Search results for: face shield
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2806

Search results for: face shield

1036 The Role of Attachment and Dyadic Coping in Shaping Relational Intimacy

Authors: Anna Wendolowska, Dorota Czyzowska

Abstract:

An intimate relationship is a significant factor that influences romantic partners’ well-being. In the face of stress, avoidant partners often employ a defense-against-intimacy strategy, leading to reduced relationship satisfaction, intimacy, interdependence, and longevity. Dyadic coping can buffer the negative effects of stress on relational satisfaction. Emotional competence mediates the relationship between insecure attachment and intimacy. In the current study, the link between attachment, different forms of dyadic coping, and various aspects of relationship satisfaction was examined. Both partners completed the attachment style questionnaire, the well matching couple questionnaire, and the dyadic coping inventory. The data was analyzed using the actor–partner interdependence model. The results highlighted a negative association between insecure-avoidant attachment style and intimacy. The actor effects of avoidant attachment on relational intimacy for women and for men were significant, whilst the partner effects for both spouses were not significant. The emotion-focused common dyadic coping moderated the relationship between avoidance of attachment and the partner's sense of intimacy. After controlling for the emotion-focused common dyadic coping, the actor effect of attachment on intimacy for men was slightly weaker, and the actor effect for women turned out to be insignificant. The emotion-focused common dyadic coping weakened the negative association between insecure attachment and relational intimacy. The impact of adult attachment and dyadic coping significantly contributes to subjective relational well-being.

Keywords: adult attachment, dyadic coping, relational intimacy, relationship satisfaction

Procedia PDF Downloads 158
1035 Effective Slab Width for Beam-End Flexural Strength of Composite Frames with Circular-Section Columns

Authors: Jizhi Zhao, Qiliang Zhou, Muxuan Tao

Abstract:

The calculation of the ultimate loading capacity of composite frame beams is an important step in the design of composite frame structural systems. Currently, the plastic limit theory is mainly used for this calculation in the codes adopted by many countries; however, the effective slab width recommended in most codes is based on the elastic theory, which does not accurately reflect the complex stress mechanism at the beam-column joints in the ultimate loading state. Therefore, the authors’ research group put forward the Compression-on-Column-Face mechanism and Tension-on-Transverse-Beam mechanism to explain the mechanism in the ultimate loading state. Formulae are derived for calculating the effective slab width in composite frames with rectangular/square-section columns under ultimate lateral loading. Moreover, this paper discusses the calculation method of the effective slab width for the beam-end flexural strength of composite frames with circular-section columns. The proposed design formula is suitable for exterior and interior joints. Finally, this paper compares the proposed formulae with available formulae in other literature, current design codes, and experimental results, providing the most accurate results to predict the effective slab width and ultimate loading capacity.

Keywords: composite frame structure, effective slab width, circular-section column, design formulae, ultimate loading capacity

Procedia PDF Downloads 127
1034 Big Data in Telecom Industry: Effective Predictive Techniques on Call Detail Records

Authors: Sara ElElimy, Samir Moustafa

Abstract:

Mobile network operators start to face many challenges in the digital era, especially with high demands from customers. Since mobile network operators are considered a source of big data, traditional techniques are not effective with new era of big data, Internet of things (IoT) and 5G; as a result, handling effectively different big datasets becomes a vital task for operators with the continuous growth of data and moving from long term evolution (LTE) to 5G. So, there is an urgent need for effective Big data analytics to predict future demands, traffic, and network performance to full fill the requirements of the fifth generation of mobile network technology. In this paper, we introduce data science techniques using machine learning and deep learning algorithms: the autoregressive integrated moving average (ARIMA), Bayesian-based curve fitting, and recurrent neural network (RNN) are employed for a data-driven application to mobile network operators. The main framework included in models are identification parameters of each model, estimation, prediction, and final data-driven application of this prediction from business and network performance applications. These models are applied to Telecom Italia Big Data challenge call detail records (CDRs) datasets. The performance of these models is found out using a specific well-known evaluation criteria shows that ARIMA (machine learning-based model) is more accurate as a predictive model in such a dataset than the RNN (deep learning model).

Keywords: big data analytics, machine learning, CDRs, 5G

Procedia PDF Downloads 138
1033 Child Labour Issue: Practice of Enforecement of Right of the Child in Nigeria

Authors: Gift Salawa, Perkins Erhijakpor, Henry Ukwu

Abstract:

This study will explore child labour issues in Nigeria because it is capable of affecting the physical and general well-being of children who perform hazardous work. This feat will be achieved through qualitative research methodology. Data collection shall be elicited by oral interviews and documental content analysis to delve on the application of the Convention on the Rights of the Child (CRC), International Labour Organization ILO and Geneva Convention relating to child labour practices in Nigeria. This will include the relevance of present domestic laws relating to child labour as implemented in Nigeria, together with factors that contribute to the practice of child labour in the country. The oral interview data analysis will be performed by breaking the interview data into significant statements and themes. This shall be done by comparing and determining the commonalities that are prevalent in the participants’ views regarding child labour menace in Nigeria. Presumably, findings from this study shall unveil that a poor educational policy, a widespread poverty level which is mostly prevalent amongst families in the rural areas of the country, a lack of employment for adults, have led to the ineffectiveness of the local child labour laws in Nigeria. These has in turn culminated into a somewhat non-implementation of the international laws of the CRC, ILO and Geneva Declaration on child labour to which the Nigerian government is a signatory. Based on the finding, this study will calls on the government of Nigeria to extend its free educational policy from the elementary, secondary to tertiary educations. The government also has to ensure that offenders of children’s rights should face a severe punishment.

