Search results for: password based key derivation
28302 Axiomatic Systems as an Alternative to Teach Physics
Authors: Liliana M. Marinelli, Cristina T. Varanese
Abstract:
In the last few years, students from higher education have difficulties in grasping mathematical concepts which support physical matters, especially those in the first years of this education. Classical Physics teaching turns to be complex when students are not able to make use of mathematical tools which lead to the conceptual structure of Physics. When derivation and integration rules are not used or developed in parallel with other disciplines, the physical meaning that we attempt to convey turns to be complicated. Due to this fact, it could be of great use to see the Classical Mechanics from an axiomatic approach, where the correspondence rules give physical meaning, if we expect students to understand concepts clearly and accurately. Using the Minkowski point of view adapted to a two-dimensional space and time where vectors, matrices, and straight lines (worked from an affine space) give mathematical and physical rigorosity even when it is more abstract. An interesting option would be to develop the disciplinary contents from an axiomatic version which embraces the Classical Mechanics as a particular case of Relativistic Mechanics. The observation about the increase in the difficulties stated by students in the first years of education allows this idea to grow as a possible option to improve performance and understanding of the concepts of this subject.Keywords: axioms, classical physics, physical concepts, relativity
Procedia PDF Downloads 30628301 An Investigation into Root Causes of Sabotage and Vandalism of Pipes: A Major Environmental Effluence in Niger Delta, Nigeria
Authors: Oshienemen Albert
Abstract:
Human’s activities could be pointed as the root cause of almost all environmental damages/ disasters as we contribute to the activities that are currently damaging the ozone layers (global warming), unusual environmental changes and extreme weather conditions (climate change) in recent times. Nigeria just as every other disaster-prone nation is faced with different types of disasters and environmental calamities, starting from terrorist displacement disasters, flood, drought and oil spill hazards. Oil spillage as an environmental disaster has great consequences not just on the environment but on human health, economy and the entire populace that might be involved, which deem necessary to look into the root causes of the incidents and how it can be curtailed. The different incidents of oil spillages and other oil production consequent on the environment is alarming in the Nigerian context and cannot be overemphasized without a critical investigation and synthesis. This paper investigates the root causes of environmental pollution induced by oil spill hazards from petroleum activities within Niger Delta communities of effects and detailed the potential solutions to reduce the causal factors and reoccurrence of the incidents. This study adopts a desk-based approach, interviews with key members of communities which consist of chiefs, youth leaders, and key women within the high environmental damaged communities. Also, Interviews were conducted with environmental expertise representatives from the oil and gas sectors and representatives from oil spill-related agency. Data were analyzed using thematic techniques. The study shows different influencing factors of sabotage and vandalism of oil facilities as such; marginalization, deprivation of resources utility and resource derivation principles were identified as major contributors to vandalism and sabotage act. The study proposed potential strategies to curtail the root causes of sabotage and vandalism as the major causes of environmental devastations in Nigeria.Keywords: environment, oil spill hazards, Niger delta, Nigeria
Procedia PDF Downloads 19128300 Effects of Peakedness of Bimodal Waves on Overtopping of Sloping Seawalls
Authors: Stephen Orimoloye, Jose Horrillo-Caraballo, Harshinie Karunarathna, Dominic E. Reeve
Abstract:
Prediction of wave overtopping is an essential component of coastal seawall designing and management. Not only that excessive overtopping is reported for impermeable seawalls under bimodal waves, but overtopping is also showing a high sensitivity to the peakedness of the random wave propagation patterns. In the present study, we present a comprehensive analysis of the effects of peakedness of bimodal wave patterns of the overtopping of sloping seawalls. An energy-conserved bimodal spectrum with four different spectra peak periods and swell percentages was applied to estimate wave overtopping in both numerical and experimental flumes. Results of incident surface elevations and bimodal spectra were accurately captured across the flume domain using sets of well-positioned resistant-type wave gauges. Peakedness characteristics of the wave patterns were extracted to derive a relationship between the non-dimensional overtopping and the peakedness across the wave groups in the wave series. The full paper will briefly describe the development of the spectrum and present a comprehensive results analysis leading to the derivation of the relationship between dimensionless overtopping and peakedness of bimodal waves.Keywords: wave overtopping, peakedness, bimodal waves, swell percentages
Procedia PDF Downloads 18228299 Experiment-Based Teaching Method for the Varying Frictional Coefficient
Authors: Mihaly Homostrei, Tamas Simon, Dorottya Schnider
Abstract:
The topic of oscillation in physics is one of the key ideas which is usually taught based on the concept of harmonic oscillation. It can be an interesting activity to deal with a frictional oscillator in advanced high school classes or in university courses. Its mechanics are investigated in this research, which shows that the motion of the frictional oscillator is more complicated than a simple harmonic oscillator. The physics of the applied model in this study seems to be interesting and useful for undergraduate students. The study presents a well-known physical system, which is mostly discussed theoretically in high school and at the university. The ideal frictional oscillator is normally used as an example of harmonic oscillatory motion, as its theory relies on the constant coefficient of sliding friction. The structure of the system is simple: a rod with a homogeneous mass distribution is placed on two rotating identical cylinders placed at the same height so that they are horizontally aligned, and they rotate at the same angular velocity, however in opposite directions. Based on this setup, one could easily show that the equation of motion describes a harmonic oscillation considering the magnitudes of the normal forces in the system as the function of the position and the frictional forces with a constant coefficient of frictions are related to them. Therefore, the whole description of the model relies on simple Newtonian mechanics, which is available for students even in high school. On the other hand, the phenomenon of the described frictional oscillator does not seem to be so straightforward after all; experiments show that