Search results for: SIMD (Single Instruction Multiple Data) computers
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30530

Search results for: SIMD (Single Instruction Multiple Data) computers

30350 Learning Mandarin Chinese as a Foreign Language in a Bilingual Context: Adult Learners’ Perceptions of the Use of L1 Maltese and L2 English in Mandarin Chinese Lessons in Malta

Authors: Christiana Gauci-Sciberras

Abstract:

The first language (L1) could be used in foreign language teaching and learning as a pedagogical tool to scaffold new knowledge in the target language (TL) upon linguistic knowledge that the learner already has. In a bilingual context, code-switching between the two languages usually occurs in classrooms. One of the reasons for code-switching is because both languages are used for scaffolding new knowledge. This research paper aims to find out why both the L1 (Maltese) and the L2 (English) are used in the classroom of Mandarin Chinese as a foreign language (CFL) in the bilingual context of Malta. This research paper also aims to find out the learners’ perceptions of the use of a bilingual medium of instruction. Two research methods were used to collect qualitative data; semi-structured interviews with adult learners of Mandarin Chinese and lesson observations. These two research methods were used so that the data collected in the interviews would be triangulated with data collected in lesson observations. The L1 (Maltese) is the language of instruction mostly used. The teacher and the learners switch to the L2 (English) or to any other foreign language according to the need at a particular instance during the lesson.

Keywords: Chinese, bilingual, pedagogical purpose of L1 and L2, CFL acquisition

Procedia PDF Downloads 166
30349 Applying Multiple Kinect on the Development of a Rapid 3D Mannequin Scan Platform

Authors: Shih-Wen Hsiao, Yi-Cheng Tsao

Abstract:

In the field of reverse engineering and creative industries, applying 3D scanning process to obtain geometric forms of the objects is a mature and common technique. For instance, organic objects such as faces and nonorganic objects such as products could be scanned to acquire the geometric information for further application. However, although the data resolution of 3D scanning device is increasing and there are more and more abundant complementary applications, the penetration rate of 3D scanning for the public is still limited by the relative high price of the devices. On the other hand, Kinect, released by Microsoft, is known for its powerful functions, considerably low price, and complete technology and database support. Therefore, related studies can be done with the applying of Kinect under acceptable cost and data precision. Due to the fact that Kinect utilizes optical mechanism to extracting depth information, limitations are found due to the reason of the straight path of the light. Thus, various angles are required sequentially to obtain the complete 3D information of the object when applying a single Kinect for 3D scanning. The integration process which combines the 3D data from different angles by certain algorithms is also required. This sequential scanning process costs much time and the complex integration process often encounter some technical problems. Therefore, this paper aimed to apply multiple Kinects simultaneously on the field of developing a rapid 3D mannequin scan platform and proposed suggestions on the number and angles of Kinects. In the content, a method of establishing the coordination based on the relation between mannequin and the specifications of Kinect is proposed, and a suggestion of angles and number of Kinects is also described. An experiment of applying multiple Kinect on the scanning of 3D mannequin is constructed by Microsoft API, and the results show that the time required for scanning and technical threshold can be reduced in the industries of fashion and garment design.

Keywords: 3D scan, depth sensor, fashion and garment design, mannequin, multiple Kinect sensor

Procedia PDF Downloads 347
30348 Robust Single/Multi bit Memristor Based Memory

Authors: Ahmed Emara, Maged Ghoneima, Mohamed Dessouky

Abstract:

Demand for low power fast memories is increasing with the increase in IC’s complexity, in this paper we introduce a proposal for a compact SRAM based on memristor devices. The compact size of the proposed cell (1T2M compared to 6T of traditional SRAMs) allows denser memories on the same area. In this paper, we will discuss the proposed memristor memory cell for single/multi bit data storing configurations along with the writing and reading operations. Stored data stability across successive read operation will be illustrated, operational simulation results and a comparison of our proposed design with previously conventional SRAM and previously proposed memristor cells will be provided.

