformed case the horizon has a minimum value that this value depends on deformation parameter and initial configuration of the collapse. Such a setting predicts a threshold mass for black hole formation in stellar collapse and manifests the role of non-commutative geometry in physics and especially in stellar collapse and supernova explosion.

Keywords: gravitational collapse, non-commutative geometry, spacetime singularity, black hole physics

Procedia PDF Downloads 351
28451 The Intention to Use Telecare in People of Fall Experience: Application of Fuzzy Neural Network

Authors: Jui-Chen Huang, Shou-Hsiung Cheng

Abstract:

This study examined their willingness to use telecare for people who have had experience falling in the last three months in Taiwan. This study adopted convenience sampling and a structural questionnaire to collect data. It was based on the definition and the constructs related to the Health Belief Model (HBM). HBM is comprised of seven constructs: perceived benefits (PBs), perceived disease threat (PDT), perceived barriers of taking action (PBTA), external cues to action (ECUE), internal cues to action (ICUE), attitude toward using (ATT), and behavioral intention to use (BI). This study adopted Fuzzy Neural Network (FNN) to put forward an effective method. It shows the dependence of ATT on PB, PDT, PBTA, ECUE, and ICUE. The training and testing data RMSE (root mean square error) are 0.028 and 0.166 in the FNN, respectively. The training and testing data RMSE are 0.828 and 0.578 in the regression model, respectively. On the other hand, as to the dependence of ATT on BI, as presented in the FNN, the training and testing data RMSE are 0.050 and 0.109, respectively. The training and testing data RMSE are 0.529 and 0.571 in the regression model, respectively. The results show that the FNN method is better than the regression analysis. It is an effective and viable good way.

Keywords: fall, fuzzy neural network, health belief model, telecare, willingness

Procedia PDF Downloads 206
28450 Automated Video Surveillance System for Detection of Suspicious Activities during Academic Offline Examination

Authors: G. Sandhya Devi, G. Suvarna Kumar, S. Chandini

Abstract:

This research work aims to develop a system that will analyze and identify students who indulge in malpractices/suspicious activities during the course of an academic offline examination. Automated Video Surveillance provides an optimal solution which helps in monitoring the students and identifying the malpractice event immediately. This work is organized into three modules. The first module deals with performing an impersonation check using a PCA-based face recognition method which is done by cross checking his profile with the database. The presence or absence of the student is even determined in this module by implementing an image registration technique wherein a grid is formed by considering all the images registered using the frontal camera at the determined positions. Second, detecting such facial malpractices in which a student gets involved in conversation with another, trying to obtain unauthorized information etc., based on the threshold range evaluated by considering his/her mouth state whether open or closed. The third module deals with identification of unauthorized material or gadgets used in the examination hall by training the positive samples of the object through various stages. Here, a top view camera feed is analyzed to detect the suspicious activities. The system automatically alerts the administration when any suspicious activities are identified, thereby reducing the error rate caused due to manual monitoring. This work is an improvement over our previous work published in identifying suspicious activities done by examinees in an offline examination.

Keywords: impersonation, image registration, incrimination, object detection, threshold evaluation

Procedia PDF Downloads 232
28449 Characteristics of the entrepreneurial professor: Educational Leadership and Higher Education

Authors: Ana Verde

Abstract:

Higher education is now a source of new paradigms, advanced research in various fields of knowledge and an essential element in providing solutions to the major problems it faces today. In the education sector, more and more attention is being paid to the importance of entrepreneurship and the need for students to acquire skills in the classroom in order to be successful in their future careers. In the field of education, the term "teacherpreneur" has been coined in recent years to describe a teacher who is committed to educational change, passionate about his or her work, charismatic, self-confident, flexible, responsible, able to dare to break the established rules and take risks, and whose work is student-centred and action oriented. This research analyses the characteristics of the entrepreneurial professor and educational leader, and how their practice can be directed towards educational improvement.

