Search results for: user guidance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3011

Search results for: user guidance

1211 Using Analytical Hierarchy Process and TOPSIS Approaches in Designing a Finite Element Analysis Automation Program

Authors: Ming Wen, Nasim Nezamoddini

Abstract:

Sophisticated numerical simulations like finite element analysis (FEA) involve a complicated process from model setup to post-processing tasks that require replication of time-consuming steps. Utilizing FEA automation program simplifies the complexity of the involved steps while minimizing human errors in analysis set up, calculations, and results processing. One of the main challenges in designing FEA automation programs is to identify user requirements and link them to possible design alternatives. This paper presents a decision-making framework to design a Python based FEA automation program for modal analysis, frequency response analysis, and random vibration fatigue (RVF) analysis procedures. Analytical hierarchy process (AHP) and technique for order preference by similarity to ideal solution (TOPSIS) are applied to evaluate design alternatives considering the feedback received from experts and program users.

Keywords: finite element analysis, FEA, random vibration fatigue, process automation, analytical hierarchy process, AHP, TOPSIS, multiple-criteria decision-making, MCDM

Procedia PDF Downloads 113
1210 Associations between Sharing Bike Usage and Characteristics of Urban Street Built Environment in Wuhan, China

Authors: Miao Li, Mengyuan Xu

Abstract:

As a low-carbon travel mode, bicycling has drawn increasing political interest in the contemporary Chinese urban context, and the public sharing bikes have become the most popular ways of bike usage in China now. This research aims to explore the spatial-temporal relationship between sharing bike usage and different characteristics of the urban street built environment. In the research, street segments were used as the analytic unit of the street built environment defined by street intersections. The sharing bike usage data in the research include a total of 2.64 million samples that are the entire sharing bike distribution data recorded in two days in 2018 within a neighborhood of 185.4 hectares in the city of Wuhan, China. And these data are assigned to the 97 urban street segments in this area based on their geographic location. The built environment variables used in this research are categorized into three sections: 1) street design characteristics, such as street width, street greenery, types of bicycle lanes; 2) condition of other public transportation, such as the availability of metro station; 3) Street function characteristics that are described by the categories and density of the point of interest (POI) along the segments. Spatial Lag Models (SLM) were used in order to reveal the relationships of specific urban streets built environment characteristics and the likelihood of sharing bicycling usage in whole and different periods a day. The results show: 1) there is spatial autocorrelation among sharing bicycling usage of urban streets in case area in general, non-working day, working day and each period of a day, which presents a clustering pattern in the street space; 2) a statistically strong association between bike sharing usage and several different built environment characteristics such as POI density, types of bicycle lanes and street width; 3) the pattern that bike sharing usage is influenced by built environment characteristics depends on the period within a day. These findings could be useful for policymakers and urban designers to better understand the factors affecting bike sharing system and thus propose guidance and strategy for urban street planning and design in order to promote the use of sharing bikes.

Keywords: big data, sharing bike usage, spatial statistics, urban street built environment

Procedia PDF Downloads 145
1209 Placencia Belize: An Alternative to the Development of “Your Private Paradise”

Authors: Ryan Tao

Abstract:

This paper analyzes the local context and effects of tourism on Placencia in Belize to identify key environmental and social impacts. Placencia was a small, sleepy coastal fishing village at risk of losing its local identity to tourism. In the last decade, tourism has driven an economic shift from fishing to tourism. The consequence of this shift has eroded local environmental resources and diluted local cultural heritage. A key example is Harvest Caye, an island converted from a natural manatee breeding ground to a stereotypical sandy beach and palm tree resort complex. The incoming cruise ship-geared development of Harvest Caye reflects the urban tourist vision of Placencia’s local landscape, which indicates a “neo-colonial” rule. Consequently, this vision causes environmental destruction, replacing local memories of abundant manatee-filled waters. The paper will explore environmental and cultural damage from uncontrolled development by focusing on how Placencia has been affected by unmanaged tourism. It will then propose solutions to create a medium between tourism and the local community. New developments in other Belizean cities, such as Belmopan and Belize City, are planned at the time of approval to be sensitive to their setting. While Placencia is fully built out, there are opportunities to plan in advance for the future while preserving local integrity. As a consequence of time, shepherding tourist development, defining tourist areas, and planning these areas with an eye towards natural disasters (such as hurricanes) can act as a tool to craft a future vision that helps preserve the local identity of Placencia. This research will consist of personal observations, case studies, and synthesis of other source materials. These sources provide guidance for creating a framework to understand the local environment and culture and plan around it to ultimately protect Placencia from becoming “Your Private Paradise” for the rich.