Keywords: child labour, educational policy, human right, protection right

Procedia PDF Downloads 296
1032 Transforming ESL Teaching and Learning with ICT

Authors: Helena Sit

Abstract:

Developing skills in using ICT in the language classroom has been discussed at all educational levels. Digital tools and learning management systems enable teachers to transform their instructional activities while giving learners the opportunity to engage with virtual communities. In the field of English as a second language (ESL) teaching and learning, the use of technology-enhanced learning and diverse pedagogical practices continues to grow. Whilst technology and multimodal learning is a way of the future for education, second language teachers now face the predicament as to whether implementing these newer ways of learning is, in fact, beneficial or disadvantageous to learners. Research has shown that integrating multimodality and technology can improve students’ engagement and participation in their English language learning. However, students can experience anxiety or misunderstanding when engaging with E-learning or digital-mediated learning. This paper aims to explore how ESL teaching and learning are transformed via the use of educational technology and what impact it has had on student teachers. Case study is employed in this research. The study reviews the growing presence of technology and multimodality in university language classrooms, discusses their impact on teachers’ pedagogical practices, and proposes scaffolding strategies to help design effective English language courses in the Australian education context. The study sheds light on how pedagogical integration today may offer a way forward for language teachers of tomorrow and provides implications to implement an evidence-informed approach that blends knowledge from research, practice and people experiencing the practice in the digital era.

Keywords: educational technology, ICT in higher education, curriculum design and innovation, teacher education, multiliteracies pedagogy

Procedia PDF Downloads 77
1031 Case Study Approach Using Scenario Analysis to Analyze Unabsorbed Head Office Overheads

Authors: K. C. Iyer, T. Gupta, Y. M. Bindal

Abstract:

Head office overhead (HOOH) is an indirect cost and is recovered through individual project billings by the contractor. Delay in a project impacts the absorption of HOOH cost allocated to that particular project and thus diminishes the expected profit of the contractor. This unabsorbed HOOH cost is later claimed by contractors as damages. The subjective nature of the available formulae to compute unabsorbed HOOH is the difficulty that contractors and owners face and thus dispute it. The paper attempts to bring together the rationale of various HOOH formulae by gathering contractor’s HOOH cost data on all of its project, using case study approach and comparing variations in values of HOOH using scenario analysis. The case study approach uses project data collected from four construction projects of a contractor in India to calculate unabsorbed HOOH costs from various available formulae. Scenario analysis provides further variations in HOOH values after considering two independent situations mainly scope changes and new projects during the delay period. Interestingly, one of the findings in this study reveals that, in spite of HOOH getting absorbed by additional works available during the period of delay, a few formulae depict an increase in the value of unabsorbed HOOH, neglecting any absorption by the increase in scope. This indicates that these formulae are inappropriate for use in case of a change to the scope of work. Results of this study can help both parties in deciding on an appropriate formula more objectively, considering the events on a project causing the delay and contractor's position in respect of obtaining new projects.

Keywords: absorbed and unabsorbed overheads, head office overheads, scenario analysis, scope variation

Procedia PDF Downloads 163
1030 Consequential Effects of Coal Utilization on Urban Water Supply Sources – a Study of Ajali River in Enugu State Nigeria

Authors: Enebe Christian Chukwudi

Abstract:

Water bodies around the world notably underground water, ground water, rivers, streams, and seas, face degradation of their water quality as a result of activities associated with coal utilization including coal mining, coal processing, coal burning, waste storage and thermal pollution from coal plants which tend to contaminate these water bodies. This contamination results from heavy metals, presence of sulphate and iron, dissolved solids, mercury and other toxins contained in coal ash, sludge, and coal waste. These wastes sometimes find their way to sources of urban water supply and contaminate them. A major problem encountered in the supply of potable water to Enugu municipality is the contamination of Ajali River, the source of water supply to Enugu municipal by coal waste. Hydro geochemical analysis of Ajali water samples indicate high sulphate and iron content, high total dissolved solids(TDS), low pH (acidity values) and significant hardness in addition to presence of heavy metals, mercury, and other toxins. This is indicative of the following remedial measures: I. Proper disposal of mine wastes at designated disposal sites that are suitably prepared. II. Proper water treatment and III. Reduction of coal related contaminants taking advantage of clean coal technology.

Keywords: effects, coal, utilization, water quality, sources, waste, contamination, treatment

Procedia PDF Downloads 421
1029 Interior Noise Reduction of Construction Equipment Vehicle

Authors: Pradeep Jawale, Sharad Supare, Sachin Kumar Jain, Nagesh Walke

Abstract:

One can witness the constant development and redevelopment of cities throughout the world. Construction equipment vehicles (CEVs) are commonly used on the construction site. However, noise pollution from construction sites due to the use of CEV has become a major problem for many cities. The construction equipment employed, which includes excavators and bulldozers, is one of the main causes of these elevated noise levels. The construction workers possibly will face a potential risk to their auditory health and well-being due to the noise levels they are exposed to. Different countries have imposed exterior and operator noise limits for construction equipment vehicles, enabling them to control noise pollution from CEVs. In this study, the operator ear level noise of the identified vehicle is higher than the benchmark vehicle by 8 dB(A). It was a tough time for the NVH engineer to beat the interior noise level of the benchmark vehicle. Initially, the noise source identification technique was used to identify the dominant sources for increasing the interior noise of the test vehicle. It was observed that the transfer of structure-borne and air-borne noise to the cabin was the major issue with the vehicle. It was foremost required to address the issue without compromising the overall performance of the vehicle. Surprisingly, the steering pump and radiator fan were identified as the major dominant sources than typical conventional sources like powertrain, intake, and exhaust. Individual sources of noise were analyzed in detail, and optimizations were made to minimize the noise at the source. As a result, the significant noise reduction achieved inside the vehicle and the overall in-cab noise level for the vehicle became a new benchmark in the market.