the simple harmonic oscillation cannot be observed in all cases, and the system performs a much more complex movement, whereby the rod adjusts itself to a non-harmonic oscillation with a nonzero stable amplitude after an unconventional damping effect. The stable amplitude, in this case, means that the position function of the rod converges to a harmonic oscillation with a constant amplitude. This leads to the idea of a more complex model which can describe the motion of the rod in a more accurate way. The main difference to the original equation of motion is the concept that the frictional coefficient varies with the relative velocity. This dependence on the velocity was investigated in many different research articles as well; however, this specific problem could demonstrate the key concept of the varying friction coefficient and its importance in an interesting and demonstrative way. The position function of the rod is described by a more complicated and non-trivial, yet more precise equation than the usual harmonic oscillation description of the movement. The study discusses the structure of the measurements related to the frictional oscillator, the qualitative and quantitative derivation of the theory, and the comparison of the final theoretical function as well as the measured position-function in time. The project provides useful materials and knowledge for undergraduate students and a new perspective in university physics education.Keywords: friction, frictional coefficient, non-harmonic oscillator, physics education
Procedia PDF Downloads 19328298 Evaluation of Solid-Gas Separation Efficiency in Natural Gas Cyclones
Authors: W. I. Mazyan, A. Ahmadi, M. Hoorfar
Abstract:
Objectives/Scope: This paper proposes a mathematical model for calculating the solid-gas separation efficiency in cyclones. This model provides better agreement with experimental results compared to existing mathematical models. Methods: The separation ratio efficiency, ϵsp, is evaluated by calculating the outlet to inlet count ratio. Similar to mathematical derivations in the literature, the inlet and outlet particle count were evaluated based on Eulerian approach. The model also includes the external forces acting on the particle (i.e., centrifugal and drag forces). In addition, the proposed model evaluates the exact length that the particle travels inside the cyclone for the evaluation of number of turns inside the cyclone. The separation efficiency model derivation using Stoke’s law considers the effect of the inlet tangential velocity on the separation performance. In cyclones, the inlet velocity is a very important factor in determining the performance of the cyclone separation. Therefore, the proposed model provides accurate estimation of actual cyclone separation efficiency. Results/Observations/Conclusion: The separation ratio efficiency, ϵsp, is studied to evaluate the performance of the cyclone for particles ranging from 1 microns to 10 microns. The proposed model is compared with the results in the literature. It is shown that the proposed mathematical model indicates an error of 7% between its efficiency and the efficiency obtained from the experimental results for 1 micron particles. At the same time, the proposed model gives the user the flexibility to analyze the separation efficiency at different inlet velocities. Additive Information: The proposed model determines the separation efficiency accurately and could also be used to optimize the separation efficiency of cyclones at low cost through trial and error testing, through dimensional changes to enhance separation and through increasing the particle centrifugal forces. Ultimately, the proposed model provides a powerful tool to optimize and enhance existing cyclones at low cost.Keywords: cyclone efficiency, solid-gas separation, mathematical model, models error comparison
Procedia PDF Downloads 39428297 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities
Authors: Nazli Hardy
Abstract:
Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.Keywords: Internet of Things (IoT), authentication, protocols, survey
Procedia PDF Downloads 30028296 Client Hacked Server
Authors: Bagul Abhijeet
Abstract:
Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring
Procedia PDF Downloads 25228295 Spontaneous and Posed Smile Detection: Deep Learning, Traditional Machine Learning, and Human Performance
Authors: Liang Wang, Beste F. Yuksel, David Guy Brizan
Abstract:
A computational model of affect that can distinguish between spontaneous and posed smiles with no errors on a large, popular data set using deep learning techniques is presented in this paper. A Long Short-Term Memory (LSTM) classifier, a type of Recurrent Neural Network, is utilized and compared to human classification. Results showed that while human classification (mean of 0.7133) was above chance, the LSTM model was more accurate than human classification and other comparable state-of-the-art systems. Additionally, a high accuracy rate was maintained with small amounts of training videos (70 instances). The derivation of important features to further understand the success of our computational model were analyzed, and it was inferred that thousands of pairs of points within the eyes and mouth are important throughout all time segments in a smile. This suggests that distinguishing between a posed and spontaneous smile is a complex task, one which may account for the difficulty and lower accuracy of human classification compared to machine learning models.Keywords: affective computing, affect detection, computer vision, deep learning, human-computer interaction, machine learning, posed smile detection, spontaneous smile detection
Procedia PDF Downloads 12628294 Decoupled Dynamic Control of Unicycle Robot Using Integral Linear Quadratic Regulator and Sliding Mode Controller
Authors: Shweda Mohan, J. L. Nandagopal, S. Amritha
Abstract:
This paper focuses on the dynamic modelling of unicycle robot. Two main concepts used for balancing unicycle robot are: reaction wheel pendulum and inverted pendulum. The pitch axis is modelled as inverted pendulum and roll axis is modelled as reaction wheel pendulum. The unicycle yaw dynamics is not considered which makes the derivation of dynamics relatively simple. For the roll controller, sliding-mode controller has been adopted and optimal methods are used to minimize switching-function chattering. For pitch controller, an LQR controller has been implemented to drive the unicycle robot to follow the desired velocity trajectory. The pitching and rolling balance could be achieved by two DC motors. Unicycle robot is a non-holonomic, non-linear, static unbalance system that has the minimal number of point contact to the ground, therefore, it is a perfect platform for researchers to study motion and balance control. These real-time solutions will be a viable solution for advanced robotic systems and controls.Keywords: decoupled dynamics, linear quadratic regulator (LQR) control, Lyapunov function sliding mode control, unicycle robot, velocity and trajectory control
Procedia PDF Downloads 36328293 Experimental Investigation on the Mechanical Behaviour of Three-Leaf Masonry Walls under In-Plane Loading