Keywords: memristor, multi-bit, single-bit, circuits, systems

Procedia PDF Downloads 350
30347 Differentiated Instruction for All Learners: Strategies for Full Inclusion

Authors: Susan Dodd

Abstract:

This presentation details the methodology for teachers to identify and support a population of students who have historically been overlooked in regards to their educational needs. The twice exceptional (2e) student is a learner who is considered gifted and also has a learning disability, as defined by the Individuals with Disabilities Education Act (IDEA). Many of these students remain underserved throughout their educational careers because their exceptionalities may mask each other, resulting in a special population of students who are not achieving to their fullest potential. There are three common scenarios that may make the identification of a 2e student challenging. First, the student may have been identified as gifted, and her disability may go unnoticed. She could also be considered an under-achiever, or she may be able to compensate for her disability under the school works becomes more challenging. In the second scenario, the student may be identified as having a learning disability and is only receiving remedial services where his giftedness will not be highlighted. His overall IQ scores may be misleading because they were impacted by his learning disability. In the third scenario, the student is able to compensate for her ability well enough to maintain average scores, and she goes undetected as both gifted and learning disabled. Research in the area identifies the complexity involved in identifying 2e students, and how multiple forms of assessment are required. It is important for teachers to be aware of the common characteristics exhibited by many 2e students, so these learners can be identified and appropriately served. Once 2e students have been identified, teachers are then challenged to meet the varying needs of these exceptional learners. Strength-based teaching entails simultaneously providing gifted instruction as well as individualized accommodations for those students. Research in this field has yielded strategies that have proven helpful for teaching 2e students, as well as other students who may be struggling academically. Differentiated instruction, while necessary in all classrooms, is especially important for 2e students, as is encouragement for academic success. Teachers who take the time to really know their students will have a better understanding of each student’s strengths and areas for growth, and therefore tailor instruction to extend the intellectual capacities for optimal achievement. Teachers should also understand that some learning activities can prove very frustrating to students, and these activities can be modified based on individual student needs. Because 2e students can often become discouraged by their learning challenges, it is especially important for teachers to assist students in recognizing their own strengths and maintaining motivation for learning. Although research on the needs of 2e students has spanned across two decades, this population remains underserved in many educational institutions. Teacher awareness of the identification of and the support strategies for 2e students is critical for their success.

Keywords: gifted, learning disability, special needs, twice exceptional

Procedia PDF Downloads 159
30346 Deep Learning Framework for Predicting Bus Travel Times with Multiple Bus Routes: A Single-Step Multi-Station Forecasting Approach

Authors: Muhammad Ahnaf Zahin, Yaw Adu-Gyamfi

Abstract:

Bus transit is a crucial component of transportation networks, especially in urban areas. Any intelligent transportation system must have accurate real-time information on bus travel times since it minimizes waiting times for passengers at different stations along a route, improves service reliability, and significantly optimizes travel patterns. Bus agencies must enhance the quality of their information service to serve their passengers better and draw in more travelers since people waiting at bus stops are frequently anxious about when the bus will arrive at their starting point and when it will reach their destination. For solving this issue, different models have been developed for predicting bus travel times recently, but most of them are focused on smaller road networks due to their relatively subpar performance in high-density urban areas on a vast network. This paper develops a deep learning-based architecture using a single-step multi-station forecasting approach to predict average bus travel times for numerous routes, stops, and trips on a large-scale network using heterogeneous bus transit data collected from the GTFS database. Over one week, data was gathered from multiple bus routes in Saint Louis, Missouri. In this study, Gated Recurrent Unit (GRU) neural network was followed to predict the mean vehicle travel times for different hours of the day for multiple stations along multiple routes. Historical time steps and prediction horizon were set up to 5 and 1, respectively, which means that five hours of historical average travel time data were used to predict average travel time for the following hour. The spatial and temporal information and the historical average travel times were captured from the dataset for model input parameters. As adjacency matrices for the spatial input parameters, the station distances and sequence numbers were used, and the time of day (hour) was considered for the temporal inputs. Other inputs, including volatility information such as standard deviation and variance of journey durations, were also included in the model to make it more robust. The model's performance was evaluated based on a metric called mean absolute percentage error (MAPE). The observed prediction errors for various routes, trips, and stations remained consistent throughout the day. The results showed that the developed model could predict travel times more accurately during peak traffic hours, having a MAPE of around 14%, and performed less accurately during the latter part of the day. In the context of a complicated transportation network in high-density urban areas, the model showed its applicability for real-time travel time prediction of public transportation and ensured the high quality of the predictions generated by the model.