Keywords: interior noise, noise reduction, CEV, noise source identification

Procedia PDF Downloads 44
1028 Gradient-Based Reliability Optimization of Integrated Energy Systems Under Extreme Weather Conditions: A Case Study in Ningbo, China

Authors: Da LI, Peng Xu

Abstract:

Recent extreme weather events, such as the 2021 European floods and North American heatwaves, have exposed the vulnerability of energy systems to both extreme demand scenarios and potential physical damage. Current integrated energy system designs often overlook performance under these challenging conditions. This research, focusing on a regional integrated energy system in Ningbo, China, proposes a distinct design method to optimize system reliability during extreme events. A multi-scenario model was developed, encompassing various extreme load conditions and potential system damages caused by severe weather. Based on this model, a comprehensive reliability improvement scheme was designed, incorporating a gradient approach to address different levels of disaster severity through the integration of advanced technologies like distributed energy storage. The scheme's effectiveness was validated through Monte Carlo simulations. Results demonstrate significant enhancements in energy supply reliability and peak load reduction capability under extreme scenarios. The findings provide several insights for improving energy system adaptability in the face of climate-induced challenges, offering valuable references for building reliable energy infrastructure capable of withstanding both extreme demands and physical threats across a spectrum of disaster intensities.

Keywords: extreme weather events, integrated energy systems, reliability improvement, climate change adaptation

Procedia PDF Downloads 22
1027 Determining of the Performance of Data Mining Algorithm Determining the Influential Factors and Prediction of Ischemic Stroke: A Comparative Study in the Southeast of Iran

Authors: Y. Mehdipour, S. Ebrahimi, A. Jahanpour, F. Seyedzaei, B. Sabayan, A. Karimi, H. Amirifard

Abstract:

Ischemic stroke is one of the common reasons for disability and mortality. The fourth leading cause of death in the world and the third in some other sources. Only 1/3 of the patients with ischemic stroke fully recover, 1/3 of them end in permanent disability and 1/3 face death. Thus, the use of predictive models to predict stroke has a vital role in reducing the complications and costs related to this disease. Thus, the aim of this study was to specify the effective factors and predict ischemic stroke with the help of DM methods. The present study was a descriptive-analytic study. The population was 213 cases from among patients referring to Ali ibn Abi Talib (AS) Hospital in Zahedan. Data collection tool was a checklist with the validity and reliability confirmed. This study used DM algorithms of decision tree for modeling. Data analysis was performed using SPSS-19 and SPSS Modeler 14.2. The results of the comparison of algorithms showed that CHAID algorithm with 95.7% accuracy has the best performance. Moreover, based on the model created, factors such as anemia, diabetes mellitus, hyperlipidemia, transient ischemic attacks, coronary artery disease, and atherosclerosis are the most effective factors in stroke. Decision tree algorithms, especially CHAID algorithm, have acceptable precision and predictive ability to determine the factors affecting ischemic stroke. Thus, by creating predictive models through this algorithm, will play a significant role in decreasing the mortality and disability caused by ischemic stroke.

Keywords: data mining, ischemic stroke, decision tree, Bayesian network

Procedia PDF Downloads 172
1026 A Systematic Snapshot of Software Outsourcing Challenges

Authors: Issam Jebreen, Eman Al-Qbelat

Abstract:

Outsourcing software development projects can be challenging, and there are several common challenges that organizations face. A study was conducted with a sample of 46 papers on outsourcing challenges, and the results show that there are several common challenges faced by organizations when outsourcing software development projects. Poor outsourcing relationship was identified as the most significant challenge, with 35% of the papers referencing it. Lack of quality was the second most significant challenge, with 33% of the papers referencing it. Language and cultural differences were the third most significant challenge, with 24% of the papers referencing it. Non-competitive price was another challenge faced by organizations, with 21% of the papers referencing it. Poor coordination and communication were also identified as a challenge, with 21% of the papers referencing it. Opportunistic behavior, lack of contract negotiation, inadequate user involvement, and constraints due to time zone were also challenges faced by organizations. Other challenges faced by organizations included poor project management, lack of technical capabilities, vendor employee high turnover, poor requirement specification, IPR issues, poor management of budget, schedule, and delay, geopolitical and country instability, the difference in development methodologies, failure to manage end-user expectations, and poor monitoring and control. In conclusion, outsourcing software development projects can be challenging, but organizations can mitigate these challenges by selecting the right outsourcing partner, having a well-defined contract and clear communication, having a clear understanding of the requirements, and implementing effective project management practices.

Keywords: software outsourcing, vendor, outsourcing challenges, quality model, continent, country, global outsourcing, IT workforce outsourcing.