Keywords: Placencia, coastal development, coastal protection, tourism, zoning, coastal zoning, Caribbean, Belize, small island developing states

Procedia PDF Downloads 14
1208 Computer-Based Model for Design Selection of Lightning Arrester for 132/33kV Substation

Authors: Uma U. Uma, Uzoechi Laz

Abstract:

Protection of equipment insulation against lightning over voltages and selection of lightning arrester that will discharge at lower voltage level than the voltage required to breakdown the electrical equipment insulation is examined. The objectives of this paper are to design a computer based model using standard equations for the selection of appropriate lightning arrester with the lowest rated surge arrester that will provide adequate protection of equipment insulation and equally have a satisfactory service life when connected to a specified line voltage in power system network. The effectiveness and non-effectiveness of the earthing system of substation determine arrester properties. MATLAB program with GUI (graphic user interphase) its subprogram is used in the development of the model for the determination of required parameters like voltage rating, impulse spark over voltage, power frequency spark over voltage, discharge current, current rating and protection level of lightning arrester of a specified voltage level of a particular line.

Keywords: lightning arrester, GUIs, MatLab program, computer based model

Procedia PDF Downloads 418
1207 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 280
1206 Teaching Research Methods at the Graduate Level Utilizing Flipped Classroom Approach; An Action Research Study

Authors: Munirah Alaboudi

Abstract:

This paper discusses a research project carried out with 12 first-year graduate students enrolled in research methods course prior to undertaking a graduate thesis during the academic year 2019. The research was designed for the objective of creating research methods course structure that embraces an individualized and activity-based approach to learning in a highly engaging group environment. This approach targeted innovating the traditional research methods lecture-based, theoretical format where students reported less engagement and limited learning. This study utilized action research methodology in developing a different approach to research methods course instruction where student performance indicators and feedback were periodically collected to assess the new teaching method. Student learning was achieved through utilizing the flipped classroom approach where students learned the material at home and classroom activities were designed to implement and experiment with the newly acquired information, with the guidance of the course instructor. Student learning in class was practiced through a series of activities based on different research methods. With the goal of encouraging student engagement, a wide range of activities was utilized including workshops, role play, mind-mapping, presentations, peer evaluations. Data was collected through an open-ended qualitative questionnaire to establish whether students were engaged in the material they were learning, and to what degree were they engaged, and to test their mastery level of the concepts discussed. Analysis of the data presented positive results as around 91% of the students reported feeling more engaged with the active learning experience and learning research by “actually doing research, not just reading about it”. The students expressed feeling invested in the process of their learning as they saw their research “gradually come to life” through peer learning and practice during workshops. Based on the results of this study, the research methods course structure was successfully remodeled and continues to be delivered.

Keywords: research methods, higher education instruction, flipped classroom, graduate education

Procedia PDF Downloads 103
1205 The OLOS® Way to Cultural Heritage: User Interface with Anthropomorphic Characteristics

Authors: Daniele Baldacci, Remo Pareschi

Abstract:

Augmented Reality and Augmented Intelligence are radically changing information technology. The path that starts from the keyboard and then, passing through milestones such as Siri, Alexa and other vocal avatars, reaches a more fluid and natural communication with computers, thus converting the dichotomy between man and machine into a harmonious interaction, now heads unequivocally towards a new IT paradigm, where holographic computing will play a key role. The OLOS® platform contributes substantially to this trend in that it infuses computers with human features, by transferring the gestures and expressions of persons of flesh and bones to anthropomorphic holographic interfaces which in turn will use them to interact with real-life humans. In fact, we could say, boldly but with a solid technological background to back the statement, that OLOS® gives reality to an altogether new entity, placed at the exact boundary between nature and technology, namely the holographic human being. Holographic humans qualify as the perfect carriers for the virtual reincarnation of characters handed down from history and tradition. Thus, they provide for an innovative and highly immersive way of experiencing our cultural heritage as something alive and pulsating in the present.

Keywords: digital cinematography, human-computer interfaces, holographic simulation, interactive museum exhibits

Procedia PDF Downloads 116
1204 Study on Empowering Youth and Adults to Overcome Mental Health Hardships Using a Web Application

Authors: Jennis Delina Giles, Nimesha Liyanage, Damindi Senadheera, Dilan Randima, Kushnara Suriyawansa

Abstract:

Mental health is essential during childhood, adolescence, and adulthood. Mental health issues can influence one's thoughts, disposition, and conduct. A record number of mental health problems are caused by a global pandemic. Prevention of mental disease is vital for both children and adults. We desired to develop a web application for those with mental health difficulties. This web application will provide group chat, discussion, a community feed, and counseling services. The community feed function provides information regarding scheduled conversation space meetings, and the counselor uploads uplifting thoughts and tales of patients who received proper care and overcame mental health issues. Community feed can filter content based on user preferences. The mental health system for adults and adolescents will be updated. The community feed delivers relevant and instructive postings, links, and images so that service recipients can benefit from other platform features and receive encouraging words to assist them in overcoming mental health difficulties.

