Search results for: open drip proof
1895 Short-Term Exposing Effects of 4,4'-DDT on Mitochondrial Electron Transport Complexes in Eyes of Zebrafish
Authors: Eun Ko, Moonsung Choi, Sooim Shin
Abstract:
4,4’-Dichlorodiphenyltrichloroethane (4,4’-DDT) is colorless, odorless organochlorine and known as persistent toxic organic pollutant accumulated in organs. In this study, effects of 4,4’-DDT on activities of mitochondrial electron transport chain system was analyzed. 4,4’-DDT is directly treated to isolated mitochondria from eyes of zebrafish and then activities of mitochondrial complex I, II, III, IV were measured spectrophotometrically. The reaction was proceeded immediately after adding 4,4’-DDT to examine the short-term exposing effects of persistent organic pollutant. As a result, high concentration of 4,4’-DDT treated mitochondria exhibited slightly enhanced activity in all complexes than non-treated one except complex III in male. Particularly, 4,4’-DDT was more effective on enzymatic activity in mitochondria isolated from eyes of male zebrafish. These results represented that 4,4’-DDT might temporarily induce to open up ion channel on isolated mitochondria resulting in increasing the functional activity of mitochondrial electron transport chain system.Keywords: electron transport chain, mitochondrial function, persistent organic pollutant, spectrophotometric assay, zebrafish
Procedia PDF Downloads 2281894 A Study of Primary School Parents’ Interaction with Teachers’ in Malaysia
Authors: Shireen Simon
Abstract:
This study explores the interactions between primary school parents-teachers in Malaysia. Schools in the country are organized to promote participation between parents and teachers. Exchanges of dialogue are most valued between parents and teachers because teachers are in daily contact with pupils’ and the first line of communication with parents. Teachers are considered by parents as the most important connection to improve children learning and well-being. Without a good communication, interaction or involvement between parent-teacher might tarnish a pupils’ performance in school. This study tries to find out multiple emotions among primary school parents-teachers, either estranged or cordial, when they communicate in a multi-cultured society in Malaysia. Important issues related to parent-teacher interactions are discussed further. Parents’ involvement in an effort to boost better education in school is significantly more effective with parents’ involvement. Lastly, this article proposes some suggestions for parents and teachers to build a positive relationship with effective communication and establish more democratic open door policy.Keywords: multi-cultured society, parental involvement, parent-teacher relationships, parents’ interaction
Procedia PDF Downloads 2491893 Motherhood Managerial in Health Services: Need Eustress Internalization
Authors: Retty Ratnawati, Santi Sri Wulandari, Tulus Sabrina
Abstract:
Feminine and masculine gender role stress could occur in some work situation. Being manager in health services that is known to be more women’ role in Indonesia, has expected to have feminine stereotype role. In the communities, this has been done in the program kesejahteraan keluarga (welfare family program) since the 1970s, for example through family planning program. The aim of the study was to explore the experience of being a motherhood managerial in health services. Our auto ethnographic study has revealed that motherhood managerial, even though running by a woman, could have some stress conditions whether she has realized or has not. The challenge would occur when the manager did not realize that she needed the eustress. The autonomy concept for a woman to be a manager could be a complex cycle that needs open communication continually and understanding the four elements surround her life. In conclusion, there is a demand to have the eustress when the manager does not realize that she has to be an autonomy person. However, it does not need eustress when the manager understands about how to deal with the complex cycle of being autonomy.Keywords: motherhood managerial, eustress, feminine gender role stress, masculine gender role stress, autonomy concept in women
Procedia PDF Downloads 2741892 Awareness, Use and Searching Behavior of 'Virtua' Online Public Access Catalog Users
Authors: Saira Soroya, Khalid Mahmood
Abstract:
Library catalogs open the door to the library collection. OPAC (Online Public Access Catalog) are one of the services offered by automated libraries. The present study aims to explore user’s awareness, the level of use and their searching behavior of OPAC with a purpose to give suggestions and ways to improve user-friendly features of library OPAC. The population consisted of OPAC users of Lahore University of Management Sciences (LUMS). Convenient sampling technique was carried out. Total sample size was 100 OPAC users. Quantitative research design, based on survey method used to carry out the study. The data collection instrument was adopted. Data was analyzed using SPSS. Results revealed that a considerable number of users were not aware of OPAC i.e. (30%); however, those who were aware were using basic features of the OPAC. It was found that lack of knowledge was considered the frequent reason for not using all features of OPAC. In this regard, it is strongly recommended that compulsory information literacy programme should be established.Keywords: catalog, OPAC, library automation, usability study, university library