Keywords: higher education, entrepreneurial, skills, leadership

Procedia PDF Downloads 65
28448 Transformational Entrepreneurship: Exploring Pedagogy in Tertiary Education

Authors: S. Karmokar

Abstract:

Over the last 20 years, there has been increasing interest in the topic of entrepreneurship education as it is seen in many countries as a way of enhancing the enterprise culture and promote capability building among community. There is also rapid growth of emerging technologies across the globe and forced entrepreneurs to searching for a new model of economic growth. There are two movements that are dominating and creating waves, Technology Entrepreneurship and Social Entrepreneurship. An increasing number of entrepreneurs are awakening to the possibility of combining the scalable tools and methodology of Technology Entrepreneurship with the value system of Social Entrepreneurship–‘Transformational Entrepreneurship’. To do this transitional educational institute’s need to figure out how to unite the scalable tools of Technology Entrepreneurship with the moral ethos of Social Entrepreneurship. The traditional entrepreneurship education model is wedded to top-down instructive approaches, that is widely used in management education have led to passive educational model. Despite the effort, disruptive’ pedagogies are rare in higher education; they remain underused and often marginalized. High impact and transformational entrepreneurship education and training require universities to adopt new practices and revise current, traditional ways of working. This is a conceptual research paper exploring the potential and growth of transformational entrepreneurship, investigating links between social entrepreneurship. Based on empirical studies and theoretical approaches, this paper outlines some educational approach for both academics and educational institutes to deliver emerging transformational entrepreneurship in tertiary education. The paper presents recommendations for tertiary educators to inform the designing of teaching practices, revise current delivery methods and encourage students to fulfill their potential as entrepreneurs.

Keywords: educational pedagogies, emerging technologies, social entrepreneurship, transformational entrepreneurship

Procedia PDF Downloads 200
28447 Social Media Resignation the Only Way to Protect User Data and Restore Cognitive Balance, a Literature Review

Authors: Rajarshi Motilal

Abstract:

The birth of the Internet and the rise of social media marked an important chapter in the history of humankind. Often termed the fourth scientific revolution, the Internet has changed human lives and cognisance. The birth of Web 2.0, followed by the launch of social media and social networking sites, added another milestone to these technological advancements where connectivity and influx of information became dominant. With billions of individuals using the internet and social media sites in the 21st century, “users” became “consumers”, and orthodox marketing reshaped itself to digital marketing. Furthermore, organisations started using sophisticated algorithms to predict consumer purchase behaviour and manipulate it to sustain themselves in such a competitive environment. The rampant storage and analysis of individual data became the new normal, raising many questions about data privacy. The excessive usage of the Internet among individuals brought in other problems of them becoming addicted to it, scavenging for societal approval and instant gratification, subsequently leading to a collective dualism, isolation, and finally, depression. This study aims to determine the relationship between social media usage in the modern age and the rise of psychological and cognitive imbalances in human minds. The literature review is positioned timely as an addition to the existing work at a time when the world is constantly debating on whether social media resignation is the only way to protect user data and restore the decaying cognitive balance.

Keywords: social media, digital marketing, consumer behaviour, internet addiction, data privacy

Procedia PDF Downloads 81
28446 The Effect of Electric Field Distributions on Grains and Insect for Dielectric Heating Applications

Authors: S. Santalunai, T. Thosdeekoraphat, C. Thongsopa

Abstract:

This paper presents the effect of electric field distribution which is an electric field intensity analysis. Consideration of the dielectric heating of grains and insects, the rice and rice weevils are utilized for dielectric heating analysis. Furthermore, this analysis compares the effect of electric field distribution in rice and rice weevil. In this simulation, two copper plates are used to generate the electric field for dielectric heating system and put the rice materials between the copper plates. The simulation is classified in two cases, which are case I one rice weevil is placed in the rice and case II two rice weevils are placed at different position in the rice. Moreover, the probes are located in various different positions on plate. The power feeding on this plate is optimized by using CST EM studio program of 1000 watt electrical power at 39 MHz resonance frequency. The results of two cases are indicated that the most electric field distribution and intensity are occurred on the rice and rice weevils at the near point of the probes. Moreover, the heat is directed to the rice weevils more than the rice. When the temperature of rice and rice weevils are calculated and compared, the rice weevils has the temperature more than rice is about 41.62 Celsius degrees. These results can be applied for the dielectric heating applications to eliminate insect.