Keywords: bio medical, mental helath care, empower youths & adults, counselling

Procedia PDF Downloads 155
1203 Improved Simultaneous Performance in the Time Domain and in the Frequency Domain

Authors: Azeddine Ghodbane, David Bensoussan, Maher Hammami

Abstract:

An innovative approach for controlling unstable and invertible systems has demonstrated superior performance compared to conventional controllers. It has been successfully applied to a levitation system and drone control. Simulations have yielded satisfactory performances when applied to a satellite antenna controller. This design method, based on sensitivity analysis, has also been extended to handle multivariable unstable and invertible systems that exhibit dominant diagonal characteristics at high frequencies, enabling decentralized control. Furthermore, this control method has been expanded to the realm of adaptive control. In this study, we introduce an alternative adaptive architecture that enhances both time and frequency performance, helpfully mitigating the effects of disturbances from the input plant and external disturbances affecting the output. To facilitate superior performance in both the time and frequency domains, we have developed user-friendly interactive design methods using the GeoGebra platform.

Keywords: control theory, decentralized control, sensitivity theory, input-output stability theory, robust multivariable feedback control design

Procedia PDF Downloads 113
1202 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model

Authors: Abdellahi Cheikh

Abstract:

With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.

Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard

Procedia PDF Downloads 93
1201 ‘Koha ILS Software’ Implementation in Academic Library Management: An Experience from University Libraries of Bangladesh

Authors: Md. Golam Mostafa

Abstract:

This paper describes the use of Koha open source library management software for information management in university libraries of Bangladesh. Manual record keeping is a time-consuming and tedious task, which may lead to errors frequently. To maintain the quality of services, any organization needs to manage with the help of a computerized system. The advent of information technology paved the way for library computerization. This paper has provided a short history as well as the present ongoing development of the library computerization system in Bangladesh, which has developed as a library management software Koha on the basis of research and development. Koha integrated library systems (ILS) software is very user friendly open source software. It refers to software in which the source code is freely available for others to view, amend, and adapt. Koha integrated library systems maintained by and used by libraries all over the world. In this context, this paper will analyze Koha library management software, which proves appropriate for the present necessities of library management in Bangladesh. At last, result from the study has been analyzed using different tables and graphs.

Keywords: Koha Open Source Software, integrated library system, RFID facilities, university libraries, Bangladesh

Procedia PDF Downloads 125
1200 Two-Level Graph Causality to Detect and Predict Random Cyber-Attacks

Authors: Van Trieu, Shouhuai Xu, Yusheng Feng

Abstract:

Tracking attack trajectories can be difficult, with limited information about the nature of the attack. Even more difficult as attack information is collected by Intrusion Detection Systems (IDSs) due to the current IDSs having some limitations in identifying malicious and anomalous traffic. Moreover, IDSs only point out the suspicious events but do not show how the events relate to each other or which event possibly cause the other event to happen. Because of this, it is important to investigate new methods capable of performing the tracking of attack trajectories task quickly with less attack information and dependency on IDSs, in order to prioritize actions during incident responses. This paper proposes a two-level graph causality framework for tracking attack trajectories in internet networks by leveraging observable malicious behaviors to detect what is the most probable attack events that can cause another event to occur in the system. Technically, given the time series of malicious events, the framework extracts events with useful features, such as attack time and port number, to apply to the conditional independent tests to detect the relationship between attack events. Using the academic datasets collected by IDSs, experimental results show that the framework can quickly detect the causal pairs that offer meaningful insights into the nature of the internet network, given only reasonable restrictions on network size and structure. Without the framework’s guidance, these insights would not be able to discover by the existing tools, such as IDSs. It would cost expert human analysts a significant time if possible. The computational results from the proposed two-level graph network model reveal the obvious pattern and trends. In fact, more than 85% of causal pairs have the average time difference between the causal and effect events in both computed and observed data within 5 minutes. This result can be used as a preventive measure against future attacks. Although the forecast may be short, from 0.24 seconds to 5 minutes, it is long enough to be used to design a prevention protocol to block those attacks.