Procedia PDF Downloads 88
1025 Ideology and Lexicogrammar: Discourse Against the Power in Lyrical Texts (XIII, XVII and XX Centuries)

Authors: Ulisses Tadeu Vaz de Oliveira

Abstract:

The development of multifunctional studies in the theoretical-methodological perspective of the Systemic-Functional Grammar (SFG) and the increasing number of critical literary studies have introduced new opportunities for the study of ideologies and societies, but also brought up new challenges across and within many areas. In this regard, the Critical Linguistics researches allow a form of pairing a textual linguistic analysis method (micro level) with a social language theory in political and ideological processes (macro level), presented in the literature. This presentation will report on strategies to criticize power holders in literary productions from three distinct eras, namely: (a) Satirical Galego-Portuguese chants of Gil Pérez Conde (thirteenth century), (b) Poems of Gregorio de Matos Guerra (seventeenth century), and (c) Songs of Chico Buarque de Holanda (twentieth century). The analysis of these productions is based on the SFG proposals, which considers the clause as a social event. Therefore, the structure serves to realize three concurrent meanings (metafunctions): Ideational, Interpersonal and Textual. The presenter aims to shed light on the core issues relevant to the successes of the authors to criticize authorities in repressive times while caring about face-threatening and politeness. The effective and meaningful critical discourse was a way of moving the society`s chains towards new ideologies reflected in the lexicogrammatical choices made and the rhetorical functions of the persuasive structures used by the authors.

Keywords: ideology, literature, persuasion, systemic-functional grammar

Procedia PDF Downloads 416
1024 Oral Grammatical Errors of Arabic as Second Language (ASL) Learners: An Applied Linguistic Approach

Authors: Sadeq Al Yaari, Fayza Al Hammadi, Ayman Al Yaari, Adham Al Yaari, Montaha Al Yaari, Aayah Al Yaari, Sajedah Al Yaari, Salah Al Yami

Abstract:

Background: When we further take Arabic grammatical issues into account in accordance with applied linguistic investigations on Arabic as Second Language (ASL) learners, a fundamental issue arises at this point as to the production of speech in Arabic: Oral grammatical errors committed by ASL learners. Aims: Using manual rating as well as computational analytic methodology to test a corpus of recorded speech by Second Language (ASL) learners of Arabic, this study aims to find the areas of difficulties in learning Arabic grammar. More specifically, it examines how and why ASL learners make grammatical errors in their oral speech. Methods: Tape recordings of four (4) Arabic as Second Language (ASL) learners who ranged in age from 23 to 30 were naturally collected. All participants have completed an intensive Arabic program (two years) and 20 minute-speech was recorded for each participant. Having the collected corpus, the next procedure was to rate them against Arabic standard grammar. The rating includes four processes: Description, analysis and assessment. Conclusions: Outcomes made from the issues addressed in this paper can be summarized in the fact that ASL learners face many grammatical difficulties when studying Arabic word order, tenses and aspects, function words, subject-verb agreement, verb form, active-passive voice, global and local errors, processes-based errors including addition, omission, substitution or a combination of any of them.

Keywords: grammar, error, oral, Arabic, second language, learner, applied linguistics.

Procedia PDF Downloads 44
1023 Effects of Chemicals in Elderly

Authors: Ali Kuzu

Abstract:

There are about 800 thousand chemicals in our environment and the number is increasing more than a thousand every year. While most of these chemicals are used as components in various consumer products, some are faced as industrial waste in the environment. Unfortunately, many of these chemicals are hazardous and affect humans. According to the “International Program on Chemical Safety” of World Health Organization; Among the chronic health effects of chemicals, cancer is of major concern. Many substances have found in recent years to be carcinogenic in one or more species of laboratory animals. Especially with respect to long-term effects, the response to a chemical may vary, quantitatively or qualitatively, in different groups of individuals depending on predisposing conditions, such as nutritional status, disease status, current infection, climatic extremes, and genetic features, sex and age of the individuals. Understanding the response of such specific risk groups is an important area of toxicology research. People with age 65+ is defined as “aged (or elderly)”. The elderly population in the world is about 600 million, which corresponds to ~8 percent of the world population. While every 1 of each 4 people is aged in Japan, the elderly population is quite close to 20 percent in many developed countries. And elderly population in these countries is growing more rapidly than the total population. The negative effects of chemicals on elderly take an important place in health-care related issues in last decades. The aged population is more susceptible to the harmful effects of environmental chemicals. According to the poor health of the organ systems in elderly, the ability of their body to eliminate the harmful effects and chemical substances from their body is also poor. With the increasing life expectancy, more and more people will face problems associated with chemical residues.

Keywords: elderly, chemicals’ effects, aged care, care need

Procedia PDF Downloads 454
1022 People Experiencing Economic Disadvantages and Access to Justice System: The Case of Unemployed People in Australia

Authors: M. Shahadat Hossain

Abstract:

People experiencing economic disadvantages have limited access to justice system. Employment status is a key indicator of economic disadvantage. There is a link between employment status and vulnerability to legal problems. This paper addresses the obstacles unemployed people experience to secure justice in Australia. This paper further explores exiting services for economically disadvantaged people to secure justice where these unemployment people can get access. It reveals that unemployed people are vulnerable to multifaced crime and violence. Due to high cost of legal services, these unemployed people are unable to afford legal services to access justice. They are often found higher levels of nonactions in terms of access to justice also due to lack of their initiatives. This paper further reveals that legal aid commissions are state and territory statutory agencies in Australia which provide free legal information, advice, duty lawyers, and legal representation services. Community legal centres are independent, non-profit government organizations with a focus of early advice, problem solving, and working with other agencies to address connected, financial, and health problems. Moreover, the private profession helps people who cannot afford to pay for a lawyer in several ways. But there are problems of shortage of funding for these legal services and making available to economically disadvantaged people. However, this paper argues that people experiencing long-term unemployment face barriers to secure justice due to their economic disadvantages. It further argues that services available for them to access to justice is inadequate.

