Search results for: software development process
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30767

Search results for: software development process

12377 Utility Assessment Model for Wireless Technology in Construction

Authors: Yassir AbdelRazig, Amine Ghanem

Abstract:

Construction projects are information intensive in nature and involve many activities that are related to each other. Wireless technologies can be used to improve the accuracy and timeliness of data collected from construction sites and shares it with appropriate parties. Nonetheless, the construction industry tends to be conservative and shows hesitation to adopt new technologies. A main concern for owners, contractors or any person in charge on a job site is the cost of the technology in question. Wireless technologies are not cheap. There are a lot of expenses to be taken into consideration, and a study should be completed to make sure that the importance and savings resulting from the usage of this technology is worth the expenses. This research attempts to assess the effectiveness of using the appropriate wireless technologies based on criteria such as performance, reliability, and risk. The assessment is based on a utility function model that breaks down the selection issue into alternatives attribute. Then the attributes are assigned weights and single attributes are measured. Finally, single attribute are combined to develop one single aggregate utility index for each alternative.

Keywords: analytic hierarchy process, decision theory, utility function, wireless technologies

Procedia PDF Downloads 342
12376 Studying the Function of Green Belt around the Metropolises

Authors: Soroush Mokallaei

Abstract:

Since ancient times, urbanization engineers have always thought of creating green spaces along with urbanization. Athens and Rome have attempted to construct public gardens around streets and palaces. Since then developing green space has become a part of urban civilization. In medieval ages, all Western cities had palaces and houses with internal gardens. In different sources green belt is defined as a green band of trees and bushes around the cities which has multiple functions. It is said that green belts are not only around the mountains, cities, and rivers but also around houses, subways, and highways. Constructing green belt around cities has different advantages such as: protecting cities against pollution, purifying air, screening dust, being a place for recreation, buffer zone of city internal lands, confronting the phenomenon of heat island, increasing agricultural products, helping to prevent illegal city development, confronting deforestation, preventing flood and increasing subterranean water resources.

Keywords: environment, garden cities, green belt, metropolises

Procedia PDF Downloads 328
12375 The Social Impact of Religion on New Immigrants: A Case Study of Christianity Among Chinese Immigrants in New Zealand

Authors: Ziwen Wang

Abstract:

There are close links between religion and migration. As newcomers to a foreign nation, new immigrants endured many pressures and challenges. Religion can be an important part of a migrant’s personal identity, and religious communities can offer valued connections and relationships. During the migration process, religion can undergo significant changes as migrants travel across geographical and cultural gaps and as they face new opportunities or new constraints. For those migrants who are not religious, during this unsettling time, people might become sensitive to the "sacredness", accepting its guidance, and occasionally contemplating religious conversion. This research examines the role of faith and the church in supporting new Chinese immigrants from the perspective of the social function of Christianity, utilizing Chinese immigrants in New Zealand as a case study. Through participant observation in four Chinese churches and over seventy semi-structured interviews, this research illustrates how religion has provided them with a haven and how the church provides indispensable material, spiritual, and informational resources essential for their adaptation to life in New Zealand.

Keywords: migration and religion, overseas chinese, religious capital, christianity

Procedia PDF Downloads 83
12374 Surface Sterilization Of Aquatic Plant, Cryptocoryne affinis by Using Clorox and Mercury Chloride

Authors: Sridevi Devadas

Abstract:

This study was aimed to examine the combination efficiency of Clorox (5.25% Sodium Hypochlorite) and mercury chloride (HgCl2) as a reagent for surface sterilization process of aquatic plant and cryptocoryne affinis (C. affinis). The treatment applied 10% of the Clorox and 0.1ppm of mercury chloride. The maximum exposure time for clorox and mercury chloride was 10min and 60sec respectively. After exposed to the treatments protocols (T1-T15) the explants were transferred to culture room under control temperature at 25°C ± 2°C and subjected to 16 hours fluorescence light (2000 lumens) for 30 days. The both sterilizing agents were not applied on control specimens. Upon analysis, The result indicates all of the treatments protocols produced sterile explants at range of minimum 1.5 ± 0.7 (30%) to maximum 5.0 ± 0.0 (100%). Meanwhile, maximum 1.0 ± 0.7 numbers of leaves and 1.4 ± 0.6 numbers of roots have been produced. The optimized exposure time was 0 to 15 min for Clorox and 30 sec for HgCl2 whereby 90% to 100% sterilization was archived at this condition.