Authors: Osama Amer, Yaser Abdel-Aty, Mohamed Abd El Hady
Abstract:
The present paper illustrates an experimental approach to provide understanding of the mechanical behavior and failure mechanisms of different typologies of unreinforced three-leaf masonry walls of historical Islamic architectural heritage in Egypt. The main objective of this study is to investigate the propagation of possible cracking, ultimate load, deformations and failure mechanisms. Experimental data on interface-shear and compression tests on large scale three-leaf masonry wallets are provided. The wallets were built basically of Egyptian limestone and modified lime mortar. External wallets were built of stone blocks while the inner leaf was built of rubble limestone. Different loading conditions and dimensions of core layer for two types of collar joints (with and without shear keys) are considered in the tests. Mechanical properties of the constituent materials of masonry were tested and a database of characteristic properties was created. The results of the experiments will highlight the properties, force-displacement curves, stress distribution of multiple-leaf masonry walls contributing to the derivation of rational design rules and validation of numerical models.Keywords: masonry, three-leaf walls, mechanical behavior, testing, architectural heritage
Procedia PDF Downloads 29328292 A Semi-Automated GIS-Based Implementation of Slope Angle Design Reconciliation Process at Debswana Jwaneng Mine, Botswana
Authors: K. Mokatse, O. M. Barei, K. Gabanakgosi, P. Matlhabaphiri
Abstract:
The mining of pit slopes is often associated with some level of deviation from design recommendations, and this may translate to associated changes in the stability of the excavated pit slopes. Therefore slope angle design reconciliations are essential for assessing and monitoring compliance of excavated pit slopes to accepted slope designs. These associated changes in slope stability may be reflected by changes in the calculated factors of safety and/or probabilities of failure. Reconciliations of as-mined and slope design profiles are conducted periodically to assess the implications of these deviations on pit slope stability. Currently, the slope design reconciliation process being implemented in Jwaneng Mine involves the measurement of as-mined and design slope angles along vertical sections cut along the established geotechnical design section lines on the GEOVIA GEMS™ software. Bench retentions are calculated as a percentage of the available catchment area, less over-mined and under-mined areas, to that of the designed catchment area. This process has proven to be both tedious and requires a lot of manual effort and time to execute. Consequently, a new semi-automated mine-to-design reconciliation approach that utilizes laser scanning and GIS-based tools is being proposed at Jwaneng Mine. This method involves high-resolution scanning of targeted bench walls, subsequent creation of 3D surfaces from point cloud data and the derivation of slope toe lines and crest lines on the Maptek I-Site Studio software. The toe lines and crest lines are then exported to the ArcGIS software where distance offsets between the design and actual bench toe lines and crest lines are calculated. Retained bench catchment capacity is measured as distances between the toe lines and crest lines on the same bench elevations. The assessment of the performance of the inter-ramp and overall slopes entails the measurement of excavated and design slope angles along vertical sections on the ArcGIS software. Excavated and design toe-to-toe or crest-to-crest slope angles are measured for inter-ramp stack slope reconciliations. Crest-to-toe slope angles are also measured for overall slope angle design reconciliations. The proposed approach allows for a more automated, accurate, quick and easier workflow for carrying out slope angle design reconciliations. This process has proved highly effective and timeous in the assessment of slope performance in Jwaneng Mine. This paper presents a newly proposed process for assessing compliance to slope angle designs for Jwaneng Mine.Keywords: slope angle designs, slope design recommendations, slope performance, slope stability
Procedia PDF Downloads 23728291 The Chromitites of the Collo Ultramafic Rocks (NE Algeria): Two Generations Evidenced From Petrological, Mineralogical and Isotopic Studies
Authors: Rabah Laouar, Yahia Boudra, Adel Satouh, Adrian Boyce
Abstract:
The ultramafic rocks of the Collo region crop out as « stratified » masses that cross-cut older metamorphic formation of the basement. These rocks are mainly peridotites and serpentinites. The peridotites are composed of olivine, orthopyroxene, clinopyroxene and spinel (chromite). The chemical composition of these lherzolites show a magnesian character with high MgO contents (34.4 to 37.5%), high Cr (0.14 to 0.27%), Ni (0.14 to 0.26%) and Co (34 to 133 ppm) and low CaO and Al₂O₃ (0.02 to 2.2 and 0.5 to 2.8 % respectively). They represent a residue (restite) of a mantle magmas partial melting. The chromite which represents about 2 to 3% of the rock is a ubiquitous mineral and shows two different generations: primary idiomorphic millimetric crystals and secondary very fine, xenomorphic and interstitial aggregates. The primary chromites are alumino-ferro-magnesian crystals. They show high Al₂O₃ (25.77% to 27.36%) and MgO (10.70% to 13.36%). Cr# (100*Cr/ (Al+Cr)) varies between 45 and 48, and Mg# (100*Mg/Mg+Fe₂+) varies between 49 and 59. On the other hand, the secondary interstitial grains are iron-rich chromites; they show low Al₂O₃ (4.67% to 9.54%) and MgO (4.60% to 4.65%). Cr# is relatively high (77 to 88) whereas Mg# show relatively low values, varying between 22 and 25. Oxygen isotopic composition of both types of chromites is consistent with their derivation from a mantle source (ð¹⁸O vary between +3.9 and +5.2‰), though a contribution of ¹⁶O-rich component to the secondary chromites is not ruled out.Keywords: peridotites, serpentinites, chromite, partial melting, collo, Algeria
Procedia PDF Downloads 9228290 Automated Classification of Hypoxia from Fetal Heart Rate Using Advanced Data Models of Intrapartum Cardiotocography
Authors: Malarvizhi Selvaraj, Paul Fergus, Andy Shaw
Abstract:
Uterine contractions produced during labour have the potential to damage the foetus by diminishing the maternal blood flow to the placenta. In order to observe this phenomenon labour and delivery are routinely monitored using cardiotocography monitors. An obstetrician usually makes the diagnosis of foetus hypoxia by interpreting cardiotocography recordings. However, cardiotocography capture and interpretation is time-consuming and subjective, often lead to misclassification that causes damage to the foetus and unnecessary caesarean section. Both of these have a high impact on the foetus and the cost to the national healthcare services. Automatic detection of foetal heart rate may be an objective solution to help to reduce unnecessary medical interventions, as reported in several studies. This paper aim is to provide a system for better identification and interpretation of abnormalities of the fetal heart rate using RStudio. An open dataset of 552 Intrapartum recordings has been filtered with 0.034 Hz filters in an attempt to remove noise while keeping as much of the discriminative data as possible. Features were chosen following an extensive literature review, which concluded with FIGO features such as acceleration, deceleration, mean, variance and standard derivation. The five features were extracted from 552 recordings. Using these features, recordings will be classified either normal or abnormal. If the recording is abnormal, it has got more chances of hypoxia.Keywords: cardiotocography, foetus, intrapartum, hypoxia