Keywords: economic disadvantages, unemployment, access to justice, Australia

Procedia PDF Downloads 137
1021 Addressing Coastal Community Vulnerabilities with Alternative Marine Energy Projects

Authors: Danielle Preziuso, Kamila Kazimierczuk, Annalise Stein, Bethel Tarekegne

Abstract:

Coastal communities experience a variety of distinct socioeconomic, technical, and environmental vulnerabilities, all of which accrue heightened risk with increasingly frequent and severe climate change impacts. Marine renewable energy (MRE) offers a potential solution for mitigating coastal community vulnerabilities, especially water-energy dependencies while delivering promising co-benefits such as increased resilience and more sustainable energy outcomes. This paper explores coastal community vulnerabilities and service dependencies based on the local drivers that create them, with attention to climate change impacts and how they catalyze water-energy unmet needs in these communities. We examine the vulnerabilities through the lens of coastal Tribal communities (i.e., the Makah Tribe, the Kenaitze Tribe, Quinault Nation), as indigenous communities often face compounded impacts of technical, economic, and environmental vulnerabilities due to their underlying socio-demographic inequalities. We offer an environmental and energy justice indicators framework to understand how these vulnerabilities disproportionately manifest and impact the most vulnerable community members, and we subsequently utilize the framework to inform a weighted decision matrix tool that compares the viability of MRE-based alternative energy futures in addressing these vulnerabilities. The framework and complementary tool highlight opportunities for future MRE research and pilot demonstrations that directly respond to the vulnerabilities of coastal communities.

Keywords: coastal communities, decision matrix, energy equity, energy vulnerability, marine energy, service dependency

Procedia PDF Downloads 76
1020 Factors Impacting Science and Mathematics Teachers’ Competencies in TPACK in STEM Context

Authors: Nasser Mansour, Ziad Said, Abdullah Abu-Tineh

Abstract:

STEM teachers face the challenge of possessing expertise not only in their subject disciplines but also in the pedagogical knowledge required for integrated STEM lessons. However, research reveals a lack of pedagogical competencies related to project-based learning (PBL) in the STEM context. To bridge this gap, the study examines teachers' competencies and self-efficacy in TPACK (Technological Pedagogical Content Knowledge) and its specific integration with PBL and STEM content. Data from 245 specialized science and math teachers were collected using a questionnaire. The study emphasizes the importance of addressing gender disparities, supporting formal teacher education, and recognizing the expertise and experiences of STEM teachers in effective technology integration. The findings indicate that gender plays a role in self-efficacy beliefs, with females exhibiting higher confidence in pedagogical knowledge and males demonstrating higher confidence in technological knowledge. Teaching experience and workload factors have a limited impact on teachers' Technological Pedagogical Content Knowledge (TPACK). These findings enhance our understanding of contextual factors impacting science and math teachers' self-efficacy in utilizing TPACK for STEM and PBL. They inform the development of targeted interventions, professional development programs, and support systems to enhance teachers' competencies and self-efficacy in TPACK for teaching science and Mathematics through STEM and PBL.

Keywords: technological pedagogical content knowledge, TPACK, STEM, project-based learning, PBL, self-efficacy, mathematics, science

Procedia PDF Downloads 60
1019 Foreign Languages and Employability in the European Union

Authors: Paulina Pietrzyk-Kowalec

Abstract:

This paper presents the phenomenon of multilingualism becoming the norm rather than the exception in the European Union. It also seeks to describe the correlation between the command of foreign languages and employability. It is evident that the challenges of today's societies when it comes to employability and to the reality of the current labor market are more and more diversified. Thus, it is one of the crucial tasks of higher education to prepare its students to face this kind of complexity, understand its nuances, and have the capacity to adapt effectively to situations that are common in corporations based in the countries belonging to the EU. From this point of view, the assessment of the impact that the command of foreign languages of European university students could have on the numerous business sectors becomes vital. It also involves raising awareness of future professionals to make them understand the importance of mastering communicative skills in foreign languages that will meet the requirements of students' prospective employers. The direct connection between higher education institutions and the world of business also allows companies to realize that they should rethink their recruitment and human resources procedures in order to take into account the importance of foreign languages. This article focuses on the objective of the multilingualism policy developed by the European Commission, which is to enable young people to master at least two foreign languages, which is crucial in their future careers. The article puts emphasis on the existence of a crucial connection between the research conducted in higher education institutions and the business sector in order to reduce current qualification gaps.