Keywords: Cryptocoryne affinis, surface sterilization, tissue culture, clorox, mercury chloride

Procedia PDF Downloads 380
12373 Measuring Technology of Airship Propeller Thrust and Torque in China Academy of Aerospace Aerodynamics

Authors: Ma Hongqiang, Yang Hui, Wen Haoju, Feng Jiabo, Bi Zhixian, Nie Ying

Abstract:

In order to measure thrust and torque of airship propeller, a two-component balance and data acquisition system was developed in China Academy of Aerospace Aerodynamics(CAAA) in early time. During the development, some problems were encountered. At first, the measuring system and its protective parts made the weight of whole system increase significantly. Secondly, more parts might induce more failures, so the reliability of the system was decreased. In addition, the rigidity of the system was lowered, and the structure was more possible to vibrate. Therefore, CAAA and the Academy of Opto-Electronics, Chinese Academy of Science(AOECAS) developed a new technology, use the propeller supporting rack as a spring element, attach strain gages onto it, sum up as a generalized balance. And new math models, new calibration methods and new load determining methods were developed.

Keywords: airship, propeller, thrust and torque, flight test

Procedia PDF Downloads 356
12372 The Influence of Parenting Patterns on Adolescent Deliquincy

Authors: Salsabila Rizka Pratama

Abstract:

In this day and age, delinquency has become common to young children, and it is a violation of the norms, and legal systems of a society that are carried out during adolescenceIt is the transition from childhood to adulthood. PerversionYouth from criminal law are a common problem among adolescents in homes, schools, and communities. Without proper treatment, delinquency can turn into a crime and is likely to send a child to prison. If dug deeper, the development of delinquency is strongly influenced by family and community life. Families play an important role in the prevention of delinquency. One way a family can help prevent delinquency is by using the proper upbringing. The upbringing that parents use affects children's behavior. Improper parenting can lead to delinquency. On the other hand, proper parenting will prevent delinquency. But delinquency is not influenced only by parental upbringing, the appearance of delinquency can be influenced by the environment, religion, economic factors, information technology factors.

Keywords: parenting, parents, juvenile delinquency, family, youth, crime, environment, religion, economy, information technology

Procedia PDF Downloads 154
12371 Mechanical Properties of Organic Polymer and Exfoliated Graphite Reinforced Bacteria Cellulose Paper

Authors: T. Thompson, E. F. Zegeye

Abstract:

Bacterial Cellulose (BC) is a structural organic compound produced in the anaerobic process. This material can be a useful eco-friendly substitute for commercial textiles that are used in industries today. BC is easily and sustainably produced and has the capabilities to be used as a replacement in textiles. However, BC is extremely fragile when it completely dries. This research was conducted to improve the mechanical properties of the BC by reinforcing with an organic polymer and exfoliated graphite (EG). The BC films were grown over a period of weeks in a green tea and kombucha solution at 30 °C, then cleaned and added to an enhancing solution. The enhancing solutions were a mixture of 2.5 wt% polymer and 2.5 wt% latex solution, a 5 wt% polymer solution, a 0.20 wt% graphite solution and were each allowed to sit in a furnace for 48 h at 50 °C. Tensile test samples were prepared and tested until fracture at a strain rate of 8 mm/min. From the research with the addition of a 5 wt% polymer solution, the flexibility of the BC has significantly improved with the maximum strain significantly larger than that of the base sample. The addition of EG has also increased the modulus of elasticity of the BC by about 25%.

Keywords: bacterial cellulose, exfoliated graphite, kombucha scoby, tensile test

Procedia PDF Downloads 117
12370 Implementation of a Virtual Testbed for Secure IoT Firmware Update Using Blockchain

Authors: Tarun Chand, Michael Jurczyk

Abstract:

With the increasing need and popularity of IoT devices and how integrated they are becoming in our daily lives and industries, these devices make for a very lucrative target for malicious actors. And since these devices have such limited resources, the implementation of robust security features is a tradeoff to be made for the actual functionality the device was intended for. This makes them an easy target with high returns. Several frameworks for the secure firmware update of these devices have been recently proposed in the literature. They focus on methods such as blockchains and distributed file systems to secure firmware updates, but do not go into the details of the actual implementation of these frameworks and the lower-level interactions among these methods used. This work integrates some of these security measures into one overall framework and details the actual lower-level implementation of this framework in a virtual dockerized testbed running on AWS.

Keywords: blockchain, Ethereum, Geth, IPFS, secure IoT-firmware update, virtual testbed development

Procedia PDF Downloads 67
12369 Development of Risk Management System for Urban Railroad Underground Structures and Surrounding Ground

Authors: Y. K. Park, B. K. Kim, J. W. Lee, S. J. Lee

Abstract:

To assess the risk of the underground structures and surrounding ground, we collect basic data by the engineering method of measurement, exploration and surveys and, derive the risk through proper analysis and each assessment for urban railroad underground structures and surrounding ground including station inflow. Basic data are obtained by the fiber-optic sensors, MEMS sensors, water quantity/quality sensors, tunnel scanner, ground penetrating radar, light weight deflectometer, and are evaluated if they are more than the proper value or not. Based on these data, we analyze the risk level of urban railroad underground structures and surrounding ground. And we develop the risk management system to manage efficiently these data and to support a convenient interface environment at input/output of data.