Procedia PDF Downloads 21728289 Information Disclosure And Financial Sentiment Index Using a Machine Learning Approach
Authors: Alev Atak
Abstract:
In this paper, we aim to create a financial sentiment index by investigating the company’s voluntary information disclosures. We retrieve structured content from BIST 100 companies’ financial reports for the period 1998-2018 and extract relevant financial information for sentiment analysis through Natural Language Processing. We measure strategy-related disclosures and their cross-sectional variation and classify report content into generic sections using synonym lists divided into four main categories according to their liquidity risk profile, risk positions, intra-annual information, and exposure to risk. We use Word Error Rate and Cosin Similarity for comparing and measuring text similarity and derivation in sets of texts. In addition to performing text extraction, we will provide a range of text analysis options, such as the readability metrics, word counts using pre-determined lists (e.g., forward-looking, uncertainty, tone, etc.), and comparison with reference corpus (word, parts of speech and semantic level). Therefore, we create an adequate analytical tool and a financial dictionary to depict the importance of granular financial disclosure for investors to identify correctly the risk-taking behavior and hence make the aggregated effects traceable.Keywords: financial sentiment, machine learning, information disclosure, risk
Procedia PDF Downloads 9428288 Identification of Rainfall Trends in Qatar
Authors: Abdullah Al Mamoon, Ataur Rahman
Abstract:
Due to climate change, future rainfall will change at many locations on earth; however, the spatial and temporal patterns of this change are not easy to predict. One approach of predicting such future changes is to examine the trends in the historical rainfall data at a given region and use the identified trends to make future prediction. For this, a statistical trend test is commonly applied to the historical data. This paper examines the trends of daily extreme rainfall events from 30 rain gauges located in the State of Qatar. Rainfall data covering from 1962 to 2011 were used in the analysis. A combination of four non-parametric and parametric tests was applied to identify trends at 10%, 5%, and 1% significance levels. These tests are Mann-Kendall (MK), Spearman’s Rho (SR), Linear Regression (LR) and CUSUM tests. These tests showed both positive and negative trends throughout the country. Only eight stations showed positive (upward) trend, which were however not statistically significant. In contrast, significant negative (downward) trends were found at the 5% and 10% levels of significance in six stations. The MK, SR and LR tests exhibited very similar results. This finding has important implications in the derivation/upgrade of design rainfall for Qatar, which will affect design and operation of future urban drainage infrastructure in Qatar.Keywords: trends, extreme rainfall, daily rainfall, Mann-Kendall test, climate change, Qatar
Procedia PDF Downloads 56428287 Innovation Potential of Palm Kernel Shells from the Littoral Region in Cameroon
Authors: Marcelle Muriel Domkam Tchunkam, Rolin Feudjio
Abstract:
This work investigates the ultrastructure, physicochemical and thermal properties evaluation of Palm Kernel Shells (PKS). PKS Tenera waste samples were obtained from a palm oil mill in Dizangué Sub-Division, Littoral region of Cameroon, while PKS Dura waste samples were collected from the Institute of Agricultural Research for Development (IRAD) of Mbongo. A sodium hydroxide solution was used to wash the shells. They were then rinsed by demineralised water and dried in an oven at 70 °C during 72 hours. They were then grounded and sieved to obtained powders from 0.04 mm to 0.45 mm in size. Transmission Electron Microscopy (TEM) and Surface Electron Microscopy (SEM) were used to characterized powder samples. Chemical compounds and elemental constituents, as well as thermal performance were evaluated by Van Soest Method, TEM/EDXA and SEM/EDS techniques. Thermal characterization was also performed using Differential Scanning Calorimetry (DSC) and Thermogravimetric Analysis (TGA). Our results from microstructural analysis revealed that most of the PKS material is made of particles with irregular morphology, mainly amorphous phases of carbon/oxygen with small amounts of Ca, K, and Mg. The DSC data enabled the derivation of the materials’ thermal transition phases and the relevant characteristic temperatures and physical properties. Overall, our data show that PKS have nanopores and show potential in 3D printing and membrane filtration applications.Keywords: DSC, EDXA, palm kernel shells, SEM, TEM
Procedia PDF Downloads 12428286 "Prezafe" to "Parizafe": Parallel Development of Izafe in Germanic
Authors: Yexin Qu
Abstract:
Izafe is a construction typically found in Iranian languages, which is attested already in Old Avestan and Old Persian. The narrow sense of izafe can be described as the linear structure of [NP pt Modifier] with pt as an uninflectable particle or clitic. The history of the Iranian izafe has the following stages: Stage I: Verbless nominal relative clauses, Stage II: Verbless nominal relative clauses with Case Attraction; and Stage III: Narrow sense izafe. Previous works suggest that embedded relative clauses and correlatives in other Indo-European languages might be relevant for the source of the izafe-construction. Stage I, as the precursor of narrow sense izafe, or so-called “prezafe” is not found in branches other than Iranian. Comparable cases have been demonstrated in Vedic, Greek, and some rare cases in Latin. This suggests “prezafe” may date back very early in Indo-European. Izafe-like structures are not attested in branches such as Balto-Slavic and Germanic, but Balto-Slavic definite adjectives and Germanic weak adjectives can be compared to the verbless nominal relative clauses and analyzed as developments of verbless relative clauses parallel to izafe in Indo-Iranian, as are called “parizafe” in this paper. In this paper, the verbless RC is compared with Germanic weak adjectives. The Germanic languages used n-stem derivation to form determined derivatives, which are semantically equivalent to the appositive RC and eventually became weak adjectives. To be more precise, starting from an adjective “X”, the Germanic weak adjective structure is formed as [det X-n], literally “the X”, with the meaning “the X one”, which can be shown to be semantically equivalent to “the one which is X”. In this paper, Stage I suggest that, syntactically, the Germanic verbless relative clauses went through CP to DP relabeling like Iranian, based on the following observations: (1) Germanic relative pronouns (e.g., Gothic saei, Old English se) and determiners (e.g., Gothic sa, Old English se) are both from the *so/to pronominal roots; (2) the semantic equivalence of Germanic weak adjectives and the izafe structure. This may suggest that Germanic may also have had “Prezafe” Stages I and II. In conclusion: “Prezafe” in Stage I may have been a phenomenon of the proto-language, Stage II was the result of independent parallel developments and then each branch had its own strategy.Keywords: izafe, relative clause, Germanic, Indo-European