Keywords: causality, multilevel graph, cyber-attacks, prediction

Procedia PDF Downloads 156
1199 Leveraging Quality Metrics in Voting Model Based Thread Retrieval

Authors: Atefeh Heydari, Mohammadali Tavakoli, Zuriati Ismail, Naomie Salim

Abstract:

Seeking and sharing knowledge on online forums have made them popular in recent years. Although online forums are valuable sources of information, due to variety of sources of messages, retrieving reliable threads with high quality content is an issue. Majority of the existing information retrieval systems ignore the quality of retrieved documents, particularly, in the field of thread retrieval. In this research, we present an approach that employs various quality features in order to investigate the quality of retrieved threads. Different aspects of content quality, including completeness, comprehensiveness, and politeness, are assessed using these features, which lead to finding not only textual, but also conceptual relevant threads for a user query within a forum. To analyse the influence of the features, we used an adopted version of voting model thread search as a retrieval system. We equipped it with each feature solely and also various combinations of features in turn during multiple runs. The results show that incorporating the quality features enhances the effectiveness of the utilised retrieval system significantly.

Keywords: content quality, forum search, thread retrieval, voting techniques

Procedia PDF Downloads 213
1198 Monitoring Cellular Networks Performance Using Crowd Sourced IoT System: My Operator Coverage (MOC)

Authors: Bassem Boshra Thabet, Mohammed Ibrahim Elsabagh, Mohammad Adly Talaat

Abstract:

The number of cellular mobile phone users has increased enormously worldwide over the last two decades. Consequently, the monitoring of the performance of the Mobile Network Operators (MNOs) in terms of network coverage and broadband signal strength has become vital for both of the MNOs and regulators. This monitoring helps telecommunications operators and regulators keeping the market playing fair and most beneficial for users. However, the adopted methodologies to facilitate this continuous monitoring process are still problematic regarding cost, effort, and reliability. This paper introduces My Operator Coverage (MOC) system that is using Internet of Things (IoT) concepts and tools to monitor the MNOs performance using a crowd-sourced real-time methodology. MOC produces robust and reliable geographical maps for the user-perceived quality of the MNOs performance. MOC is also meant to enrich the telecommunications regulators with concrete, and up-to-date information that allows for adequate mobile market management strategies as well as appropriate decision making.

Keywords: mobile performance monitoring, crowd-sourced applications, mobile broadband performance, cellular networks monitoring

Procedia PDF Downloads 396
1197 3D Microscopy, Image Processing, and Analysis of Lymphangiogenesis in Biological Models

Authors: Thomas Louis, Irina Primac, Florent Morfoisse, Tania Durre, Silvia Blacher, Agnes Noel

Abstract:

In vitro and in vivo lymphangiogenesis assays are essential for the identification of potential lymphangiogenic agents and the screening of pharmacological inhibitors. In the present study, we analyse three biological models: in vitro lymphatic endothelial cell spheroids, in vivo ear sponge assay, and in vivo lymph node colonisation by tumour cells. These assays provide suitable 3D models to test pro- and anti-lymphangiogenic factors or drugs. 3D images were acquired by confocal laser scanning and light sheet fluorescence microscopy. Virtual scan microscopy followed by 3D reconstruction by image aligning methods was also used to obtain 3D images of whole large sponge and ganglion samples. 3D reconstruction, image segmentation, skeletonisation, and other image processing algorithms are described. Fixed and time-lapse imaging techniques are used to analyse lymphatic endothelial cell spheroids behaviour. The study of cell spatial distribution in spheroid models enables to detect interactions between cells and to identify invasion hierarchy and guidance patterns. Global measurements such as volume, length, and density of lymphatic vessels are measured in both in vivo models. Branching density and tortuosity evaluation are also proposed to determine structure complexity. Those properties combined with vessel spatial distribution are evaluated in order to determine lymphangiogenesis extent. Lymphatic endothelial cell invasion and lymphangiogenesis were evaluated under various experimental conditions. The comparison of these conditions enables to identify lymphangiogenic agents and to better comprehend their roles in the lymphangiogenesis process. The proposed methodology is validated by its application on the three presented models.

Keywords: 3D image segmentation, 3D image skeletonisation, cell invasion, confocal microscopy, ear sponges, light sheet microscopy, lymph nodes, lymphangiogenesis, spheroids

Procedia PDF Downloads 379
1196 A Neuron Model of Facial Recognition and Detection of an Authorized Entity Using Machine Learning System

Authors: J. K. Adedeji, M. O. Oyekanmi

Abstract:

This paper has critically examined the use of Machine Learning procedures in curbing unauthorized access into valuable areas of an organization. The use of passwords, pin codes, user’s identification in recent times has been partially successful in curbing crimes involving identities, hence the need for the design of a system which incorporates biometric characteristics such as DNA and pattern recognition of variations in facial expressions. The facial model used is the OpenCV library which is based on the use of certain physiological features, the Raspberry Pi 3 module is used to compile the OpenCV library, which extracts and stores the detected faces into the datasets directory through the use of camera. The model is trained with 50 epoch run in the database and recognized by the Local Binary Pattern Histogram (LBPH) recognizer contained in the OpenCV. The training algorithm used by the neural network is back propagation coded using python algorithmic language with 200 epoch runs to identify specific resemblance in the exclusive OR (XOR) output neurons. The research however confirmed that physiological parameters are better effective measures to curb crimes relating to identities.