Keywords: urban railroad, underground structures, ground subsidence, station inflow, risk

Procedia PDF Downloads 336
12368 Mechanical Properties of D2 Tool Steel Cryogenically Treated Using Controllable Cooling

Authors: A. Rabin, G. Mazor, I. Ladizhenski, R. Shneck, Z.

Abstract:

The hardness and hardenability of AISI D2 cold work tool steel with conventional quenching (CQ), deep cryogenic quenching (DCQ) and rapid deep cryogenic quenching heat treatments caused by temporary porous coating based on magnesium sulfate was investigated. Each of the cooling processes was examined from the perspective of the full process efficiency, heat flux in the austenite-martensite transformation range followed by characterization of the temporary porous layer made of magnesium sulfate using confocal laser scanning microscopy (CLSM), surface and core hardness and hardenability using Vickr’s hardness technique. The results show that the cooling rate (CR) at the austenite-martensite transformation range have a high influence on the hardness of the studied steel.

Keywords: AISI D2, controllable cooling, magnesium sulfate coating, rapid cryogenic heat treatment, temporary porous layer

Procedia PDF Downloads 137
12367 Application of Multilinear Regression Analysis for Prediction of Synthetic Shear Wave Velocity Logs in Upper Assam Basin

Authors: Triveni Gogoi, Rima Chatterjee

Abstract:

Shear wave velocity (Vs) estimation is an important approach in the seismic exploration and characterization of a hydrocarbon reservoir. There are varying methods for prediction of S-wave velocity, if recorded S-wave log is not available. But all the available methods for Vs prediction are empirical mathematical models. Shear wave velocity can be estimated using P-wave velocity by applying Castagna’s equation, which is the most common approach. The constants used in Castagna’s equation vary for different lithologies and geological set-ups. In this study, multiple regression analysis has been used for estimation of S-wave velocity. The EMERGE module from Hampson-Russel software has been used here for generation of S-wave log. Both single attribute and multi attributes analysis have been carried out for generation of synthetic S-wave log in Upper Assam basin. Upper Assam basin situated in North Eastern India is one of the most important petroleum provinces of India. The present study was carried out using four wells of the study area. Out of these wells, S-wave velocity was available for three wells. The main objective of the present study is a prediction of shear wave velocities for wells where S-wave velocity information is not available. The three wells having S-wave velocity were first used to test the reliability of the method and the generated S-wave log was compared with actual S-wave log. Single attribute analysis has been carried out for these three wells within the depth range 1700-2100m, which corresponds to Barail group of Oligocene age. The Barail Group is the main target zone in this study, which is the primary producing reservoir of the basin. A system generated list of attributes with varying degrees of correlation appeared and the attribute with the highest correlation was concerned for the single attribute analysis. Crossplot between the attributes shows the variation of points from line of best fit. The final result of the analysis was compared with the available S-wave log, which shows a good visual fit with a correlation of 72%. Next multi-attribute analysis has been carried out for the same data using all the wells within the same analysis window. A high correlation of 85% has been observed between the output log from the analysis and the recorded S-wave. The almost perfect fit between the synthetic S-wave and the recorded S-wave log validates the reliability of the method. For further authentication, the generated S-wave data from the wells have been tied to the seismic and correlated them. Synthetic share wave log has been generated for the well M2 where S-wave is not available and it shows a good correlation with the seismic. Neutron porosity, density, AI and P-wave velocity are proved to be the most significant variables in this statistical method for S-wave generation. Multilinear regression method thus can be considered as a reliable technique for generation of shear wave velocity log in this study.

Keywords: Castagna's equation, multi linear regression, multi attribute analysis, shear wave logs

Procedia PDF Downloads 229
12366 The Influence of Gender on Itraconazole Pharmacokinetic Parameters in Healthy Adults

Authors: Milijana N. Miljkovic, Viktorija M. Dragojevic-Simic, Nemanja K. Rancic, Vesna M. Jacevic, Snezana B. Djordjevic, Momir M. Mikov, Aleksandra M. Kovacevic

Abstract:

Itraconazole (ITZ) is a weak base and extremely lipophilic compound, with water solubility as a rate-limiting step in its absorption from the gastrointestinal tract. Its absolute bioavailability, about 55%, is maximal when its oral formulation, capsules, are taken immediately after a full meal. Peak plasma concentrations (Cmax) are reached within 2 to 5 hrs after their administration. ITZ undergoes extensive hepatic metabolism by human CYP3A4 isoenzyme and more than 30 different metabolites have been identified. One of the main ones is hydroxyitraconazole (HITZ), in which plasma concentrations are almost twice higher than those of ITZ. Gender differences in drug PK (Pharmacokinetics) have already been recognized, but variations in metabolism are believed to be their major cause. The aim of the study was to investigate the influence of gender on ITZ PK parameters after administration of oral capsule formulation, following 100 mg single dosing in healthy adult volunteers under fed conditions. The single-center, open-label PK study was performed. PK analyses included PK parameters obtained after a single 100 mg dose administration of itraconazole capsules to 48 females and 66 males. Blood samples were collected at pre-dose and up to 72.0 h after administration (1.0, 2.0, 3.0, 3.5, 4.0, 4.5, 5.0, 5.5, 6.0, 7.0, 9.0, 12.0, 24.0, 36.0 and 72.0 hrs). The calculated pharmacokinetic parameters, based on the plasma concentrations of itraconazole and hydroxyitraconazole, were Cmax, AUClast, and AUCtot. Plasma concentrations of ITZ and HITZ were determined using a validated liquid chromatographic method with mass spectrometric detection, while pharmacokinetic parameters were estimated using non-compartmental methods. The pharmacokinetic analyses were performed using Kinetica software version 5.0. The mean value of ITZ Cmaxmen was 74.79 ng/ml, and Cmaxwomen was 51.291 ng/ml (independent samples test; p = 0.005). Hydroxyitraconazole had a mean value of Cmaxmen 106.37 ng/ml, and the mean value Cmaxwomen was 70.05 ng/ml. Women had, on average, lower AUClast and Cmax than men. AUClastmen for ITZ was 736.02 ng/mL*h and AUClastwomen was 566.62 ng/mL*h, while AUClastmen for HITZ was 1154.80 was ng/mL*h and AUClastwomen for HITZ was 708.12 ng/mL*h (independent samples test; p = 0.033). The mean values of ITZ AUCtotmen were 884.73 ng/mL*h and AUCtotwomen was 685.10 ng/mL*h. AUCtotmen for HITZ was 1290.41 ng/mL*h, while AUCtotwomen for HIZT was 788.60 ng/mL*h (p < 0.001). The results could point out to lower oral bioavailability of ITZ in women, since values of Cmax, AUClast, and AUCtot of both ITZ and HITZ were significantly lower in women than in men, respectively. The reason may be higher expression and activity of CYP3A4 in women than in men, but there also may be differences in other PK parameters. High variability of both ITZ and HITZ concentrations in both genders confirmed that ITZ is a highly variable drug. Further examinations of its PK are needed to justify strategies for therapeutic drug monitoring in patients treated by this antifungal agent.

Keywords: itraconazole, gender, hydroxyitraconazole, pharmacokinetics

Procedia PDF Downloads 137
12365 Students’ Perceptions of the Use of Social Media in Higher Education in Saudi Arabia

Authors: Omar Alshehri, Vic Lally

Abstract:

This paper examined the attitudes of using social media tools to support learning at a university in Saudi Arabia. Moreover, it investigated the students’ current usage of these tools and examined the barriers they could face during the use of social media tools in the education process. Participants in this study were 42 university students. A web-based survey was used to collect data for this study. The results indicate that all of the students were familiar with social media and had used at least one type of social media for learning. It was found out that all students had very positive attitudes towards the use of social media and welcomed using these tools as a supplementary to the curriculum. However, the results indicated that the major barriers to using these tools in learning were distraction, opposing Islamic religious teachings, privacy issues, and cyberbullying. The study recommended that this study could be replicated at other Saudi universities to investigate factors and barriers that might affect Saudi students’ attitudes toward using social media to support learning.

Keywords: barriers to social media use, benefits of social media use, higher education, Saudi Arabia, social media

Procedia PDF Downloads 168
12364 Heavy Liquid Metal Coolant – the Key Safety Element in the Complex of New Nuclear Energy Technologies

Authors: A. Orlov, V. Rachkov

Abstract:

The future of Nuclear Energetics is seen in fast reactors with inherent safety working in the closed nuclear fuel cycle. The concept of inherent safety, which lies in deterministic elimination of the most severe accidents due to inherent properties of the reactor rather than through building up engineered barriers, is a cornerstone of success in ensuring safety and economic efficiency of future Nuclear Energetics. The focus of this paper is one of the key elements of inherent safety - the lead coolant of a nuclear reactor. Advantages of lead coolant for reactor application, influence on safety are reviewed. BREST-OD-300 fast reactor, currently being developed in Russia withing the “Proryv” Project utilizes lead coolant and a special set of measures and devices, called technology of lead coolant that ensures safe operation in a wide range of temperatures. Here these technological elements are reviewed, and current progress in their development is discussed.

Keywords: BREST-OD-300. , fast reactor, inherent safety, lead coolant

Procedia PDF Downloads 153
12363 Household Level Determinants of Rural-Urban Migration in Bangladesh

Authors: Shamima Akhter, Siegfried Bauer

Abstract:

The aim of this study is to analyze the migration process of the rural population of Bangladesh. Heckman Probit model with sample selection was applied in this paper to explore the determinants of migration and intensity of migration at farm household level. The farm survey was conducted in the central part of Bangladesh on 160 farm households with migrant and on 154 farm households without migrant including a total of 316 farm households. The results from the applied model revealed that main determinants of migration at farm household level are household age, economically active males and females, number of young and old dependent members in the household and agricultural land holding. On the other hand, the main determinants of intensity of migration are availability of economically adult male in the household, number of young dependents and agricultural land holding.