Procedia PDF Downloads 6828285 Derivation of Bathymetry from High-Resolution Satellite Images: Comparison of Empirical Methods through Geographical Error Analysis
Authors: Anusha P. Wijesundara, Dulap I. Rathnayake, Nihal D. Perera
Abstract:
Bathymetric information is fundamental importance to coastal and marine planning and management, nautical navigation, and scientific studies of marine environments. Satellite-derived bathymetry data provide detailed information in areas where conventional sounding data is lacking and conventional surveys are inaccessible. The two empirical approaches of log-linear bathymetric inversion model and non-linear bathymetric inversion model are applied for deriving bathymetry from high-resolution multispectral satellite imagery. This study compares these two approaches by means of geographical error analysis for the site Kankesanturai using WorldView-2 satellite imagery. Based on the Levenberg-Marquardt method calibrated the parameters of non-linear inversion model and the multiple-linear regression model was applied to calibrate the log-linear inversion model. In order to calibrate both models, Single Beam Echo Sounding (SBES) data in this study area were used as reference points. Residuals were calculated as the difference between the derived depth values and the validation echo sounder bathymetry data and the geographical distribution of model residuals was mapped. The spatial autocorrelation was calculated by comparing the performance of the bathymetric models and the results showing the geographic errors for both models. A spatial error model was constructed from the initial bathymetry estimates and the estimates of autocorrelation. This spatial error model is used to generate more reliable estimates of bathymetry by quantifying autocorrelation of model error and incorporating this into an improved regression model. Log-linear model (R²=0.846) performs better than the non- linear model (R²=0.692). Finally, the spatial error models improved bathymetric estimates derived from linear and non-linear models up to R²=0.854 and R²=0.704 respectively. The Root Mean Square Error (RMSE) was calculated for all reference points in various depth ranges. The magnitude of the prediction error increases with depth for both the log-linear and the non-linear inversion models. Overall RMSE for log-linear and the non-linear inversion models were ±1.532 m and ±2.089 m, respectively.Keywords: log-linear model, multi spectral, residuals, spatial error model
Procedia PDF Downloads 29828284 A Report on the Elearning Programme of the Irish College of General Practitioners Which Can Address Continuing Education Needs of Primary Care Physicians
Authors: Nicholas P. Fenlon, Aisling Lavelle, David Mclean, Margaret O'riordan
Abstract:
Background: The case for continuing professional development has been well made, and was formalized in Ireland in recent years through the enactment of the Medical Practitioner’s Act, which requires registered medical practitioners to complete a minimum of 50 hours CPD each year. The ICGP, who have been providing CPD opportunities to its members for many years, have responded to this need by developing a series of evidence-based, high-quality, multimedia modules across a range of clinical and non-clinical areas. (More traditional education opportunities are still being provided by the college also). Overview of Programme: The first module was released in September 2011, since when the eLearning program has grown steadily, and there are currently almost 20 modules available, with a further 5 in production. Each module contains three to six 10-minute video lessons, which use a combination of graphics, images, text, voice-over and clinical clips. These are supported by supplementary videos of expert pieces-to-camera, Q&As with content experts, clinical scenarios, external links and relevant documentation and other resources. Successful completion of MCQs will result in a Certificate of Completion, which can be printed or stored in Professional Competence portfolio. The Medical Practitioner’s Act requires doctors to gather CPD credits across 8 domains of practice, and various eLearning modules have been developed to address each. For instance, modules with a strong clinical content would include Management of Hypertension, Management of COPD, and Management of Asthma. Other modules focus on health promotion such as Promoting Smoking Cessation, Promoting Physical Activity, and Addressing Childhood Obesity. Modules where communication skills are keys include modules on Suicide Prevention and Management of Depression. Other modules, currently in development include non-clinical topics around risk management, including Confidentiality, Consent etc. Each module is developed by a core group, which includes where possible, a GP with a special interest in the area, and a content expert(s). The college works closely with a medical education consultant and a production company in developing and producing the modules. Modules can be accessed (with password) through the ICGP website and are available free to all ICGP members. Summary of Evaluation: There are over 1700 registered users to date (over 55% of College membership). The program was evaluated using an online survey in 2013 (N = 144/950 – 12%) and results were very positive overall but provided material for the further improvement of the program also. Future Plans: While knowledge can be imparted well through eLearning, skills and attitudes are more difficult to influence through an online environment. The college is now developing a series of linked workshops, which will lead to ICGP Professional Competence Awards. The first pilot workshop is scheduled for February 2015 and is Cardiology-themed. Participants will be required to complete the following 4 modules in advance of attending – Management of Hypertension, Management of Heart Failure, Promoting Smoking Cessation, and Promoting Physical Activity. The workshop will be case-based and interactive, addressing ECG Interpretation in General Practice. Conclusions: The ICGP have responded to members needs for high-quality evidence-based education delivered in a way that suits GPs.Keywords: CPD opportunities, evidence-based, high quality, multimedia modules across a range of clinical and non-clinical areas, medical practitioner’s act
Procedia PDF Downloads 59928283 Engineering the Human Mind: Social Engineering Attack Using Kali Linux
Authors: Joy Winston James, Abdul Kadher Jilani
Abstract:
This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.Keywords: pen testing, hacking, Kali Linux, social engineering
Procedia PDF Downloads 10128282 Augmented ADRC for Trajectory Tracking of a Novel Hydraulic Spherical Motion Mechanism
Authors: Bin Bian, Liang Wang
Abstract:
A hydraulic spherical motion mechanism (HSMM) is proposed. Unlike traditional systems using serial or parallel mechanisms for multi-DOF rotations, the HSMM is capable of implementing continuous 2-DOF rotational motions in a single joint without the intermediate transmission mechanisms. It has some advantages of compact structure, low inertia and high stiffness. However, as HSMM is a nonlinear and multivariable system, it is very complicate to realize accuracy control. Therefore, an augmented active disturbance rejection controller (ADRC) is proposed in this paper. Compared with the traditional PD control method, three compensation items, i.e., dynamics compensation term, disturbance compensation term and nonlinear error elimination term, are added into the proposed algorithm to improve the control performance. The ADRC algorithm aims at offsetting the effects of external disturbance and realizing accurate control. Euler angles are applied to describe the orientation of rotor. Lagrange equations are utilized to establish the dynamic model of the HSMM. The stability of this algorithm is validated with detailed derivation. Simulation model is formulated in Matlab/Simulink. The results show that the proposed control algorithm has better competence of trajectory tracking in the presence of uncertainties.Keywords: hydraulic spherical motion mechanism, dynamic model, active disturbance rejection control, trajectory tracking
Procedia PDF Downloads 10628281 The Effect of AMBs Number of a Dynamics Behavior of a Spur Gear Reducer in Non-Stationary Regime
Authors: Najib Belhadj Messaoud, Slim Souissi
Abstract:
The non-linear dynamic behavior of a single stage spur gear reducer is studied in this paper in transient regime. Driving and driver rotors are, respectively, powered by a motor torque Cm and loaded by a resistive torque Cr. They are supported by two identical Active Magnetic Bearings (AMBs). Gear excitation is induced by the motor torque and load variation in addition to the fluctuation of meshing stiff-ness due to the variation of input rotational speed. Three models of AMBs were used with four, six and eight magnets. They are operated by P.D controller and powered by control and bias currents. The dynamic parameters of the AMBs are modeled by stiffness and damping matrices computed by the derivation of the electromagnetic forces. The equations of motion are solved iteratively using Newmark time integration method. In the first part of the study, the model is powered by an electric motor and by a four strokes four cylinders diesel engine in the second part. The numerical results of the dynamic responses of the system come to confirm the significant effect of the transient regime on the dynamic behavior of a gear set, particularly in the case of engine acyclism condition. Results also confirm the influence of the magnet number by AMBs on the dynamic behavior of the system. Indeed, vibrations were more important in the case of gear reducer supported by AMBs with four magnets.Keywords: motor, stiffness, gear, acyclism, fluctuation, torque
Procedia PDF Downloads 46028280 Stem Covers of Leibniz n-Algebras
Authors: Natália Maria Rego
Abstract:
ALeibnizn-algebraGis aK-vector space endowed whit a n-linearbracket operation [-,…-] : GG … G→ Gsatisfying the fundamental identity, which can be expressed saying that the right multiplication map Ry2, …, ᵧₙ: Gn→ G, Rᵧ₂, …, ᵧₙn(ˣ¹, …, ₓₙ) = [[ˣ¹, …, ₓₙ], ᵧ₂, …, ᵧₙ], is a derivation. This structure, together with its skew-symmetric version, named as Lie n-algebra or Filippov algebra, arose in the setting of Nambumechanics, an n-ary generalization of the Hamiltonian mechanics. Thefirst goal of this work is to provide a characterization of various classes of central extensions of Leibniz n-algebras in terms of homological properties. Namely, Commutator extension, Quasi-commutator extension, Stem extension, and Stem cover. These kind of central extensions are characterized by means of the character of the map *(E): nHL1(G) → M provided by the five-term exact sequence in homology with trivial coefficients of Leibniz n-algebras associated to an extension E : 0 → M → K → G → 0. For a free presentation 0 →R→ F →G→ 0of a Leibniz n-algebra G,the term M(G) = (R[F,…n.., F])/[R, F,..n-1..,F] is called the Schur multiplier of G, which is a Baer invariant, i.e., it does not depend on the chosen free presentation, and it is isomorphic to the first Leibniz n-algebras homology with trivial coefficients of G. A central extension of Leibniz n-algebras is a short exact sequenceE : 0 →M→K→G→ 0such that [M, K,.. ⁿ⁻¹.., K]=0. It is said to be a stem extension if M⊆[G, .. n.., G]. Additionally, if the induced map M(K) → M(G) is the zero map, then the stem extension Eis said to be a stem cover. The second aim of this work is to analyze the interplay between stem covers of Leibniz n-algebras and the Schur multiplier. Concretely, in the case of finite-dimensional Leibniz n-algebras, we show the existence of coverings, and we prove that all stem covers with finite-dimensional Schur multiplier are isoclinic. Additionally, we characterize stem covers of perfect Leibniz n-algebras.Keywords: leibniz n-algebras, central extensions, Schur multiplier, stem cover
Procedia PDF Downloads 15828279 Glutharaldyde Free Processing of Patch for Cardiovascular Repair Is Associated with Improved Outcomes on Rvot Repair, Rat Model
Authors: Parnaz Boodagh, Danila Vella, Antonio Damore, Laura Modica De Mohac, Sang-Ho Ye, Garret Coyan, Gaetano Burriesci, William Wagner, Federica Cosentino
Abstract:
The use of cardiac patches is among the main therapeutic solution for cardiovascular diseases, a leading mortality cause in the world with an increasing trend, responsible of 19 millions deaths in 2020. Several classes of biomaterials serve that purpose, both of synthetic origin and biological derivation, and many bioengineered treatment alternatives were proposed to satisfy two main requirements, providing structural support and promoting tissue remodeling. The objective of this paper is to compare the mechanical properties and the characterization of four cardiac patches: the Adeka, PhotoFix, CorPatch, and CardioCel patches. In vitro and in vivo tests included: biaxial, uniaxial, ball burst, suture retention for mechanical characterization; 2D surface topography, 3D volume and microstructure, and histology assessments for structure characterization; in vitro test to evaluate platelet deposition, calcium deposition, and macrophage polarization; rat right ventricular outflow tract (RVOT) models at 8- and 16-week time points to characterize the patch-host interaction. Lastly, the four patches were used to produce four stented aortic valve prosthesis, subjected to hydrodynamic assessment as well as durability testing to verify compliance with the standard ISO.Keywords: cardiac patch, cardiovascular disease, cardiac repair, blood contact biomaterial