Keywords: biometric characters, facial recognition, neural network, OpenCV

Procedia PDF Downloads 256
1195 Adaptation Mechanism and Planning Response to Resiliency Shrinking of Small Towns Based on Complex Adaptive System by Taking Wuhan as an Example

Authors: Yanqun Li, Hong Geng

Abstract:

The rapid urbanization process taking big cities as the main body leads to the unequal configuration of urban and rural areas in the aspects of land supply, industrial division of labor, service supply and space allocation, and induces the shrinking characterization of service energy, industrial system and population vitality in small towns. As an important spatial unit in the spectrum of urbanization that serves, connects and couples urban and rural areas, the shrinking phenomenon faced by small towns has an important influence on the healthy development of urbanization. Based on the census of small towns in Wuhan metropolitan area, we have found that the shrinking of small towns is a passive contraction of elastic tension under the squeeze in cities. Once affected by the external forces such as policy regulation, planning guidance, and population return, small towns will achieve expansion and growth. Based on the theory of complex adaptive systems, this paper comprehensively constructs the development index evaluation system of small towns from five aspects of population, economy, space, society and ecology, measures the shrinking level of small towns, further analyzes the shrinking characteristics of small towns, and identifies whether the shrinking is elastic or not. And then this paper measures the resilience ability index of small town contract from the above-mentioned five aspects. Finally, this paper proposes an adaptive mechanism of urban-rural interaction evolution under fine division of labor to response the passive shrinking in small towns of Wuhan. Based on the above, the paper creatively puts forward the planning response measures of the small towns on the aspects of spatial layout, function orientation and service support, which can provide reference for other regions.

Keywords: complex adaptive systems, resiliency shrinking, adaptation mechanism, planning response

Procedia PDF Downloads 124
1194 A Case Study: Community Forestry in Nepal: Achievements and Challenges

Authors: Bhmika Raiu

Abstract:

The community forestry programme in Nepal officially started in the late 1970s. Since then concerning movement has been evolving to involve local communities in the management and utilization of forests. The policy of the government was originally intended to meet the basic forest products required by the communities through active participation in forest development and management. Later, it was expanded to include the mobilization and empowerment of the members of community forest user groups in the development of their local communities. It was observed that the trend of forest degradation has decreased since the handing over of national forests to local communities, but a number of unintended social anomalies have also cropped up. Such anomalies essentially constitute of the inequity and unfairness in the local and national level and in terms of long-term sustainability of forest resources. This paper provides an overview of various issues of community forestry, especially focusing on the major achievements made in community forestry. It calls for rethinking the community forestry programme in order to face the present day challenges of linking community forestry with livelihood promotion, good governance, and sustainable forest management. It also lays out strategies for reforms in community forestry.

Keywords: community forest, livelihood promotion, challenges, achievements

Procedia PDF Downloads 378
1193 Motor Controller Implementation Using Model Based Design

Authors: Cau Tran, Tu Nguyen, Tien Pham

Abstract:

Model-based design (MBD) is a mathematical and visual technique for addressing design issues in the fields of communications, signal processing, and complicated control systems. It is utilized in several automotive, aerospace, industrial, and motion control applications. Virtual models are at the center of the software development process with model based design. A method used in the creation of embedded software is model-based design. In this study, the LAT motor is modeled in a simulation environment, and the LAT motor control is designed with a cascade structure, a speed and current control loop, and a controller that is used in the next part. A PID structure serves as this controller. Based on techniques and motor parameters that match the design goals, the PID controller is created for the model using traditional design principles. The MBD approach will be used to build embedded software for motor control. The paper will be divided into three distinct sections. The first section will introduce the design process and the benefits and drawbacks of the MBD technique. The design of control software for LAT motors will be the main topic of the next section. The experiment's results are the subject of the last section.

Keywords: model based design, limited angle torque, intellectual property core, hardware description language, controller area network, user datagram protocol

Procedia PDF Downloads 94
1192 Influencing Factors of School Enterprise Cooperation: An Exploratory Study in Chinese Vocational Nursing Education

Authors: Xiao Chen, Alice Ho, Mabel Tie, Xiaoheng Xu

Abstract:

Background and Significance of the Study: School-enterprise cooperation has been the cornerstone of vocational education in China and many other countries. Researchers and policymakers have paid much attention to ensuring the implementation and improving the quality of school-enterprise cooperation. However, many problems still exist on the implementation level of the cooperation. On the one hand, the enterprises lack the motivation to participate in the cooperation. On the other hand, there is a lack of effective guidance and management during the cooperation. Furthermore, the current literature focuses greatly on policy recommendations on the national level while failing to provide a detailed practical understanding of how school-enterprise cooperation is carried out on the ground level. With emerging social problems, such as the aging population in China, there is an increasing need for diverse nursing services and better nursing quality. Methodology: To gain a deeper understanding of the influencing factors of the implementation of school-enterprise cooperation, this work conducted 37 exploratory interviews in four Chinese cities spanning first-tier to fourth-tier cities with hospital department directors, vocational school deans, nurses, and vocational students. Multiple critical policy documents that founded the current vocational education system in China were analyzed, along with the data collected from the interviews. Major Findings: Based on the policy and interview analyses, this work reveals a set of influencing factors for school-enterprise cooperation implementation. Findings from each region contribute to an overall model of influencing factors for implementing school-enterprise cooperation in vocational nursing education in China, which leads to practical insights for policy recommendation. The key influencing factors are found based on the policy, hospital, school, and social levels. Following practical policy recommendations were presented. Moving forward, further research on the implementation of school-enterprise cooperation in specific industries will become increasingly critical to improving the effectiveness of educational policies and the quality of vocational education.

Keywords: nursing, policy recommendation, school-enterprise cooperation, vocational education

Procedia PDF Downloads 116
1191 Integrated Grey Rational Analysis-Standard Deviation Method for Handover in Heterogeneous Networks

Authors: Mohanad Alhabo, Naveed Nawaz, Mahmoud Al-Faris

Abstract:

The dense deployment of small cells is a promising solution to enhance the coverage and capacity of the heterogeneous networks (HetNets). However, the unplanned deployment could bring new challenges to the network ranging from interference, unnecessary handovers and handover failures. This will cause a degradation in the quality of service (QoS) delivered to the end user. In this paper, we propose an integrated Grey Rational Analysis Standard Deviation based handover method (GRA-SD) for HetNet. The proposed method integrates the Standard Deviation (SD) technique to acquire the weight of the handover metrics and the GRA method to select the best handover base station. The performance of the GRA-SD method is evaluated and compared with the traditional Multiple Attribute Decision Making (MADM) methods including Simple Additive Weighting (SAW) and VIKOR methods. Results reveal that the proposed method has outperformed the other methods in terms of minimizing the number of frequent unnecessary handovers and handover failures, in addition to improving the energy efficiency.

Keywords: energy efficiency, handover, HetNets, MADM, small cells

Procedia PDF Downloads 116
1190 Directivity in the Dramatherapeutic Process for People with Addictive Behaviour

Authors: Jakub Vávra, Milan Valenta, Petr Kosek

Abstract:

This article presents a perspective on the conduct of the dramatherapy process with persons with addictive behaviours with regard to the directiveness of the process. Although drama therapy as one of the creative arts approaches is rather non-directive in nature, depending on the clientele, there may be a need to structure the process more and, depending on the needs of the clients, to guide the process more directive. The specificity for people with addictive behaviours is discussed through the prism of the dramatherapeutic perspective, where we can find both a psychotherapeutic component as well as a component touching on expression and art, which is rather non-directive in nature. Within the context of practice with clients, this theme has repeatedly emerged and dramatherapists themselves have sought to find ways of coping with clients' demands and needs for structure and guidance within the dramatherapy process. Some of the outcomes from the supervision work also guided the research. Based on this insight, the research questions were approached. The first research question asks: in what ways is directive in dramatherapy manifested and manifested in the process? The second research question then complements the first and asks: to which phenomena are directivity in dramatherapy linked? In relation to the research questions, data were collected using focus groups and field notes. The qualitative approach of Content analysis and Relational analysis was chosen as the methodology. For analyzing qualitative research, we chose an Inductive coding scheme: Open coding, Axial coding, Pattern matching, Member checking, and Creating a coding scheme. In the presented partial research results, we find recurrent schemes related to directive coding in drama therapy. As an important element, directive leadership emerges in connection with safety for the client group, then in connection with the clients' order and also the department of the facility, and last but not least, to the personality of the drama therapist. By careful analysis and looking for patterns in the research results, we can see connections that are impossible to interpret at this stage but already provide clues to our understanding of the topic and open up further avenues for research in this area.