Keywords: determinants, Heckman Probit model, migration, rural-urban

Procedia PDF Downloads 312
12362 Correlation between Potential Intelligence Explanatory Study in the Perspective of Multiple Intelligence Theory by Using Dermatoglyphics and Culture Approaches

Authors: Efnie Indrianie

Abstract:

Potential Intelligence constitutes one essential factor in every individual. This intelligence can be a provision for the development of Performance Intelligence if it is supported by surrounding environment. Fingerprint analysis is a method in recognizing this Potential Intelligence. This method is grounded on pattern and number of finger print outlines that are assumed symmetrical with the number of nerves in our brain, in which these areas have their own function among another. These brain’s functions are later being transposed into intelligence components in accordance with the Multiple Intelligences theory. This research tested the correlation between Potential Intelligence and the components of its Performance Intelligence. Statistical test results that used Pearson correlation showed that five components of Potential Intelligence correlated with Performance Intelligence. Those five components are Logic-Math, Logic, Linguistic, Music, Kinesthetic, and Intrapersonal. Also, this research indicated that cultural factor had a big role in shaping intelligence.

Keywords: potential intelligence, performance intelligence, multiple intelligences, fingerprint, environment, brain

Procedia PDF Downloads 536
12361 Parallel Transformation Processes of Historical Centres: The Cases of Sevilla and Valparaiso

Authors: Jorge Ferrada Herrera, Pablo M. Millán-Millán

Abstract:

The delimitation in the cities of heritage areas implicit in strong processes of transformation, both social and material. The study shows how two cities, seemingly different as Seville (Spain) and Valparaiso (Chile), share the same transformation process from its declaration as heritage cities. The metdología used in research has been on the one hand the analytic-criticism has shown us all processes and the level of involvement of these. On the other hand the direct observation methodology has allowed us to ratify all studied. Faced with these processes research shows social resources that people have developed to address each of them. The study concludes the need to strengthen the social and associative fabric in heritage areas as a resource to ensure the survival of heritage, not only material but also social and cultural. As examples, we have chosen Seville and Valparaiso: the gentrification of Seville prior to the universal exhibition of ‘92 –with pretty specific plans-- is paralleled by Valparaiso’s plan to revitalize its port and its protected (UNESCO) area. The whole of our theoretical discourse will be based thereupon.

Keywords: historical centers, tourism, heritage, social processes

Procedia PDF Downloads 306
12360 Land Use, Land Cover Changes and Woody Vegetation Status of Tsimur Saint Gebriel Monastery, in Tigray Region, Northern Ethiopia

Authors: Abraha Hatsey, Nesibu Yahya, Abeje Eshete

Abstract:

Ethiopian Orthodox Tewahido Church has a long tradition of conserving the Church vegetation and is an area treated as a refugee camp for many endangered indigenous tree species in Northern Ethiopia. Though around 36,000 churches exist in Ethiopia, only a few churches have been studied so far. Thus, this study assessed the land use land cover change of 3km buffer (1986-2018) and the woody species diversity and regeneration status of Tsimur St. Gebriel monastery in Tigray region, Northern Ethiopia. For vegetation study, systematic sampling was used with 100m spacing between plots and between transects. Plot size was 20m*20m for the main plot and 2 subplots (5m*5m each) for the regeneration study. Tree height, diameter at breast height(DBH) and crown area were measured in the main plot for all trees with DBH ≥ 5cm. In the subplots, all seedlings and saplings were counted with DBH < 5cm. The data was analyzed on excel and Pass biodiversity software for diversity and evenness analysis. The major land cover classes identified include bare land, farmland, forest, shrubland and wetland. The extents of forest and shrubland were declined considerably due to bare land and agricultural land expansions within the 3km buffer, indicating an increasing pressure on the church forest. Regarding the vegetation status, A total of 19 species belonging to 13 families were recorded in the monastery. The diversity (H’) and evenness recorded were 2.4 and 0.5, respectively. The tree density (DBH ≥ 5cm) was 336/ha and a crown cover of 65%. Olea europaea was the dominant (6.4m2/ha out of 10.5m2 total basal area) and a frequent species (100%) with good regeneration in the monastery. The rest of the species are less frequent and are mostly confined to water sources with good site conditions. Juniperus procera (overharvested) and the other indigenous species were with few trees left and with no/very poor regeneration status. The species having poor density, frequency and regeneration (Junperus procera, Nuxia congesta Fersen and Jasminium abyssinica) need prior conservation and enrichment planting. The indigenous species could also serve as a potential seed source for the reproduction and restoration of nearby degraded landscapes. The buffer study also demonstrated expansion of agriculture and bare land, which could be a threat to the forest of the isolated monastery. Hence, restoring the buffer zone is the only guarantee for the healthy existence of the church forest.