Procedia PDF Downloads 15928278 A Mixed Thought Pattern and the Question of Justification: A Feminist Project
Authors: Angana Chatterjee
Abstract:
The feminist scholars point out the various problematic issues in the traditional mainstream western thought and theories. The thought practices behind the discriminatory and oppressive social practices are based on concepts that play a pivotal role in theorisation. Therefore, many feminist philosophers take up reformation or reconceptualisation projects. Such projects have bearings on various aspects of philosophical thought, namely, ontology, epistemology, logic, ethics, social, political thought, and so on. In tune with this spirit, the present paper suggests a well-established thought pattern which is not western but has got the potential to deal with the problems of mainstream western thought culture that are identified by the feminist critics. The Indian thought pattern is theorised in the domain of Indian logic, which is a study of inference patterns. As, in the Indian context, the inference is considered as a source of knowledge, certain epistemological questions are linked with the discussion of inference. One of the key epistemological issues is one regarding justification. The study about the nature of derivation of knowledge from available evidence, and the nature of the evidence itself, are integral parts of the discipline called Indian logic. But if we contrast the western tradition of thought with the Indian one, we can find that the Indian logic has got some peculiar features which may be shown to deal with the problems identified by the feminist scholars in western thought culture more plausibly. The tradition of western logic, starting from Aristotle, has been maintaining sharp differences between two forms of reasoning, namely, deductive and inductive. These two different forms of reasoning have been theorised and dealt with separately within the domain of the study called ‘logic.’ There are various philosophical problems that are raised around concepts and issues regarding both deductive and inductive reasoning. Indian logic does not distinguish between deduction and induction as thought patterns, but their distinction is very usual to make in the western tradition. Though there can be found various interpretations about this peculiarity of Indian thought pattern, these mixed patterns were actually very close to the cross-cultural pattern in which human beings would tend to argue or infer from the available data or evidence. The feminist theories can successfully operate in the domain of lived experience if they make use of such a mixed pattern of reasoning or inference. By offering sound inferential knowledge on contextual evidences, the Indian thought pattern is potent to serve the feminist purposes in a meaningful way.Keywords: feminist thought, Indian logic, inference, justification, mixed thought pattern
Procedia PDF Downloads 10328277 Assessment of the Egyptian Agricultural Foreign Trade with Common Market for Eastern and Southern Africa Countries
Authors: Doaa H. I. Mahmoud, El-Said M. Elsharkawy, Saad Z. Soliman, Soher E. Mustfa
Abstract:
The opening of new promising foreign markets is one of the objectives of Egypt’s foreign trade policies, especially for agricultural exports. This study aims at the examination of the commodity structure of the Egyptian agricultural imports and exports with the COMESA countries. In addition, estimation of the surplus/deficit of the Egyptian commodities and agricultural balance with these countries is made. Time series data covering the period 2004-2016 is used. Estimation of the growth function along with the derivation of the annual growth rates of the study’s variables is made. Some of the results of the study period display the following: (1) The average total Egyptian exports to the COMESA (Common Market for Eastern and Southern Africa) countries is estimated at 1,491 million dollars, with an annual growth rate of 14.4% (214.7 million dollars). (2) The average annual Egyptian agricultural exports to these economies is estimated at 555 million dollars, with an annual growth rate of 19.4% (107.7 million dollars). (3) The average annual value of agricultural imports from the COMESA countries is set at 289 Million Dollars, with an annual growth rate of 14.4% (41.6 million dollars). (4) The study shows that there is a continuous surplus in the agricultural balance with these economies, whilst having a deficit in the raw-materials agricultural balance, as well as the balance of input requirements with these countries.Keywords: COMESA, Egypt, growth rates, trade balance
Procedia PDF Downloads 20928276 First Earth Size
Authors: Ibrahim M. Metwally
Abstract:
Have you ever thought that earth was not the same earth we live on? Was it bigger or smaller? Was it a great continent surrounded by huge ocean as Alfred Wegener (1912) claimed? Earth is the most amazing planet in our Milky Way galaxy and may be in the universe. It is the only deformed planet that has a variable orbit around the sun and the only planet that has water on its surface. How did earth deformation take place? What does cause earth to deform? What are the results of earth deformation? How does its orbit around the sun change? First earth size computation can be achieved only considering the quantum of iron and nickel rested into earth core. This paper introduces a new theory “Earth expansion Theory”. The principles of “Earth Expansion Theory” are leading to new approaches and concepts to interpret whole earth dynamics and its geological and environmental changes. This theory is not an attempt to unify the two divergent dominant theories of continental drift, plate tectonic theory and earth expansion theory. The new theory is unique since it has a mathematical derivation, explains all the change to and around earth in terms of geological and environmental changes, and answers all unanswered questions in other theories. This paper presents the basic of the introduced theory and discusses the mechanism of earth expansion and how it took place, the forces that made the expansion. The mechanisms of earth size change from its spherical shape with radius about 3447.6 km to an elliptic shape of major radius about 6378.1 km and minor radius of about 6356.8 km and how it took place, are introduced and discussed. This article also introduces, in a more realistic explanation the formation of oceans and seas, the preparation of river formation. It also addresses the role of iron in earth size enlargement process within the continuum mechanics framework.Keywords: earth size, earth expansion, continuum mechanics, continental and ocean formation
Procedia PDF Downloads 44928275 QSAR Study on Diverse Compounds for Effects on Thermal Stability of a Monoclonal Antibody
Authors: Olubukayo-Opeyemi Oyetayo, Oscar Mendez-Lucio, Andreas Bender, Hans Kiefer
Abstract:
The thermal melting curve of a protein provides information on its conformational stability and could provide cues on its aggregation behavior. Naturally-occurring osmolytes have been shown to improve the thermal stability of most proteins in a concentration-dependent manner. They are therefore commonly employed as additives in therapeutic protein purification and formulation. A number of intertwined and seemingly conflicting mechanisms have been put forward to explain the observed stabilizing effects, the most prominent being the preferential exclusion mechanism. We attempted to probe and summarize molecular mechanisms for thermal stabilization of a monoclonal antibody (mAb) by developing quantitative structure-activity relationships using a rationally-selected library of 120 osmolyte-like compounds in the polyhydric alcohols, amino acids and methylamines classes. Thermal stabilization potencies were experimentally determined by thermal shift assays based on differential scanning fluorimetry. The cross-validated QSAR model was developed by partial least squares regression using descriptors generated from Molecular Operating Environment software. Careful evaluation of the results with the use of variable importance in projection parameter (VIP) and regression coefficients guided the selection of the most relevant descriptors influencing mAb thermal stability. For the mAb studied and at pH 7, the thermal stabilization effects of tested compounds correlated positively with their fractional polar surface area and inversely with their fractional hydrophobic surface area. We cannot claim that the observed trends are universal for osmolyte-protein interactions because of protein-specific effects, however this approach should guide the quick selection of (de)stabilizing compounds for a protein from a chemical library. Further work with a large variety of proteins and at different pH values would help the derivation of a solid explanation as to the nature of favorable osmolyte-protein interactions for improved thermal stability. This approach may be beneficial in the design of novel protein stabilizers with optimal property values, especially when the influence of solution conditions like the pH and buffer species and the protein properties are factored in.Keywords: thermal stability, monoclonal antibodies, quantitative structure-activity relationships, osmolytes
Procedia PDF Downloads 33328274 Asymptotic Analysis of the Viscous Flow through a Pipe and the Derivation of the Darcy-Weisbach Law
Authors: Eduard Marusic-Paloka
Abstract:
The Darcy-Weisbach formula is used to compute the pressure drop of the fluid in the pipe, due to the friction against the wall. Because of its simplicity, the Darcy-Weisbach formula became widely accepted by engineers and is used for laminar as well as the turbulent flows through pipes, once the method to compute the mysterious friction coefficient was derived. Particularly in the second half of the 20th century. Formula is empiric, and our goal is to derive it from the basic conservation law, via rigorous asymptotic analysis. We consider the case of the laminar flow but with significant Reynolds number. In case of the perfectly smooth pipe, the situation is trivial, as the Navier-Stokes system can be solved explicitly via the Poiseuille formula leading to the friction coefficient in the form 64/Re. For the rough pipe, the situation is more complicated and some effects of the roughness appear in the friction coefficient. We start from the Navier-Stokes system in the pipe with periodically corrugated wall and derive an asymptotic expansion for the pressure and for the velocity. We use the homogenization techniques and the boundary layer analysis. The approximation derived by formal analysis is then justified by rigorous error estimate in the norm of the appropriate Sobolev space, using the energy formulation and classical a priori estimates for the Navier-Stokes system. Our method leads to the formula for the friction coefficient. The formula involves resolution of the appropriate boundary layer problems, namely the boundary value problems for the Stokes system in an infinite band, that needs to be done numerically. However, theoretical analysis characterising their nature can be done without solving them.Keywords: Darcy-Weisbach law, pipe flow, rough boundary, Navier law
Procedia PDF Downloads 35328273 Wrist Pain, Technological Device Used, and Perceived Academic Performance Among the College of Computer Studies Students
Authors: Maquiling Jhuvie Jane R., Ojastro Regine B., Peroja Loreille Marie B., Pinili Joy Angela., Salve Genial Gail M., Villavicencio Marielle Irene B., Yap Alther Francis Garth B.
Abstract:
Introduction: This study investigated the impact of prolonged device usage on wrist pain and perceived academic performance among college students in Computer Studies. The research aims to explore the correlation between the frequency of technological device use and the incidence of wrist pain, as well as how this pain affects students' academic performance. The study seeks to provide insights that could inform interventions to promote better musculoskeletal health among students engaged in intensive technology use to further improve their academic performance. Method: The study utilized descriptive-correlational and comparative design, focusing on bona fide students from Silliman University’s College of Computer Studies during the second semester of 2023-2024. Participants were recruited through a survey sent via school email, with responses collected until March 30, 2024. Data was gathered using a password-protected device and Google Forms, ensuring restricted access to raw data. The demographic profile was summarized, and the prevalence of wrist pain and device usage were analyzed using percentages and weighted means. Statistical analyses included Spearman’s rank correlation coefficient to assess the relationship between wrist pain and device usage and an Independent T-test to evaluate differences in academic performance based on wrist pain presence. Alpha was set at 0.05. Results: The study revealed that 40% of College of Computer Studies students experience wrist pain, with 2 out of every 5 students affected. Laptops and desktops were the most frequently used devices for academic work, achieving a weighted mean of 4.511, while mobile phones and tablets received lower means of 4.183 and 1.911, respectively. The average academic performance score among students was 29.7, classified as ‘Good Performance.’ Notably, there was no significant relationship between the frequency of device usage and wrist pain, as indicated by p-values exceeding 0.05. However, a significant difference in perceived academic performance was observed, with students without wrist pain scoring an average of 30.39 compared to 28.72 for those with wrist pain and a p-value of 0.0134 confirming this distinction. Conclusion: The study revealed that about 40% of students in the College of Computer Studies experience wrist pain, but there is no significant link between device usage and pain occurrence. However, students without wrist pain demonstrated better academic performance than those with pain, suggesting that wrist health may impact academic success. These findings imply that physical therapy practices in the Philippines should focus on preventive strategies and ergonomic education to improve student health and performance.Keywords: wrist pain, frequency of use of technological devices, perceived academic performance, physical therapy
Procedia PDF Downloads 16