Procedia PDF Downloads 3361891 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Abstract:
Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA
Procedia PDF Downloads 3981890 A Critical Knowledge of Brand Equity in Thai Academic Works
Authors: Pongsiri Kamkankaew
Abstract:
This paper experiments to consider brand equity thought in Thai academic works. This essay employs that the first emerging of brand equity in Thai academic works and the components of brand equity which explore the extent to the convoluted approach with other Thai social condition. In Thailand, brand equity is supposed to provide branding and brand management replacement. However, the commitment of brand equity imposes in its proposal for seemly application in Thai context – to develop the brand equity framework by the Thai social – culture and Thai utilization style which it is questionable whether the brand equity in western conception is useful for characterizing the brand equity in Thailand context. In this position, brand equity also aspects several major questions: How can western conception lead to apply in Thai business? How can diversification be given within Thai SMEs business running? Can corporate brand valuation approach adopt in real business doing? So this paper argues that Thai brand equity notion should reduce disturb over improvement of its self-restraint and business area. Instead, Thai academic who are interested in brand equity can harmonize different mature bodies of discipline and other investigative a frame of references to complete and open the recognizing of brand equity.Keywords: Thai brand equity, knowledge critical, brand management, branding
Procedia PDF Downloads 3251889 3D Virtualization through Data Collected from Measurements of Mobile Signal Reception Power Levels (LTE) Band at Escuela Superior Politécnica de Chimborazo in Riobamba-Ecuador
Authors: Sandra Cuenca, Steven Chango, Fabian Chamba, Alexandra Vaca
Abstract:
This project addresses a representation of a virtual environment based on the analysis of the RSRP (Reference Signal Received Power) obtained by the Network Cell Info Lite application at the Escuela Superior Politécnica de Chimborazo (ESPOCH) considering the open areas of the Business Administration Department in the 4G LTE Frequency (band 2) of Claro Telephony at a frequency of 1967. 5 MHz, where measurements were performed from 17:00 UTC-05:00. The indicators required for the simulation of the environment designed in sketchup were focused especially on the power levels obtained where it was possible to represent the scenario with real power values obtained in each concentric radius of a total of 3 campaigns of 200 samples each, where the values vary between 84.6 dBm to 115.5 dBm having average power values for each of the 23 radiuses which are introduced in a virtual environment, allowing users to immerse themselves in it, where they can explore 3D virtual environments, generating a color scale from 0 to 10 with red being the weakest signal and green the signal with the best intensity.Keywords: virtualization, LTE, radios, power intensity levels colors, mobile signal reception power
Procedia PDF Downloads 891888 Air Dispersion Modeling for Prediction of Accidental Emission in the Atmosphere along Northern Coast of Egypt
Authors: Moustafa Osman
Abstract:
Modeling of air pollutants from the accidental release is performed for quantifying the impact of industrial facilities into the ambient air. The mathematical methods are requiring for the prediction of the accidental scenario in probability of failure-safe mode and analysis consequences to quantify the environmental damage upon human health. The initial statement of mitigation plan is supporting implementation during production and maintenance periods. In a number of mathematical methods, the flow rate at which gaseous and liquid pollutants might be accidentally released is determined from various types in term of point, line and area sources. These emissions are integrated meteorological conditions in simplified stability parameters to compare dispersion coefficients from non-continuous air pollution plumes. The differences are reflected in concentrations levels and greenhouse effect to transport the parcel load in both urban and rural areas. This research reveals that the elevation effect nearby buildings with other structure is higher 5 times more than open terrains. These results are agreed with Sutton suggestion for dispersion coefficients in different stability classes.Keywords: air pollutants, dispersion modeling, GIS, health effect, urban planning
Procedia PDF Downloads 3741887 Determination of Stresses in Vlasov Beam Sections
Authors: Semih Erdogan
Abstract:
In this paper, the normal and shear stress distributions in Vlasov beams are determined by two-dimensional triangular finite element formulations. The proposed formulations take into account the warping effects along the beam axis. The shape of the considered beam sections may be arbitrary and varied throughout its length. The stiffness matrices and force vectors are derived for transversal forces, uniform torsion, and nonuniform torsion. The proposed finite element algorithm is validated by comparing the analytical solutions, structural engineering books, and related articles. The numerical examples include beams with different cross-section types such as solid, thick-walled, closed-thin-walled, and open-thin-walled sections. Materials defined in the examples are homogeneous, isotropic, and linearly elastic. Through these examples, the study demonstrates the capability of the proposed method to address a wide range of practical engineering scenarios.Keywords: Vlasov beams, warping function, nonuniform torsion, finite element method, normal and shear stresses, cross-section properties