Keywords: church forests, regeneration, land use change, vegetation status

Procedia PDF Downloads 205
12359 Improved Processing Speed for Text Watermarking Algorithm in Color Images

Authors: Hamza A. Al-Sewadi, Akram N. A. Aldakari

Abstract:

Copyright protection and ownership proof of digital multimedia are achieved nowadays by digital watermarking techniques. A text watermarking algorithm for protecting the property rights and ownership judgment of color images is proposed in this paper. Embedding is achieved by inserting texts elements randomly into the color image as noise. The YIQ image processing model is found to be faster than other image processing methods, and hence, it is adopted for the embedding process. An optional choice of encrypting the text watermark before embedding is also suggested (in case required by some applications), where, the text can is encrypted using any enciphering technique adding more difficulty to hackers. Experiments resulted in embedding speed improvement of more than double the speed of other considered systems (such as least significant bit method, and separate color code methods), and a fairly acceptable level of peak signal to noise ratio (PSNR) with low mean square error values for watermarking purposes.

Keywords: steganography, watermarking, time complexity measurements, private keys

Procedia PDF Downloads 143
12358 Autonomy not Automation: Using Metacognitive Skills in ESL/EFL Classes

Authors: Marina Paula Carreira Rolim

Abstract:

In order to have ELLs take responsibility for their own learning, it is important that they develop skills to work their studies strategically. The less they rely on the instructor as the content provider, the more they become active learners and have a higher sense of self-regulation and confidence in the learning process. This e-poster proposes a new teacher-student relationship that encourages learners to reflect, think critically, and act upon their realities. It also suggests the implementation of different autonomy-supportive teaching tools, such as portfolios, written journals, problem-solving activities, and strategy-based discussions in class. These teaching tools enable ELLs to develop awareness of learning strategies, learning styles, study plans, and available learning resources as means to foster their creative power of learning outside of classroom. In the role of a learning advisor, the teacher is no longer the content provider but a facilitator that introduces skills such as ‘elaborating’, ‘planning’, ‘monitoring’, and ‘evaluating’. The teacher acts as an educator and promotes the use of lifelong metacognitive skills to develop learner autonomy in the ESL/EFL context.

Keywords: autonomy, metacognitive skills, self-regulation, learning strategies, reflection

Procedia PDF Downloads 369
12357 Variation in Youth and Family Experiences of System of Care Principles in Community Mental Health

Authors: James D. Beauchemin

Abstract:

This study tested whether youth mental health care quality, operationalized as the extent to which youth and families experienced system-of-care principles in service interactions with providers, varied by level of youth need after adjusting for sociodemographic and treatment factors. The relationship of quality to clinical outcomes was also examined. Using administrative data and cross-sectional surveys from a stratified random sample of 1,124 caregivers of youths ages 5 to 20 within a statewide system-of-care, adjusted analyses indicated youths with the most intensive needs were significantly less likely to experience high-quality care (51% vs. 63%, p=0.016), with marked deficits on 6 of 9 items. Receipt of lower-quality care predicted less improvement in youth functioning. Despite considerable effort to develop systems-of-care for youths with the most severe mental health needs, these data suggest quality disparities remain for the most impaired youths. Policy and intervention development may be needed to improve the quality of care for this population.

Keywords: system-of-care, adherence, mental health, youth

Procedia PDF Downloads 154
12356 Steady-State Behavior of a Multi-Phase M/M/1 Queue in Random Evolution Subject to Catastrophe Failure

Authors: Reni M. Sagayaraj, Anand Gnana S. Selvam, Reynald R. Susainathan

Abstract:

In this paper, we consider stochastic queueing models for Steady-state behavior of a multi-phase M/M/1 queue in random evolution subject to catastrophe failure. The arrival flow of customers is described by a marked Markovian arrival process. The service times of different type customers have a phase-type distribution with different parameters. To facilitate the investigation of the system we use a generalized phase-type service time distribution. This model contains a repair state, when a catastrophe occurs the system is transferred to the failure state. The paper focuses on the steady-state equation, and observes that, the steady-state behavior of the underlying queueing model along with the average queue size is analyzed.