Keywords: dramatherapy, directivity, personal approach, aims of dramatherapy process, safetyness

Procedia PDF Downloads 69
1189 Renovating Language Laboratories for Pedagogical and Technological Advancements in the New Era

Authors: Paul Lam, Chi Him Chan, Alan Tse

Abstract:

Language laboratories have been widely used in language learning, starting in the middle of the last century as one of the earliest forms of educational technology. They are designed to assist students’ language learning with technological innovations. Traditional language laboratories provide individual workstations that allow students to access multimedia language resources. In this type of facility, students can train their listening and speaking abilities, and teachers can also assess the performance of an individual student. Although such a setting promotes a student-centered pedagogy by encouraging students to work at their own pace and according to their own needs, it still favours a traditional, behaviourist language learning pedagogy which focuses on repetitive drilling. The change of pedagogies poses challenges to both the teachers and the facilities. The peer-learning pedagogy advocates that language learning should focus on the social aspect, which emphasizes the importance of everyday communication in language learning. The self-access, individual workstation language laboratories may not be able to provide the flexibility for interaction in the new pedagogies. Modern advancement in technology is another factor that drove our language laboratory renovation. In particular, mobile and wireless technology enabled the use of smaller and more flexible devices, making possible much clever use of space. The Chinese University of Hong Kong (CUHK) renovated nine existing language laboratories to provide lighter and more advanced equipment, movable tables, and round desks. These facilities allow more flexibility and encourage students’ interaction. It is believed that the renovated language laboratories can serve different peer learning activities and thus support peer-learning pedagogies in language teaching and learning. A survey has been conducted to collect comments from the teachers who have used the renovated language laboratories and received forty-four response. The teachers’ comments reveal that they experienced different challenges in using the renovated language laboratories, and there is a need to provide guidance to teachers during the technological and pedagogical transition. For example, teachers need instruction on using the newly installed devices such as touch-monitor and visualizer. They also need advice on planning new teaching and learning activities. Nevertheless, teachers appreciated that the renovated language laboratories are flexible and provide more spaces for different learning activities.

Keywords: language laboratories, language learning, peer-learning, student interaction

Procedia PDF Downloads 107
1188 A Survey on Requirements and Challenges of Internet Protocol Television Service over Software Defined Networking

Authors: Esmeralda Hysenbelliu

Abstract:

Over the last years, the demand for high bandwidth services, such as live (IPTV Service) and on-demand video streaming, steadily and rapidly increased. It has been predicted that video traffic (IPTV, VoD, and WEB TV) will account more than 90% of global Internet Protocol traffic that will cross the globe in 2016. Consequently, the importance and consideration on requirements and challenges of service providers faced today in supporting user’s requests for entertainment video across the various IPTV services through virtualization over Software Defined Networks (SDN), is tremendous in the highest stage of attention. What is necessarily required, is to deliver optimized live and on-demand services like Internet Protocol Service (IPTV Service) with low cost and good quality by strictly fulfill the essential requirements of Clients and ISP’s (Internet Service Provider’s) in the same time. The aim of this study is to present an overview of the important requirements and challenges of IPTV service with two network trends on solving challenges through virtualization (SDN and Network Function Virtualization). This paper provides an overview of researches published in the last five years.

Keywords: challenges, IPTV service, requirements, software defined networking (SDN)

Procedia PDF Downloads 271
1187 Like Life Itself: Elemental Affordances in the Creation of Transmedia Storyworlds-The Four Broken Hearts Case Study

Authors: Muhammad Babar Suleman

Abstract:

Transgressing the boundaries of the real and the virtual, the temporal and the spatial and the personal and the political, Four Broken Hearts is a hybrid storyworld encompassing film, live performance, location-based experiences and social media. The project is scheduled for launch early next year and is currently a work-in-progress undergoing initial user testing. The story of Four Broken Hearts is being told by taking each of the classic elements of fiction- character, setting, exposition, climax and denouement - and bringing them ‘to life’ in the medium that conveys them to the highest degree of mimesis: Characters are built and explored through social media, Setting is experienced through location-based storytelling, the Backstory is fleshed out using film and the Climax is performed as an immersive drama. By taking advantage of what each medium does best while complementing the other mediums, Four Broken Hearts is presented in the form of a rich transmedia experience that allows audiences to explore the story world across many different platforms while still tying it all together within a cohesive narrative. This article presents an investigation of the project’s narrative outputs produced so far.

Keywords: narratology, storyworld, transmedia, narrative, storytelling

Procedia PDF Downloads 312
1186 Shariah Compliance Space Planning for Hotel Room Design

Authors: Syaza Bt. Saifuddin, Rashidi Bin Othman, Muhammad Hafizuddin Akmal Bin Md Hashim, Ismail Bin Jasmani, Noor Hanita Bt. Abdul Majid

Abstract:

This paper illustrates the background of various concepts, approaches, terminologies used to describe the basic framework of an Islamic Hotel Room design. This paper reviews the theoretical views in establishing a suitable and optimum environment for Muslim as well as non-Muslim guests in hotel rooms while according to shariah. It involves a few research methodologies that requires the researcher to study on a few characteristics needed to create more efficient rooms in terms of social interaction, economic growth and other tolerable elements. This paper intends on revealing the elements that are vital and may contribute for hotels in achieving a more conclusive research on space planning for hotel rooms focusing on the shariah and Muslim guests. Malaysia is an Islamic country and has billion of tourists coming over for business and recreational purposes. Therefore, having a righteous environment that best suit this target user is important in terms of generating the economy as well as providing a better understanding to the community on the benefits of applying these qualities in a conventional resort design.