Procedia PDF Downloads 641886 Computational Fluid Dynamics (CFD) Simulations for Studying Flow Behaviors in Dipping Tank in Continuous Latex Gloves Production Lines
Authors: Worrapol Koranuntachai, Tonkid Chantrasmi, Udomkiat Nontakaew
Abstract:
Medical latex gloves are made from the latex compound in production lines. Latex dipping is considered one of the most important processes that directly affect the final product quality. In a continuous production line, a chain conveyor carries the formers through the process and partially submerges them into an open channel flow in a latex dipping tank. In general, the conveyor speed is determined by the desired production capacity, and the latex-dipping tank can then be designed accordingly. It is important to understand the flow behavior in the dipping tank in order to achieve high quality in the process. In this work, Computational Fluid Dynamics (CFD) was used to simulate the flow past an array of formers in a simplified latex dipping process. The computational results showed both the flow structure and the vortex generation between two formers. The maximum shear stress over the surface of the formers was used as the quality metric of the latex-dipping process when adjusting operation parameters.Keywords: medical latex gloves, latex dipping, dipping tank, computational fluid dynamics
Procedia PDF Downloads 1321885 The Use of Culture as a Campaign Method in Indonesian Parliamentary Election
Authors: Azza Habibullah
Abstract:
The principal objective of this paper is to show the use of participatory culture in the parliamentarian campaign. The use of this method has always been non-popular amongst the parliamentarian candidates due to the amount of times and energy that they need to spent with the constituents. However, due to many parliamentarian corruption cases in the last five years period, some political party have been losing peoples trust. That political party trust lost had also affecting the parliamentarian candidates electability, so they invent some creative campaign method that involving their constituent with more intimates and friendly environment. In this paper, an observation is done to a parliamentarian candidate from Partai Keadilan Sejahtera (Prosperous Justice Party) in Bandung and Cimahi City area, West Java. This Parliamentraian candidate is known for her personal-approach campaign method such as a puppet show, hanging out with group of ex-bike gang leaders, and going fishing with the constituent. This paper will compare her method with other parliamentarian candidates from the same party as her that mostly use mainstream campaign method such as open speech, print media, an other one way campaign method. While the other parliamentarian candidates failed to reach the parliamentarian threshold, the participatory method had proven as an effective method.Keywords: participatory culture, Indonesian parliamentary election, Prosperous Justice Party, electability
Procedia PDF Downloads 2661884 Unseen Classes: The Paradigm Shift in Machine Learning
Authors: Vani Singhal, Jitendra Parmar, Satyendra Singh Chouhan
Abstract:
Unseen class discovery has now become an important part of a machine-learning algorithm to judge new classes. Unseen classes are the classes on which the machine learning model is not trained on. With the advancement in technology and AI replacing humans, the amount of data has increased to the next level. So while implementing a model on real-world examples, we come across unseen new classes. Our aim is to find the number of unseen classes by using a hierarchical-based active learning algorithm. The algorithm is based on hierarchical clustering as well as active sampling. The number of clusters that we will get in the end will give the number of unseen classes. The total clusters will also contain some clusters that have unseen classes. Instead of first discovering unseen classes and then finding their number, we directly calculated the number by applying the algorithm. The dataset used is for intent classification. The target data is the intent of the corresponding query. We conclude that when the machine learning model will encounter real-world data, it will automatically find the number of unseen classes. In the future, our next work would be to label these unseen classes correctly.Keywords: active sampling, hierarchical clustering, open world learning, unseen class discovery
Procedia PDF Downloads 1721883 Exploring the Capabilities of Sentinel-1A and Sentinel-2A Data for Landslide Mapping
Authors: Ismayanti Magfirah, Sartohadi Junun, Samodra Guruh
Abstract:
Landslides are one of the most frequent and devastating natural disasters in Indonesia. Many studies have been conducted regarding this phenomenon. However, there is a lack of attention in the landslide inventory mapping. The natural condition (dense forest area) and the limited human and economic resources are some of the major problems in building landslide inventory in Indonesia. Considering the importance of landslide inventory data in susceptibility, hazard, and risk analysis, it is essential to generate landslide inventory based on available resources. In order to achieve this, the first thing we have to do is identify the landslides' location. The presence of Sentinel-1A and Sentinel-2A data gives new insights into land monitoring investigation. The free access, high spatial resolution, and short revisit time, make the data become one of the most trending open sources data used in landslide mapping. Sentinel-1A and Sentinel-2A data have been used broadly for landslide detection and landuse/landcover mapping. This study aims to generate landslide map by integrating Sentinel-1A and Sentinel-2A data use change detection method. The result will be validated by field investigation to make preliminary landslide inventory in the study area.Keywords: change detection method, landslide inventory mapping, Sentinel-1A, Sentinel-2A
Procedia PDF Downloads 1711882 Quantification of Aerodynamic Variables Using Analytical Technique and Computational Fluid Dynamics
Authors: Adil Loya, Kamran Maqsood, Muhammad Duraid
Abstract:
Aerodynamic stability coefficients are necessary to be known before any unmanned aircraft flight is performed. This requires expertise on aerodynamics and stability control of the aircraft. To enable efficacious performance of aircraft requires that a well-defined flight path and aerodynamics should be defined beforehand. This paper presents a study on the aerodynamics of an unmanned aero vehicle (UAV) during flight conditions. Current research holds comparative studies of different parameters for flight aerodynamic, measured using two different open source analytical software programs. These software packages are DATCOM and XLRF5, which help in depicting the flight aerodynamic variables. Computational fluid dynamics (CFD) was also used to perform aerodynamic analysis for which Star CCM+ was used. Output trends of the study demonstrate high accuracies between the two software programs with that of CFD. It can be seen that the Coefficient of Lift (CL) obtained from DATCOM and XFLR is similar to CL of CFD simulation. In the similar manner, other potential aerodynamic stability parameters obtained from analytical software are in good agreement with CFD.Keywords: XFLR5, DATCOM, computational fluid dynamic, unmanned aero vehicle
Procedia PDF Downloads 2971881 Individual Physiological and Psycho-Physical Response on Predicting Thermal Comfort in Transient Environments: A Literature Review
Authors: Fatemeh Deldarabdolmaleki, Nur Dalilah Dahlan, Farzad Hejazi
Abstract:
Human individual physiological and psycho-physical responses widely affect thermal comfort and preferences. They should be carefully researched to help improve the design and comfort of indoor environments. This paper aims to explore and test the degree and importance of individual physiological and psycho-physical differences, reviewing the most preferred, neutral, and comfortable temperature in previous studies conducted across the world. Basic individual physiological differences like gender, age, BMI and etc., have been the focus of this research. There is no unique consensus in the literature to date in regard to providing a universal thermal comfort formula that meets all individual physiological and psycho-physical needs. In order to achieve a balanced, thermally comfortable indoor environment, studying and evaluating individual needs in different parts of the world could be helpful. Even though personalized comfort systems in indoor environments sound promising, they might not be easily achieved in bigger office interiors, considering the cost and current open-plan office trends.Keywords: thermal comfort, indoor environments, occupants' physiological response, occupants psycho-physical response
Procedia PDF Downloads 731880 Relating Symptoms with Protein Production Abnormality in Patients with Down Syndrome
Authors: Ruolan Zhou
Abstract:
Trisomy of human chromosome 21 is the primary cause of Down Syndrome (DS), and this genetic disease has significantly burdened families and countries, causing great controversy. To address this problem, the research takes an approach in exploring the relationship between genetic abnormality and this disease's symptoms, adopting several techniques, including data analysis and enrichment analysis. It also explores open-source websites, such as NCBI, DAVID, SOURCE, STRING, as well as UCSC, to complement its result. This research has analyzed the variety of genes on human chromosome 21 with simple coding, and by using analysis, it has specified the protein-coding genes, their function, and their location. By using enrichment analysis, this paper has found the abundance of keratin production-related coding-proteins on human chromosome 21. By adopting past researches, this research has attempted to disclose the relationship between trisomy of human chromosome 21 and keratin production abnormality, which might be the reason for common diseases in patients with Down Syndrome. At last, by addressing the advantage and insufficiency of this research, the discussion has provided specific directions for future research.Keywords: Down Syndrome, protein production, genome, enrichment analysis
Procedia PDF Downloads 1261879 Estimating Pile Toe Levels for Capacity Assessment of Piers and Wharves in the Philippines
Authors: Ailvy Faith Zamora, Serj Donn David, Michael Anderson
Abstract:
There are a number of decades-old piers and wharves in Manila, Philippines, that are currently being used for container and bulk cargo handling port operations. These structures fulfill a very important role in the economy and hence have undergone rehabilitation and assessment of capacity to accommodate current and future operational requirements. The capacity assessment would include structural and pile geotechnical evaluation. Unfortunately, old marine structures in the Philippines may not have a complete set of as-built information. In certain instances, critical information, such as pile toe levels, is missing in the documentation. A combination of direct tests, geophysical tests, and numerical analysis/modelling has been performed to estimate existing pile toe levels of open-type piers and anchored quay wall wharves in Manila. These techniques were applied to both concrete and steel piles. This paper presents the tools utilized, testing setup, and techniques used for estimating toe levels of existing piles for certain structures, including the challenges encountered and applied solutions.Keywords: geophysical testing, pile toe level, structural assessment, piers, wharves
Procedia PDF Downloads 1291878 Consideration of Magnetic Lines of Force as Magnets Produced by Percussion Waves
Authors: Angel Pérez Sánchez
Abstract:
Background: Consider magnetic lines of force as a vector magnetic current was introduced by convention around 1830. But this leads to a dead end in traditional physics, and quantum explanations must be referred to explain the magnetic phenomenon. However, a study of magnetic lines as percussive waves leads to other paths capable of interpreting magnetism through traditional physics. Methodology: Brick used in the experiment: two parallel electric current cables attract each other if current goes in the same direction and its application at a microscopic level inside magnets. Significance: Consideration of magnetic lines as magnets themselves would mean a paradigm shift in the study of magnetism and open the way to provide solutions to mysteries of magnetism until now only revealed by quantum mechanics. Major findings: discover how a magnetic field is created, as well as reason how magnetic attraction and repulsion work, understand how magnets behave when splitting them, and reveal the impossibility of a Magnetic Monopole. All of this is presented as if it were a symphony in which all the notes fit together perfectly to create a beautiful, smart, and simple work.Keywords: magnetic lines of force, magnetic field, magnetic attraction and repulsion, magnet split, magnetic monopole, magnetic lines of force as magnets, magnetic lines of force as waves
Procedia PDF Downloads 901877 Effect of Type of Pile and Its Installation Method on Pile Bearing Capacity by Physical Modelling in Frustum Confining Vessel
Authors: Seyed Abolhasan Naeini, M. Mortezaee
Abstract:
Various factors such as the method of installation, the pile type, the pile material and the pile shape, can affect the final bearing capacity of a pile executed in the soil; among them, the method of installation is of special importance. The physical modeling is among the best options in the laboratory study of the piles behavior. Therefore, the current paper first presents and reviews the frustum confining vesel (FCV) as a suitable tool for physical modeling of deep foundations. Then, by describing the loading tests of two open-ended and closed-end steel piles, each of which has been performed in two methods, “with displacement" and "without displacement", the effect of end conditions and installation method on the final bearing capacity of the pile is investigated. The soil used in the current paper is silty sand of Firoozkooh. The results of the experiments show that in general the without displacement installation method has a larger bearing capacity in both piles, and in a specific method of installation the closed ended pile shows a slightly higher bearing capacity.Keywords: physical modeling, frustum confining vessel, pile, bearing capacity, installation method
Procedia PDF Downloads 1531876 Attitudes of Nurses towards End-of-Life Care for Themselves
Authors: H. N. S. Silva, S. N. Silva
Abstract:
Introduction: 88.3% of physicians decided to choose a ‘no-code’ or a DNR order if hospitalized and would choose to die less aggressively at home. However, their wishes were mostly over ridden. Objective: To assess the attitudes of nurses towards the end-of-the-life care they would like to receive for themselves and their attitudes towards terminal illnesses. Methods: A mixed method approach was used. A closed and open-ended questionnaire was administered to 73 participants and 5 registered nurses, who have more than 10 years of experience, working in hospitals both in Sri Lanka and abroad, were interviewed. Results: 94.1% of the participants stated that they would like to die at home, spending their last hours at home surrounded by their loved ones and engaging in religious activities but 57.7% of unmarried nurse said they would agree on euthanasia if they had a terminal disease, and also 66.2% of them stated they would agree in DNR order if they happen to be admitted to the ICU, but 82.5% wanted to diagnose if they had a terminal illness or cancer but did not agree on euthanasia. Qualitative analysis confirmed the findings and revealed that despite having adequate confidence about the hospital care, nurses would choose to die at home, surrounded by their loved once and engaging in religious activities. Euthanasia was believed to be inappropriate as it is religiously incorrect and as death is a natural process. Conclusion: The perception of death among nurses depends on their religious belief.Keywords: death, do not resuscitate, euthanasia, nurses