Keywords: cross-cultural communication, employability, human resources, language attitudes, multilingualism

Procedia PDF Downloads 132
1018 Research on Public Space Optimization Strategies for Existing Settlements Based on Intergenerational Friendliness

Authors: Huanhuan Qiang, Sijia Jin

Abstract:

Population aging has become a global trend, and China has entered an aging society, implementing an active aging system focused on home and community-based care. However, most urban communities where elderly people live face issues such as monotonous planning, unappealing landscapes, and inadequate aging infrastructure, which do not meet the requirements for active aging. Intergenerational friendliness and mutual assistance are key components in China's active aging policy framework. Therefore, residential development should prioritize enhancing intergenerational friendliness. Residential and public spaces are central to community life and well-being, offering new and challenging venues to improve relationships among residents of different ages. They are crucial for developing intergenerational communities with diverse generations and non-blood relationships. This paper takes the Maigaoqiao community in Nanjing, China, as a case study, examining intergenerational interactions in public spaces. Based on Maslow's hierarchy of needs and using time geography analysis, it identifies the spatiotemporal behavior characteristics of intergenerational groups in outdoor activities. Then construct an intergenerational-friendly evaluation system and an IPA quadrant model for public spaces in residential areas. Lastly, it explores optimization strategies for public spaces to promote intergenerational friendly interactions, focusing on five aspects: accessibility, safety, functionality, a sense of belonging, and interactivity.

Keywords: intergenerational friendliness, demand theory, spatiotemporal behavior, IPA analysis, existing residential public space

Procedia PDF Downloads 2
1017 Automated Video Surveillance System for Detection of Suspicious Activities during Academic Offline Examination

Authors: G. Sandhya Devi, G. Suvarna Kumar, S. Chandini

Abstract:

This research work aims to develop a system that will analyze and identify students who indulge in malpractices/suspicious activities during the course of an academic offline examination. Automated Video Surveillance provides an optimal solution which helps in monitoring the students and identifying the malpractice event immediately. This work is organized into three modules. The first module deals with performing an impersonation check using a PCA-based face recognition method which is done by cross checking his profile with the database. The presence or absence of the student is even determined in this module by implementing an image registration technique wherein a grid is formed by considering all the images registered using the frontal camera at the determined positions. Second, detecting such facial malpractices in which a student gets involved in conversation with another, trying to obtain unauthorized information etc., based on the threshold range evaluated by considering his/her mouth state whether open or closed. The third module deals with identification of unauthorized material or gadgets used in the examination hall by training the positive samples of the object through various stages. Here, a top view camera feed is analyzed to detect the suspicious activities. The system automatically alerts the administration when any suspicious activities are identified, thereby reducing the error rate caused due to manual monitoring. This work is an improvement over our previous work published in identifying suspicious activities done by examinees in an offline examination.

Keywords: impersonation, image registration, incrimination, object detection, threshold evaluation

Procedia PDF Downloads 228
1016 Parallels between the Glass and Lavender Ceilings

Authors: Paul E. Olsen

Abstract:

Researchers, businesses, and governments study the glass ceiling faced by women and members of minority groups at work, but the experiences of gay men, lesbians, and bisexual men and women with the lavender ceiling have not received similar attention. This qualitative research traces similarities between the lavender ceiling and the glass ceiling. More specifically, it presents a study designed to elucidate the experiences of gay men at work and compare them with those of women and minority group members, as reported in research literature on the glass ceiling. This research asked: 1) What have gay men experienced in the workplace? 2) What experiences have they had with recruitment, mentors, corporate climate, advancement opportunities, performance evaluation, social activities, harassment, and task force and committee assignments? 3) How do these experiences compare with those of women and minorities who have described their experiences with the glass ceiling? Purposeful and convenience sampling were used as participant selection strategies. Participants were diverse in terms of age, education, and industry. Data for this study were collected through semi-structured individual interviews with eight self-identified gay men working in human services, manufacturing, marketing, finance, government, the nonprofit sector, and retail. The gay men in the study described workplace experiences similar to descriptions of the glass ceiling faced by women and minorities. The lavender ceiling parallels the glass ceiling in corporate climates, harassment, mentors, social activities, promotions and performance appraisal, and task force and committee assignments at work. Women and most minorities do not, however, face the disclosure dilemma: Should one reveal his sexual orientation at work?

Keywords: discrimination, diversity, gay and lesbian, human resource

Procedia PDF Downloads 266
1015 Realising the Socio-Economic Rights of Refugees Under Human Rights Law: A Case Study of South Africa

Authors: Taguekou Kenfack Alexie

Abstract:

For a long time, refugee protection has constituted one of the main concerns of the international community as a whole and for the South African government in particular.The focus of this paper is on the challenges refugees face in accessing their rights in South Africa. In particular, it analyses the legal framework for the protection of the socio economic rights of refugees under international law, regional and domestic law and the extent to which the rights have been realized. The main hypothesis of the study centered on the fact that the social protection of refugees in South Africa is in conformity with international standards. To test this hypothesis, the qualitative research method was applied. Refugee related legal instruments were analyzed as well as academic publications, organizational reports and internet sources. The data analyzed revealed that there has been enormous progress in meeting international standards in the areas of education, emergency relief and assistance, protection of women and refugee children. The results also indicated that much remain to be desired in such areas as nutrition, shelter, health care, freedom of movement and very importantly, employment and social security. The paper also seeks to address the obstacles which prevent the proper treatment of refugees and to make recommendations as how the South African government can better regulate the treatment of refugees living in its territory.Recommendations include the amendment of the legal instruments that provide the normative framework for protection and improvement of protection policies to reflect the changing dynamics.