Keywords: M/G/1 queuing system, multi-phase, random evolution, steady-state equation, catastrophe failure

Procedia PDF Downloads 328
12355 Revisiting Politics of Religion in Muslim Republics of Former Soviet Union and Rise of Extremism, Global Jihadi Terrorism

Authors: Etibar Guliyev

Abstract:

The breakdown of the Soviet Union in 1991 has led to a considerable rise in the religious self-consciousness of Muslim population of the Central Asia. Additionally, huge amount of money spent by various states further facilitated the spread of religious ideas. According to some sources, Saudi Arabia spent 87 billion dollars to propagate Wahhabism abroad during two decades, whereas the Communist Party of the Soviet Union spent just over 7 billion dollars to spread its ideology worldwide between 1921 and 1991. As the result, today once a remote area from international politics has turned into third major source of recruitment of fighters for global terrorist organizations. In order to illustrate to scope of the involvement of the Central Asian residents in international terrorist networks it is enough to mention the name of Colonel Gulmorod Khalimov, the former head of the Tajik special police forces who served as ISIS war minister between 2016 and 2017. The importance of the topic stems from the fact that the above-mentioned republics with a territory of 4 million square km and the population of around 80 million people borders Russia, Iran Afghanistan and China. Moreover, the fact that political and military activities motivated with religious feelings in those countries have implications not only for domestic but also for regional and global political relations and all of them has root in politics of religions adds value to the research. This research aims to provide an in-depth analyses of the marked features of the state policies to regulate religious activities and approach this question both from individual, domestic, regional and global levels of analyses. The research will enable us to better understand what implications have the state of religious freedom in post-Soviet Muslim republics for international relations and the rise of global jihadi terrorism. The paper tries to find a linkage between the mentioned terror attacks and underground rise of religious extremism in Central Asia. This research is based on multiple research methods, mainly on qualitative one. The process tracing method is also employed to review religious policies implemented from 1918-1991 and after the collapse of the Soviet Union in a chronological way. In terms of the quantitative method, it chiefly will be used in a bid to process various statistics disseminated in academic and official sources. The research mostly explored constructivist, securitization and social movement theories. Findings of the research suggests that the endemic problems peculiar to authoritarian regimes of Central Asia such as crackdown on the expression of religious believe and any kind of opposition, economic decline, instrumental use of religion and corruption and tribalism further accelerated the recruitment problem. Paper also concludes that the Central Asian states in some cases misused counter-terrorism campaign as a pretext to further restrict freedom of faith in their respective countries.

Keywords: identity, political Islam, religious extremism, security, terrorism

Procedia PDF Downloads 266
12354 Using iPads and Tablets in Language Teaching and Learning Process

Authors: Ece Sarigul

Abstract:

It is an undeniable fact that, teachers need new strategies to communicate with students of the next generation and to shape enticing educational experiences for them. Many schools have launched iPad/ Tablets initiatives in an effort to enhance student learning. Despite their rapid adoption, the extent to which iPads / Tablets increase student engagement and learning is not well understood. This presentation aims to examine the use of iPads and Tablets in primary and high schools in Turkey as well as in the world to increase academic achievement through promotion of higher order thinking skills. In addition to explaining the ideas of school teachers and students who use the specific iPads or Tablets , various applications in schools and their use will be discussed and demonstrated in this study. The specific” iPads or Tablets” applications discussed in this presentation can be incorporated into the curriculum to assist in developing transformative practices and programs to meet the needs of a diverse student population. In the conclusion section of the presentation, there will be some suggestions for teachers about the effective use of technological devices in the classroom. This study can help educators understand better how students are currently using iPads and Tablets and shape future use.

Keywords: ipads, language teaching, tablets, technology

Procedia PDF Downloads 254
12353 Political Cinema: Rewriting The Malaysian Political History Through Documentary Films

Authors: Raja Rodziah Binti Raja Zainal Hassan

Abstract:

The development of Malaysian political cinema is rapidly taking shape in the local film industry. The paper focuses on the production of independent political documentary by two Malaysian filmmakers, Amir Muhammad and Fahmi Reza. Revolutionary cinema can be understood by utilizing the Third Cinema Theory in order to analyse the meaning and its impact on the audience. The issue surrounding the political cinema in Malaysia is the question of national identity. The implementation of racial or ethnic based politics has resulted in hostility within Malaysia’s multiracial society. Amir Muhammad and Fahmi Reza revisit the Malaysian political history through their films in order to understand the reasons behind the hostility and conflict.

Keywords: Political cinema, third cinema theory, revolutionary cinema, national identity, racial or ethnic politics

Procedia PDF Downloads 433
12352 A Proposal of Farm-Based Tourism within the Context of Rural Tourism: Zeytinseli

Authors: Vedat Acar, Osman Eralp Çolakoğlu

Abstract:

In this research, with reference to specialization of travel agencies being an important part of tourism industry, a project has been presented about a small-scale enterprise, called as Zeytinseli, contributing actively from the beginning to the end of the production process of olive and olive oil within the context of rural tourism. For this purpose in the research done, firstly, conceptual framework has been formed about travel agency, tour operatorship, specialized travel agency and rural tourism and the necessity of specialization on tourism has been emphasized in today's world. Afterwards, "olive", having an important role in both mythology and divine religions, has been handled within the scope of rural tourism. The cost of accommodation units about Zeytinseli operating in Didim, being a district of Aydın, has been calculated within the context of the project and a fifteen-day's tour to this enterprise has been presented at the end of this project. The research may be said to be an original research on account of embodying not only ecotourism, agro tourism but also cultural tourism and special interest tourism.