Procedia PDF Downloads 5161875 Logo Design of Pajamas, OTOP Product of Sainoi Community, Sainoi District, Nonthaburi Province
Authors: Witthaya Mekhum, Napasri Suwanajote, Isara Sangprasert
Abstract:
This research on logo design of pajamas, OTOP product of Sainoi community, Sainoi district, Nonthanuri Province is a participatory action research aiming to find the logo for pajamas, an OTOP product of Sainoi community. Sample of this research is 50 local residents from Sainoi community in Sainoi district, Nonthanuri Province. The questionnaire consisted of 4 main parts. Part 1: factors that influence the decisions of consumers; Part 2: characteristics of the materials used in the design; Part 3: attitude assessment and needs of consumers about logo designing to develop marketing channels; Part 4: suggestions. Interviews were conducted. For data analysis, checklist items were analyzed with frequency and percentage. Open-end items were analyzed by summarizing and using ratio scale and mean and standard deviation. The research results showed that the design, cutting and fabric affect the decision of the consumers. They want design to be decent and beautiful. Illustrations used in graphic design logos should be Lines. Fonts should be English letters and the color of the font should be the same color.Keywords: design, logo, OTOP product, pajamas
Procedia PDF Downloads 2701874 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code
Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue
Abstract:
Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology
Procedia PDF Downloads 2991873 The Effectiveness of Extracurricular Activities for Teaching Biology in the Modern World
Authors: Mukhtarkhanova Ainagul Madievna, Imanbek Karakoz
Abstract:
The development and implementation of active forms and methods of extracurricular work in biology are carried out, assistance to people in determining sustainable interests in a particular field of science, expanding pupil's knowledge and horizons during in–depth study of program issues that go beyond the curriculum where considered, but accessible to the understanding of people; the development of interest in the subject, independence, creative activity. The purpose of this study is to open interest through extracurricular activities for teaching biology. The purpose of the presented work is to arouse people's interest in biology lessons in the modern world through extracurricular activities. First, the level of people was determined in the traditional style of teaching lessons, for which special tests and evaluation criteria were compiled. The level of pupils' knowledge of biology was determined by a questionnaire. Samples of extracurricular work were presented, and practices were conducted in the educational process. At the next stage, the level of pupils after the experiment was compared. The results of the work were discussed, and recommendations were developed.Keywords: extracurricular activities, modern world, teaching, method, excursions, laboratory experiments, science fairs
Procedia PDF Downloads 1031872 An Inquiry into the Usage of Complex Systems Models to Examine the Effects of the Agent Interaction in a Political Economic Environment
Authors: Ujjwall Sai Sunder Uppuluri
Abstract:
Group theory is a powerful tool that researchers can use to provide a structural foundation for their Agent Based Models. These Agent Based models are argued by this paper to be the future of the Social Science Disciplines. More specifically, researchers can use them to apply evolutionary theory to the study of complex social systems. This paper illustrates one such example of how theoretically an Agent Based Model can be formulated from the application of Group Theory, Systems Dynamics, and Evolutionary Biology to analyze the strategies pursued by states to mitigate risk and maximize usage of resources to achieve the objective of economic growth. This example can be applied to other social phenomena and this makes group theory so useful to the analysis of complex systems, because the theory provides the mathematical formulaic proof for validating the complex system models that researchers build and this will be discussed by the paper. The aim of this research, is to also provide researchers with a framework that can be used to model political entities such as states on a 3-dimensional plane. The x-axis representing resources (tangible and intangible) available to them, y the risks, and z the objective. There also exist other states with different constraints pursuing different strategies to climb the mountain. This mountain’s environment is made up of risks the state faces and resource endowments. This mountain is also layered in the sense that it has multiple peaks that must be overcome to reach the tallest peak. A state that sticks to a single strategy or pursues a strategy that is not conducive to the climbing of that specific peak it has reached is not able to continue advancement. To overcome the obstacle in the state’s path, it must innovate. Based on the definition of a group, we can categorize each state as being its own group. Each state is a closed system, one which is made up of micro level agents who have their own vectors and pursue strategies (actions) to achieve some sub objectives. The state also has an identity, the inverse being anarchy and/or inaction. Finally, the