Keywords: international community, refugee, socioeconomic rights, social protection

Procedia PDF Downloads 281
1014 Performance Study of Classification Algorithms for Consumer Online Shopping Attitudes and Behavior Using Data Mining

Authors: Rana Alaa El-Deen Ahmed, M. Elemam Shehab, Shereen Morsy, Nermeen Mekawie

Abstract:

With the growing popularity and acceptance of e-commerce platforms, users face an ever increasing burden in actually choosing the right product from the large number of online offers. Thus, techniques for personalization and shopping guides are needed by users. For a pleasant and successful shopping experience, users need to know easily which products to buy with high confidence. Since selling a wide variety of products has become easier due to the popularity of online stores, online retailers are able to sell more products than a physical store. The disadvantage is that the customers might not find products they need. In this research the customer will be able to find the products he is searching for, because recommender systems are used in some ecommerce web sites. Recommender system learns from the information about customers and products and provides appropriate personalized recommendations to customers to find the needed product. In this paper eleven classification algorithms are comparatively tested to find the best classifier fit for consumer online shopping attitudes and behavior in the experimented dataset. The WEKA knowledge analysis tool, which is an open source data mining workbench software used in comparing conventional classifiers to get the best classifier was used in this research. In this research by using the data mining tool (WEKA) with the experimented classifiers the results show that decision table and filtered classifier gives the highest accuracy and the lowest accuracy classification via clustering and simple cart.

Keywords: classification, data mining, machine learning, online shopping, WEKA

Procedia PDF Downloads 349
1013 Bridging Biomedical Engineering Bachelor's Degree Programs in Saudi Arabia: A Study Case of Riyadh College of Technology

Authors: Hamad Albadr

Abstract:

With a rapid influence to sustain the needs for global trends that had arisen for the increasing complexities in health-care provision, the increasing number of health professionals at different levels, and the need to assure more equitable access to health care, the great variation in the levels of initial education for health care professional around the world had been assign bachelor's degree as the minimum point of entry to the health professions. This intent had affected all the health care professions including biomedical engineering. In Saudi Arabia, these challenges add more pressure to retain the global trends for associate degree graduates to upgrade their education to the bachelor's degree or called birding. This paper is to review the reality of biomedical technology programs that offered in Saudi Arabia by Technical Colleges or Community Colleges nationwide and the challenges that face these colleges to run such bridging program to achieve the Bachelor's degree in biomedical engineering and the official requirements by the Ministry of Higher Education and to maintain the international standards. The author will use strategic planning methodology for designing the biomedical engineering bridging of bachelor's program by reviewing the responsibilities of the biomedical engineers in hospitals through their job descriptions to determine the job assessment needs in advance to Developing a Curriculum (DACUM) through Instructional System Design (ISD) approach via five steps: Analysis, Design, Development, Implement, Evaluate (ADDIE).

Keywords: bachelor's degree bridging, biomedical engineering program, Saudi Arabia, Riyadh College of Technology

Procedia PDF Downloads 486
1012 Solar-Powered Water Purification Using Ozone and Sand Filtration

Authors: Kayla Youhanaie, Kenneth Dott, Greg Gillis-Smith

Abstract:

Access to clean water is a global challenge that affects nearly one-third of the world’s population. A lack of safe drinking water negatively affects a person’s health, safety, and economic status. However, many regions of the world that face this clean water challenge also have high solar energy potential. To address this worldwide issue and utilize available resources, a solar-powered water purification device was developed that could be implemented in communities around the world that lack access to potable water. The device uses ozone to destroy water-borne pathogens and sand filtration to filter out particulates from the water. To select the best method for this application, a quantitative energy efficiency comparison of three water purification methods was conducted: heat, UV light, and ozone. After constructing an initial prototype, the efficacy of the device was tested using agar petri dishes to test for bacteria growth in treated water samples at various time intervals after applying the device to contaminated water. The results demonstrated that the water purification device successfully removed all bacteria and particulates from the water within three minutes, making it safe for human consumption. These results, as well as the proposed design that utilizes widely available resources in target communities, suggest that the device is a sustainable solution to address the global water crisis and could improve the quality of life for millions of people worldwide.

Keywords: clean water, solar powered water purification, ozonation, sand filtration, global water crisis

Procedia PDF Downloads 74
1011 Study of Knowledge, Attitudes and Practices of Menstrual Hygiene of Adolescent Girls Aged 12 to 19 Years Old in Secondary School

Authors: Jean Marie Vianney Ininahazwe, Patrick Bitangumutwenzi

Abstract:

Context: The issue of menstrual hygiene is an entry point for demonstrating the gender-specific nature of the needs of women and adolescent girls. Women and girls around the world face many challenges in managing their periods. They may be deprived of certain basic human rights, including those relating to education, work and health. This work describes the Knowledge, Attitudes and Practices of menstrual hygiene among adolescent girls from 12 to 19 years at Lake Tanganyika Secondary School. Method: This is a descriptive cross-sectional study among 384 adolescent girls from Lake Tanganyika secondary school over a period of 2 weeks from September 13 to September 27 and with a purely general objective of describing the Knowledge, Attitudes and Practices of menstrual hygiene in secondary schools. The study was conducted using a non-probability method and the sampling technique was for convenience. The data collection technique used was the survey by questionnaire and the exploitation of the documentary. The data collection tool used was the questionnaire. Microsoft Word 2013, Microsoft Excel 2.13 and EPI INFO7 software were used for this purpose. Results: We noticed that 55.47% of the participants knew that menstruation is a physiological process; 57.55% of the teenage girls surveyed get their information about menstrual hygiene from their mothers; 75.72% use sanitary napkins and 24.02% use fabrics as protective material; 35.16% of respondents have already lacked sanitary napkins since their menarche; 37.29% are absent from classes due to lack of sanitary napkins; 23.82% use soap and other products to wash.