Keywords: agro tourism, rural tourism, specialization of travel agency, special interest tourism

Procedia PDF Downloads 461
12351 Effects of Gender on Kinematics Kicking in Soccer

Authors: Abdolrasoul Daneshjoo

Abstract:

Soccer is a game which draws more attention in different countries especially in Brazil. Kicking among different skills in soccer and soccer players is an excellent role for the success and preference of a team. The way of point gaining in this game is passing the ball over the goal lines which are gained by shoot skill in attack time and or during the penalty kicks.Regarding the above assumption, identifying the effective factors in instep kicking in different distances shoot with maximum force and high accuracy or pass and penalty kick, may assist the coaches and players in raising qualitative level of performing the skill.The aim of the present study was to study of a few kinematical parameters in instep kicking from 5 and 7 meter distance among the male and female elite soccer players.24 right dominant lower limb subjects (12 males and 12 females) among Tehran elite soccer players with average and the standard deviation (22.5 ± 1.5) & (22.08± 1.31) years, height of (179.5 ± 5.81) & (164.3 ± 4.09) cm, weight of (69.66 ± 4.09) & (53.16 ± 3.51) kg, %BMI (21.06 ± .731) & (19.67 ± .709), having playing history of (4 ± .73) & (3.08 ± .66) years respectively participated in this study. They had at least two years of continuous playing experience in Tehran soccer league.For sampling player's kick; Kinemetrix Motion analysis with three cameras with 1000 Hz was used. Five reflective markers were placed laterally on the kicking leg over anatomical points (the iliac crest, major trochanter, lateral epicondyle of femur, lateral malleolus, and lateral aspect of distal head of the fifth metatarsus). Instep kick was filmed, with one step approach and 30 to 45 degrees angle from stationary ball. Three kicks were filmed, one kick selected for further analyses. Using Kinemetrix 3D motion analysis software, the position of the markers was analyzed. Descriptive statistics were used to describe the mean and standard deviation, while the analysis of variance, and independent t-test (P < 0.05) were used to compare the kinematic parameters between two genders.Among the evaluated parameters, the knee acceleration, the thigh angular velocity, the angle of knee proportionately showed significant relationship with consequence of kick. While company performance on 5m in 2 genders, significant differences were observed in internal – external displacement of toe, ankle, hip and the velocity of toe, ankle and the acceleration of toe and the angular velocity of pelvic, thigh and before time contact . Significant differences showed the internal – external displacement of toe, the ankle, the knee and the hip, the iliac crest and the velocity of toe, the ankle and acceleration of ankle and angular velocity of the pelvic and the knee.

Keywords: biomechanics, kinematics, instep kicking, soccer

Procedia PDF Downloads 502
12350 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 227
12349 Comprehensive Evaluation of Thermal Environment and Its Countermeasures: A Case Study of Beijing

Authors: Yike Lamu, Jieyu Tang, Jialin Wu, Jianyun Huang

Abstract:

With the development of economy and science and technology, the urban heat island effect becomes more and more serious. Taking Beijing city as an example, this paper divides the value of each influence index of heat island intensity and establishes a mathematical model – neural network system based on the fuzzy comprehensive evaluation index of heat island effect. After data preprocessing, the algorithm of weight of each factor affecting heat island effect is generated, and the data of sex indexes affecting heat island intensity of Shenyang City and Shanghai City, Beijing, and Hangzhou City are input, and the result is automatically output by the neural network system. It is of practical significance to show the intensity of heat island effect by visual method, which is simple, intuitive and can be dynamically monitored.

Keywords: heat island effect, neural network, comprehensive evaluation, visualization

Procedia PDF Downloads 133
12348 A Study on Marble Based Geopolymer Mortar / Concrete

Authors: Wei-Hao Lee, Ta-Wui Cheng, Yung-Chin Ding, Tai-Tien Wang

Abstract:

The purpose of this study is trying to use marble wastes as the raw material to fabricate geopolymer green mortar / concrete. Experiment results show that using marble to make geopolymer mortar and concrete, the compressive strength after 28 days curing can reach 35 MPa and 25 MPa, respectively. The characteristics of marble-based geopolymer green mortar and concrete will keep testing for a long term in order to understand the effect parameters. The study is based on resource recovery and recycling. Its basic characteristics are low consumption, low carbon dioxide emission and high efficiency that meet the international tendency 'Circular Economy.' By comparing with Portland cement mortar and concrete, production 1 ton of marble-based geopolymer mortar and concrete, they can be saved around 50.3% and 49.6% carbon dioxide emission, respectively. Production 1 m3 of marble-based geopolymer concrete costs about 62 USD that cheaper than that of traditional Portland concrete. It is proved that the marble-based geopolymer concrete has great potential for further engineering development.

Keywords: marble, geopolymer, geopolymer concrete, CO₂ emission

Procedia PDF Downloads 440