Keywords: capacitor copper plates, electric field distribution, dielectric heating, grains

Procedia PDF Downloads 412
28445 Multiple Institutional Logics and the Ability of Institutional Entrepreneurs: An Analysis in the Turkish Education Field

Authors: Miraç Savaş Turhan, Ali Danişman

Abstract:

Recently scholars of new institutional theory have used institutional logics perspective to explain the contradictory practices in modern western societies. Accordingly, distinct institutional logics are embedded in central institutions such as the market, state, democracy, family, and religion. They guide individual and organizational actors and constraint their behaviors in a particular organizational field. Through this perspective, actors are assumed to have a situated, embedded, boundedly intentional, and adaptive role against the structure in social, cultural and political context. On the other hand, over a decade, there is an emerging attempt focusing on the role of actors on creating, maintaining, and changing the institutions. Such attempts brought out the concept of institutional entrepreneurs to explain the role of individual actors in relation to institutions. Institutional entrepreneurs are individuals, groups of individuals, organizations or groups of organizations that are able to initiate some actions to build, maintain or change institutions. While recent studies on institutional logics perspective have attempted to explain roles of entrepreneurial actors who have resources and skills, little is known about the effects of multiple institutional logics on the ability of institutional entrepreneurs. In this study, we aim to find out that how multiple institutional logics affect the ability of institutional entrepreneurs during the process of institutional change. We examine this issue in the Turkish Education Field. While institutional logics were identified based on the previous studies in the education field, the actions taken by Turkish National Education Ministry from 2003 to 2013 was examined through content analysis The early results indicate that there are remarkable shift and contradictions in the ability of institutional entrepreneur in taking actions to change the field in relationship to balance of power shift among the carriers of institutional logics.

Keywords: institutional theory, institutional logics, institutional entrepreneurs, Turkish national education

Procedia PDF Downloads 359
28444 The Development of Encrypted Near Field Communication Data Exchange Format Transmission in an NFC Passive Tag for Checking the Genuine Product

Authors: Tanawat Hongthai, Dusit Thanapatay

Abstract:

This paper presents the development of encrypted near field communication (NFC) data exchange format transmission in an NFC passive tag for the feasibility of implementing a genuine product authentication. We propose a research encryption and checking the genuine product into four major categories; concept, infrastructure, development and applications. This result shows the passive NFC-forum Type 2 tag can be configured to be compatible with the NFC data exchange format (NDEF), which can be automatically partially data updated when there is NFC field.

Keywords: near field communication, NFC data exchange format, checking the genuine product, encrypted NFC

Procedia PDF Downloads 283
28443 The Fibonacci Network: A Simple Alternative for Positional Encoding

Authors: Yair Bleiberg, Michael Werman

Abstract:

Coordinate-based Multi-Layer Perceptrons (MLPs) are known to have difficulty reconstructing high frequencies of the training data. A common solution to this problem is Positional Encoding (PE), which has become quite popular. However, PE has drawbacks. It has high-frequency artifacts and adds another hyper hyperparameter, just like batch normalization and dropout do. We believe that under certain circumstances, PE is not necessary, and a smarter construction of the network architecture together with a smart training method is sufficient to achieve similar results. In this paper, we show that very simple MLPs can quite easily output a frequency when given input of the half-frequency and quarter-frequency. Using this, we design a network architecture in blocks, where the input to each block is the output of the two previous blocks along with the original input. We call this a Fibonacci Network. By training each block on the corresponding frequencies of the signal, we show that Fibonacci Networks can reconstruct arbitrarily high frequencies.

Keywords: neural networks, positional encoding, high frequency intepolation, fully connected

Procedia PDF Downloads 103
28442 Moral Distress among Nurses Working in Hospitals in Jazan: A Cross-Sectional Study

Authors: Hussain Darraj

Abstract:

Background: Healthcare workers, especially nurses, are subjected to a great risk of psychological stress, mostly moral distress. Therefore, it is crucial to address moral distress in nurses. Objectives: The aim of this study is to study the extent of moral distress among hospital nurses in Jazan. Methods: This study used a cross-sectional study design, which included 419 nurses from Jazan hospitals. A questionnaire was used to measure moral distress and its related factors. Results: The average total score for moral distress among the study participants is 134.14, with a standard deviation of 53.94. Moreover, the current study findings indicate that those over the age of 35 years who work as nurse managers, working in critical departments, have the intention to leave a position, have received ethical training or workshops, have provided care for COVID-19 cases, or work in a department with staff shortages are associated with the experience of higher-level moral stress. Conclusion: Nurses are recommended to be provided with ongoing education and resources in order to reduce moral distress and create a positive work atmosphere for nurses. Moreover, the current study sheds light on the importance of organizational support to provide enough resources and staffing in order to reduce moral distress among nurses. Further research is needed to focus on other health professionals and moral distress. Moreover, future studies are also required to explore the strategies to reduce moral distress levels among nurses.

Keywords: moral distress, Jazan, nurses, hospital

Procedia PDF Downloads 95