Keywords: gated recurrent unit, mean absolute percentage error, single-step forecasting, travel time prediction.

Procedia PDF Downloads 51
30345 Functional Instruction Set Simulator (ISS) of a Neural Network (NN) IP with Native BF-16 Generator

Authors: Debajyoti Mukherjee, Arathy B. S., Arpita Sahu, Saranga P. Pogula

Abstract:

A Functional Model to mimic the functional correctness of a Neural Network Compute Accelerator IP is very crucial for design validation. Neural network workloads are based on a Brain Floating Point (BF-16) data type. The major challenge we were facing was the incompatibility of gcc compilers to BF-16 datatype, which we addressed with a native BF-16 generator integrated to our functional model. Moreover, working with big GEMM (General Matrix Multiplication) or SpMM (Sparse Matrix Multiplication) Work Loads (Dense or Sparse) and debugging the failures related to data integrity is highly painstaking. In this paper, we are addressing the quality challenge of such a complex Neural Network Accelerator design by proposing a Functional Model-based scoreboard or Software model using SystemC. The proposed Functional Model executes the assembly code based on the ISA of the processor IP, decodes all instructions, and executes as expected to be done by the DUT. The said model would give a lot of visibility and debug capability in the DUT bringing up micro-steps of execution.

Keywords: ISA (instruction set architecture), NN (neural network), TLM (transaction-level modeling), GEMM (general matrix multiplication)

Procedia PDF Downloads 54
30344 Teaching the Binary System via Beautiful Facts from the Real Life

Authors: Salem Ben Said

Abstract:

In recent times the decimal number system to which we are accustomed has received serious competition from the binary number system. In this note, an approach is suggested to teaching and learning the binary number system using examples from the real world. More precisely, we will demonstrate the utility of the binary system in describing the optimal strategy to win the Chinese Nim game, and in telegraphy by decoding the hidden message on Perseverance’s Mars parachute written in the language of binary system. Finally, we will answer the question, “why do modern computers prefer the ternary number system instead of the binary system?”. All materials are provided in a format that is conductive to classroom presentation and discussion.

Keywords: binary number system, Nim game, telegraphy, computers prefer the ternary system

Procedia PDF Downloads 159
30343 Understanding Indonesian Smallholder Dairy Farmers’ Decision to Adopt Multiple Farm: Level Innovations

Authors: Rida Akzar, Risti Permani, Wahida , Wendy Umberger

Abstract:

Adoption of farm innovations may increase farm productivity, and therefore improve market access and farm incomes. However, most studies that look at the level and drivers of innovation adoption only focus on a specific type of innovation. Farmers may consider multiple innovation options, and constraints such as budget, environment, scarcity of labour supply, and the cost of learning. There have been some studies proposing different methods to combine a broad variety of innovations into a single measurable index. However, little has been done to compare these methods and assess whether they provide similar information about farmer segmentation by their ‘innovativeness’. Using data from a recent survey of 220 dairy farm households in West Java, Indonesia, this study compares and considers different methods of deriving an innovation index, including expert-weighted innovation index; an index derived from the total number of adopted technologies; and an index of the extent of adoption of innovation taking into account both adoption and disadoption of multiple innovations. Second, it examines the distribution of different farming systems taking into account their innovativeness and farm characteristics. Results from this study will inform policy makers and stakeholders in the dairy industry on how to better design, target and deliver programs to improve and encourage farm innovation, and therefore improve farm productivity and the performance of the dairy industry in Indonesia.

Keywords: adoption, dairy, household survey, innovation index, Indonesia, multiple innovations dairy, West Java

Procedia PDF Downloads 313
30342 Long Term Evolution Multiple-Input Multiple-Output Network in Unmanned Air Vehicles Platform

Authors: Ashagrie Getnet Flattie

Abstract:

Line-of-sight (LOS) information, data rates, good quality, and flexible network service are limited by the fact that, for the duration of any given connection, they experience severe variation in signal strength due to fading and path loss. Wireless system faces major challenges in achieving wide coverage and capacity without affecting the system performance and to access data everywhere, all the time. In this paper, the cell coverage and edge rate of different Multiple-input multiple-output (MIMO) schemes in 20 MHz Long Term Evolution (LTE) system under Unmanned Air Vehicles (UAV) platform are investigated. After some background on the enormous potential of UAV, MIMO, and LTE in wireless links, the paper highlights the presented system model which attempts to realize the various benefits of MIMO being incorporated into UAV platform. The performances of the three MIMO LTE schemes are compared with the performance of 4x4 MIMO LTE in UAV scheme carried out to evaluate the improvement in cell radius, BER, and data throughput of the system in different morphology. The results show that significant performance gains such as bit error rate (BER), data rate, and coverage can be achieved by using the presented scenario.