agents making up a state interact with each other through competition and collaboration to mitigate risks and achieve sub objectives that fall within the primary objective. Thus, researchers can categorize the state as an organism that reflects the sum of the output of the interactions pursued by agents at the micro level. When states compete, they employ a strategy and that state which has the better strategy (reflected by the strategies pursued by her parts) is able to out-compete her counterpart to acquire some resource, mitigate some risk or fulfil some objective. This paper will attempt to illustrate how group theory combined with evolutionary theory and systems dynamics can allow researchers to model the long run development, evolution, and growth of political entities through the use of a bottom up approach.Keywords: complex systems, evolutionary theory, group theory, international political economy
Procedia PDF Downloads 1391871 Design of a Service-Enabled Dependable Integration Environment
Authors: Fuyang Peng, Donghong Li
Abstract:
The aim of information systems integration is to make all the data sources, applications and business flows integrated into the new environment so that unwanted redundancies are reduced and bottlenecks and mismatches are eliminated. Two issues have to be dealt with to meet such requirements: the software architecture that supports resource integration, and the adaptor development tool that help integration and migration of legacy applications. In this paper, a service-enabled dependable integration environment (SDIE), is presented, which has two key components, i.e., a dependable service integration platform and a legacy application integration tool. For the dependable platform for service integration, the service integration bus, the service management framework, the dependable engine for service composition, and the service registry and discovery components are described. For the legacy application integration tool, its basic organization, functionalities and dependable measures taken are presented. Due to its service-oriented integration model, the light-weight extensible container, the service component combination-oriented p-lattice structure, and other features, SDIE has advantages in openness, flexibility, performance-price ratio and feature support over commercial products, is better than most of the open source integration software in functionality, performance and dependability support.Keywords: application integration, dependability, legacy, SOA
Procedia PDF Downloads 3601870 Being ‘Sciencey’: Scottish, South-Asian and Muslim Young People
Authors: Saima Salehjee, Mike Watts
Abstract:
In our school-based world, we are commonly confronted by young people for whom the study of science is an unpalatable ‘other world’: they simply do not see themselves as science (sciencey) people. To be clear, we are not interested in all young people becoming career scientists – although some small modicum of that would be quite agreeable. We are, though, keen to form or transform (trans(form)) their appreciations of science and retain open minds on matters scientific to develop the feeling of being ‘sciencey’ with or without the aspiration of becoming scientists. Our discussion in this paper draws upon research undertaken in a co-education primary- and lower-secondary school in Scotland, and our arguments chart the trans(formations) of thirty under-representative and under-researched Scottish South-Asian Muslim students (aged 11-13) over a school term. We use science identity theory as the basis for our analysis: what it means to be ‘sciencey’ and whether (or not) structural forces have impacted their decision of being ‘sciencey’. This work offers new insights into how Scottish, South-Asian, and Muslim students perceive and engage with in and out of school science and highlight some science nudges aimed to support their development of being ‘sciencey’.Keywords: science identity, science nudges, transformative moments, south-Asian, Muslim, scottish, sciencey
Procedia PDF Downloads 1151869 A Bibliometric Analysis of Ukrainian Research Articles on SARS-COV-2 (COVID-19) in Compliance with the Standards of Current Research Information Systems
Authors: Sabina Auhunas
Abstract:
These days in Ukraine, Open Science dramatically develops for the sake of scientists of all branches, providing an opportunity to take a more close look on the studies by foreign scientists, as well as to deliver their own scientific data to national and international journals. However, when it comes to the generalization of data on science activities by Ukrainian scientists, these data are often integrated into E-systems that operate inconsistent and barely related information sources. In order to resolve these issues, developed countries productively use E-systems, designed to store and manage research data, such as Current Research Information Systems that enable combining uncompiled data obtained from different sources. An algorithm for selecting SARS-CoV-2 research articles was designed, by means of which we collected the set of papers published by Ukrainian scientists and uploaded by August 1, 2020. Resulting metadata (document type, open access status, citation count, h-index, most cited documents, international research funding, author counts, the bibliographic relationship of journals) were taken from Scopus and Web of Science databases. The study also considered the info from COVID-19/SARS-CoV-2-related documents