Keywords: knowledge, attitudes, practices, menstrual hygiene

Procedia PDF Downloads 71
1010 Navigating the Cacophony of Human Rights Claims and Chains of Fraud in Nigeria: The Anti-Corruption War Perspective

Authors: Mike Omilusi

Abstract:

Since the Buhari administration came to power, it has gained the people’s confidence with its anti-corruption efforts. Making culprits account for their past unlawful deeds, in a very determined and aggressive manner ever witnessed in the nation’s political history, generates different reactions among Nigerians. However, some questions remain pertinent to this study: Are Nigerians really advocating persecution or prosecution in respect of the graft suspects? Do they want conviction without being convinced? Is their outburst propelled by emotions and revengeful anticipation of having suspected looters of the nation’s commonwealth behind bars? Can the war be successfully fought without resorting to impunity? Relying extensively on secondary sources with the aid of descriptive and narrative tools, this study seeks to interrogate the claim of fundamental human rights in the face of wanton looting of the nation’s resources. If, as opined by President Buhari, corruption is a crime against humanity, then it is argued that those who commit such crime should be subjected to penalties prescribed by law. Such crime -as corruption in this study- deprives the citizens of welfare, social amenities and good things of life. In this instance, it also poses threats to national security, having misappropriated funds meant for the war against the Boko Haram terrorism as revealed by the anti-corruption agency in the country. A theoretically-driven investigation, this essay raises some expectations within the context of good governance-propelled anti-corruption crusade, making modest recommendations as to how corruption should be prevented and combated within the confine of rule of law.

Keywords: corruption, rule of law, human rights, prosecution, commonwealth

Procedia PDF Downloads 202
1009 Caste of Women: An Inquiry into the Differences in Inter-Caste Marriages in an Adivasi Samaj

Authors: Dhiraj Kumar

Abstract:

The paper attempts to argue that the regulation of the rural lower caste woman’s life-world is at the core of the reproduction of hierarchy in an Adivasi samaj (society). It has been established in studies on caste and Adivasi that the two societies are distinct and operate through different structures, norms, rituals, beliefs, etc. This is as opposed to the colonial and certain post-independence anthropology in/of India that collapsed the two into single categories for analysis. However, how the two seemingly different social structures affect each other has attracted little attention. The paper is inspired by an action-research at Gadh-Bansla, an Adivasi village in the Kanker district of Chhattisgarh that houses different caste groups – OBCs and SCs, as well as two different Adivasi groups: Gond and Halba. The action-research, taken place across a year, has worked with six families of the different groups present (i.e., Gond, Halba, OBCs, and SCs) in which inter-caste marriages have taken place. Through in-depth interviews and free association discussions with these six families, the paper presents the ways in which the samaj and caste society have interacted. It has been observed that there is a difference in treatment in marriages between a lower caste woman marrying into an upper caste or Halba household, and an upper caste or Halba woman marrying into a lower caste household. While the upper caste woman is easily accepted into the Adivasi samaj and the husband’s family, the same does not hold true for the lower caste woman. The lower caste woman has to face humiliation through untouchability, fine on the family, or in some cases excommunication of the couple. The paper concludes with a need to use caste as a central analytic to understand gender discrimination even in Adivasi contexts.

Keywords: caste, Adivasi, Samaj, humiliation, woman

Procedia PDF Downloads 156
1008 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.

Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity

Procedia PDF Downloads 41
1007 An Intergenerational Study of Iranian Migrant Families in Australia: Exploring Language, Identity, and Acculturation

Authors: Alireza Fard Kashani

Abstract:

This study reports on the experiences and attitudes of six Iranian migrant families, from two groups of asylum seekers and skilled workers, with regard to their language, identity, and acculturation in Australia. The participants included first generation parents and 1.5-generation adolescents, who had lived in Australia for a minimum of three years. For this investigation, Mendoza’s (1984, 2016) acculturation model, as well as poststructuralist views of identity, were employed. The semi-structured interview results have highlighted that Iranian parents and adolescents face low degrees of intergenerational conflicts in most domains of their acculturation. However, the structural and lawful patterns in Australia have caused some internal conflicts for the parents, especially fathers (e.g., their power status within the family or their children’s freedom). Furthermore, while most participants reported ‘cultural eclecticism’ as their preferred acculturation orientation, female participants seemed to be more eclectic than their male counterparts who showed inclination towards keeping more aspects of their home culture. This finding, however, highlights a meaningful effort on the part of husbands that in order to make their married lives continue well in Australia they need to re-consider the traditional male-dominated customs they used to have in Iran. As for identity, not only the parents but also the adolescents proudly identified themselves as Persians. In addition, with respect to linguistic behaviour, almost all adolescents showed enthusiasm to retain the Persian language at home to be able to maintain contacts with their relatives and friends in Iran and to enjoy many other benefits the language may offer them in the future.

Keywords: acculturation, asylum seekers, identity, intergenerational conflicts, language, skilled workers, 1.5 generation

Procedia PDF Downloads 238