Keywords: design, Islam, room, shariah compliant hotel

Procedia PDF Downloads 348
1185 Graph Based Traffic Analysis and Delay Prediction Using a Custom Built Dataset

Authors: Gabriele Borg, Alexei Debono, Charlie Abela

Abstract:

There on a constant rise in the availability of high volumes of data gathered from multiple sources, resulting in an abundance of unprocessed information that can be used to monitor patterns and trends in user behaviour. Similarly, year after year, Malta is also constantly experiencing ongoing population growth and an increase in mobilization demand. This research takes advantage of data which is continuously being sourced and converting it into useful information related to the traffic problem on the Maltese roads. The scope of this paper is to provide a methodology to create a custom dataset (MalTra - Malta Traffic) compiled from multiple participants from various locations across the island to identify the most common routes taken to expose the main areas of activity. This use of big data is seen being used in various technologies and is referred to as ITSs (Intelligent Transportation Systems), which has been concluded that there is significant potential in utilising such sources of data on a nationwide scale. Furthermore, a series of traffic prediction graph neural network models are conducted to compare MalTra to large-scale traffic datasets.

Keywords: graph neural networks, traffic management, big data, mobile data patterns

Procedia PDF Downloads 131
1184 Integrating Distributed Architectures in Highly Modular Reinforcement Learning Libraries

Authors: Albert Bou, Sebastian Dittert, Gianni de Fabritiis

Abstract:

Advancing reinforcement learning (RL) requires tools that are flexible enough to easily prototype new methods while avoiding impractically slow experimental turnaround times. To match the first requirement, the most popular RL libraries advocate for highly modular agent composability, which facilitates experimentation and development. To solve challenging environments within reasonable time frames, scaling RL to large sampling and computing resources has proved a successful strategy. However, this capability has been so far difficult to combine with modularity. In this work, we explore design choices to allow agent composability both at a local and distributed level of execution. We propose a versatile approach that allows the definition of RL agents at different scales through independent, reusable components. We demonstrate experimentally that our design choices allow us to reproduce classical benchmarks, explore multiple distributed architectures, and solve novel and complex environments while giving full control to the user in the agent definition and training scheme definition. We believe this work can provide useful insights to the next generation of RL libraries.

Keywords: deep reinforcement learning, Python, PyTorch, distributed training, modularity, library

Procedia PDF Downloads 83
1183 Analysis of Importance of Culture in Distributed Design Based on the Case Study at the University of Strathclyde

Authors: Zixuan Yang

Abstract:

This paper presents an analysis of the necessary consideration culture in distributed design through a thorough literature review and case study. The literature review has identified that the need for understanding cultural differences in product design and user evaluations is highlighted by analyzing cross-cultural influences; culture plays a significant role in distributed work, particularly in establishing team cohesion, trust, and credibility early in the project. By applying approaches of Geert Hofstede's dimensions and Fukuyama's trust analysis, a case study of a global design project, i.e., multicultural distributed teamwork solving the problem in terms of reducing the risk of deep vein thrombosis, showcases cultural dynamics, emphasizing trust-building and decision-making. The lessons learned emphasized the importance of cultural awareness, adaptability, and the utilization of scientific theories to enable effective cross-cultural collaborations in global design, providing valuable insights into navigating cultural diversity within design practices.

Keywords: culture, distributed design, global design, Geert Hofstede's dimensions, Fukuyama's trust analysis

Procedia PDF Downloads 69
1182 Urban Big Data: An Experimental Approach to Building-Value Estimation Using Web-Based Data

Authors: Sun-Young Jang, Sung-Ah Kim, Dongyoun Shin

Abstract:

Current real-estate value estimation, difficult for laymen, usually is performed by specialists. This paper presents an automated estimation process based on big data and machine-learning technology that calculates influences of building conditions on real-estate price measurement. The present study analyzed actual building sales sample data for Nonhyeon-dong, Gangnam-gu, Seoul, Korea, measuring the major influencing factors among the various building conditions. Further to that analysis, a prediction model was established and applied using RapidMiner Studio, a graphical user interface (GUI)-based tool for derivation of machine-learning prototypes. The prediction model is formulated by reference to previous examples. When new examples are applied, it analyses and predicts accordingly. The analysis process discerns the crucial factors effecting price increases by calculation of weighted values. The model was verified, and its accuracy determined, by comparing its predicted values with actual price increases.

Keywords: apartment complex, big data, life-cycle building value analysis, machine learning

Procedia PDF Downloads 374