Keywords: LTE, MIMO, path loss, UAV

Procedia PDF Downloads 254
30341 Students’ Attitudes towards Self-Directed Learning out of Classroom: Indonesian Context

Authors: Silmy A. Humaira'

Abstract:

There is an issue about Asian students including Indonesian students that tend to behave passively in the classroom and depend on the teachers’ instruction. Regarding this statement, this study attempts to address the Indonesian high school students’ attitudes on whether they have initiative and be responsible for their learning out of the classroom and if so, why. Therefore, 30 high school students were asked to fill out the questionnaires and interviewed in order to figure out their attitudes towards self-directed learning. The descriptive qualitative research analysis adapted Knowles’s theory (1975) about Self-directed learning (SDL) to analyze the data. The findings show that the students have a potential to possess self-directed learning through ICT, but they have difficulties in choosing appropriate learning strategy, doing self-assessment and conducting self-reflection. Therefore, this study supports the teacher to promote self-directed learning instruction for successful learning by assisting students in dealing with those aforementioned problems. Furthermore, it is expected to be a beneficial reference which gives new insights on the self-directed learning practice in specific context.

Keywords: ICT, learning autonomy, students’ attitudes, self-directed learning

Procedia PDF Downloads 206
30340 Adopting English as a Language of Instruction of STEM in Tunisian Higher Education Institutions: Promises and Challenges

Authors: Mimoun Melliti

Abstract:

This research paper investigates the promises, challenges, and perspectives associated with teaching STEM subjects in English within Tunisian higher education institutions. The study explores the potential benefits of English-medium instruction in Science, Technology, Engineering, and Mathematics (henceforth STEM) education, with a special focus on enhanced global competitiveness, improved English language proficiency, and increased access to international resources and collaborations. Additionally, it examines the various challenges faced by educators and students, such as language shift/barriers, curriculum adaptation, faculty training, and student support. Through a comprehensive analysis of promises and challenges, this paper aims to provide insights and recommendations for effectively implementing English medium instruction (henceforth EMI) of STEM in Tunisian higher education institutions. The paper concludes with a recommended action plan for the proper introduction of EMI of STEM in Tunisia.

Keywords: EMI;, STEM education, EFL, language reforms

Procedia PDF Downloads 49
30339 Online or Offline: A Pilot Study of Blended Ear-Training Course

Authors: Monika Benedek

Abstract:

This paper intends to present a pilot study of blended ear-training course at a Finnish university. The course ran for ten weeks and included both traditional (offline) group lessons for 90 minutes each week and an online learning platform. Twelve students majored in musicology and music education participated in the course. The aims of pilot research were to develop a new blended ear-training course at university level, to determine the ideal amount of workload in each part of the blended instruction (offline and online) and to develop the course material. The course material was selected from the Classical period in order to develop students’ aural skills together with their stylistic knowledge. Students were asked to provide written feedback of the course content and learning approaches of face-to-face group lessons and online learning platform each week during the course. Therefore, the teaching material is continuously planned for each week. This qualitative data collection and weekly analysis of data are on progress. However, based on the teacher-researcher’s experiences and the students’ feedback already collected, it could be seen that the blended instruction would be an ideal teaching strategy for ear-trainging at the music programmes of universities to develop students’ aural skills and stylistic knowledge. It is also presumed that such blended instruction with less workload would already improve university students’ aural skills and related musicianship skills. The preliminary findings of research also indicated that students generally found those ear-training tasks the most useful to learn online that combined listening, singing, singing and playing an instrument. This paper intends to summarise the final results of the pilot study.