published from December 2019 to September 2020, directly from documents published by authors depending on territorial affiliation to Ukraine. These databases are enabled to get the necessary information for bibliometric analysis and necessary details: copyright, which may not be available in other databases (e.g., Science Direct). Search criteria and results for each online database were considered according to the WHO classification of the virus and the disease caused by this virus and represented (Table 1). First, we identified 89 research papers that provided us with the final data set after consolidation and removing duplication; however, only 56 papers were used for the analysis. The total number of documents by results from the WoS database came out at 21641 documents (48 affiliated to Ukraine among them) in the Scopus database came out at 32478 documents (41 affiliated to Ukraine among them). According to the publication activity of Ukrainian scientists, the following areas prevailed: Education, educational research (9 documents, 20.58%); Social Sciences, interdisciplinary (6 documents, 11.76%) and Economics (4 documents, 8.82%). The highest publication activity by institution types was reported in the Ministry of Education and Science of Ukraine (its percent of published scientific papers equals 36% or 7 documents), Danylo Halytsky Lviv National Medical University goes next (5 documents, 15%) and P. L. Shupyk National Medical Academy of Postgraduate Education (4 documents, 12%). Basically, research activities by Ukrainian scientists were funded by 5 entities: Belgian Development Cooperation, the National Institutes of Health (NIH, U.S.), The United States Department of Health & Human Services, grant from the Whitney and Betty MacMillan Center for International and Area Studies at Yale, a grant from the Yale Women Faculty Forum. Based on the results of the analysis, we obtained a set of published articles and preprints to be assessed on the variety of features in upcoming studies, including citation count, most cited documents, a bibliographic relationship of journals, reference linking. Further research on the development of the national scientific E-database continues using brand new analytical methods.Keywords: content analysis, COVID-19, scientometrics, text mining
Procedia PDF Downloads 1151868 Reinforcement Learning for Self Driving Racing Car Games
Authors: Adam Beaunoyer, Cory Beaunoyer, Mohammed Elmorsy, Hanan Saleh
Abstract:
This research aims to create a reinforcement learning agent capable of racing in challenging simulated environments with a low collision count. We present a reinforcement learning agent that can navigate challenging tracks using both a Deep Q-Network (DQN) and a Soft Actor-Critic (SAC) method. A challenging track includes curves, jumps, and varying road widths throughout. Using open-source code on Github, the environment used in this research is based on the 1995 racing game WipeOut. The proposed reinforcement learning agent can navigate challenging tracks rapidly while maintaining low racing completion time and collision count. The results show that the SAC model outperforms the DQN model by a large margin. We also propose an alternative multiple-car model that can navigate the track without colliding with other vehicles on the track. The SAC model is the basis for the multiple-car model, where it can complete the laps quicker than the single-car model but has a higher collision rate with the track wall.Keywords: reinforcement learning, soft actor-critic, deep q-network, self-driving cars, artificial intelligence, gaming
Procedia PDF Downloads 461867 Investigation of the Field Trip Method’s Effectiveness: As a Way of Improving Pre-Service Teachers’ Views on Environmental Education
Authors: Abuzer Akgün, Ümit Duruk
Abstract:
This study was carried out in a period of four weeks thanks to voluntarily participation of twenty eight pre-service teachers enrolled diverse departments in Faculty of Education. The purpose of the study was to point out how pre-service teachers views on environmental education were affected by field trips. Prior to data collection, four open-ended questions were prepared and administered to all pre-service teachers in the working group. Data gathered at first and final week of the field trip were compared in a qualitative approach using content analysis. In conclusion, it is obvious that most of the participants don’t feel themselves quiet enough about environmental education and state this reason as a providing justification to participate voluntarily in the study. In the secondary school teaching context, they mostly emphasize on the vital importance of the environmental awareness level of the pupils in the schools. They also seem to think that they get a detailed knowledge of environmental education and claim that they will use this knowledge in order to bring up next generations in their professional career as teachers. Lastly, they state that observing the deteriorating materials directly in their own settings, might be more effective as regards improving environmental awareness.Keywords: science education, environmental education, environmental issues, field trip method
Procedia PDF Downloads 3561866 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks
Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner
Abstract:
Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.Keywords: USB, device, cyber security, attack, detection
Procedia PDF Downloads 398