Keywords: blended-learning, ear-training, higher music education, online-learning, pilot study

Procedia PDF Downloads 141
30338 Rhythm-Reading Success Using Conversational Solfege

Authors: Kelly Jo Hollingsworth

Abstract:

Conversational Solfege, a research-based, 12-step music literacy instructional method using the sound-before-sight approach, was used to teach rhythm-reading to 128-second grade students at a public school in the southeastern United States. For each step, multiple scripted techniques are supplied to teach each skill. Unit one was the focus of this study, which is quarter note and barred eighth note rhythms. During regular weekly music instruction, students completed method steps one through five, which includes aural discrimination, decoding familiar and unfamiliar rhythm patterns, and improvising rhythmic phrases using quarter notes and barred eighth notes. Intact classes were randomly assigned to two treatment groups for teaching steps six through eight, which was the visual presentation and identification of quarter notes and barred eighth notes, visually presenting and decoding familiar patterns, and visually presenting and decoding unfamiliar patterns using said notation. For three weeks, students practiced steps six through eight during regular weekly music class. One group spent five-minutes of class time on steps six through eight technique work, while the other group spends ten-minutes of class time practicing the same techniques. A pretest and posttest were administered, and ANOVA results reveal both the five-minute (p < .001) and ten-minute group (p < .001) reached statistical significance suggesting Conversational Solfege is an efficient, effective approach to teach rhythm-reading to second grade students. After two weeks of no instruction, students were retested to measure retention. Using a repeated-measures ANOVA, both groups reached statistical significance (p < .001) on the second posttest, suggesting both the five-minute and ten-minute group retained rhythm-reading skill after two weeks of no instruction. Statistical significance was not reached between groups (p=.252), suggesting five-minutes is equally as effective as ten-minutes of rhythm-reading practice using Conversational Solfege techniques. Future research includes replicating the study with other grades and units in the text.

Keywords: conversational solfege, length of instructional time, rhythm-reading, rhythm instruction

Procedia PDF Downloads 137
30337 Peer Instruction, Technology, Education for Textile and Fashion Students

Authors: Jimmy K. C. Lam, Carrie Wong

Abstract:

One of the key goals on Learning and Teaching as documented in the University strategic plan 2012/13 – 2017/18 is to encourage active learning, the use of innovative teaching approaches and technology, and promoting the adoption of flexible and varied teaching delivery methods. This research reported the recent visited to Prof Eric Mazur at Harvard University on Peer Instruction: Collaborative learning in large class and innovative use of technology to enable new mode of learning. Peer Instruction is a research-based, interactive teaching method developed by Prof. Eric Mazur at Harvard University in the 1990s. It has been adopted across the disciplines, institutional type and throughout the world. One problem with conventional teaching lies in the presentation of the material. Frequently, it comes straight out of textbook/notes, giving students little incentive to attend class. This traditional presentation is always delivered as monologue in front of passive audience. Only exceptional lecturers are capable of holding students’ attention for an entire lecture period. Consequently, lectures simply reinforce students’ feelings that the most important step in mastering the material is memorizing a zoo of unrelated examples. In order to address these misconceptions about learning, Prof Mazur’s Team developed “Peer Instruction”, a method which involves students in their own learning during lectures and focuses their attention on underling concepts. Lectures are interspersed with conceptual questions called Concept Tests, designed to expose common difficulties in understanding the material. The students are given one or two minutes to think about the question and formulate their own answers; they then spend two or three minutes discussing their answers in a group of three or four, attempting to reach consensus on the correct answer. This process forces the students to think through the arguments being developed, and enable them to assess their understanding concepts before they leave the classroom. The findings from Peer Instruction and innovative use of technology on teaching at Harvard University were applied to the first year Textiles and Fashion students in Hong Kong. Survey conducted from 100 students showed that over 80% students enjoyed the flexibility of peer instruction and 70% of them enjoyed the instant feedback from the Clicker system (Student Response System used at Harvard University). Further work will continue to explore the possibility of peer instruction to art and fashion students.

Keywords: peer instruction, education, technology, fashion

Procedia PDF Downloads 299
30336 God, The Master Programmer: The Relationship Between God and Computers

Authors: Mohammad Sabbagh

Abstract:

Anyone who reads the Torah or the Quran learns that GOD created everything that is around us, seen and unseen, in six days. Within HIS plan of creation, HE placed for us a key proof of HIS existence which is essentially computers and the ability to program them. Digital computer programming began with binary instructions, which eventually evolved to what is known as high-level programming languages. Any programmer in our modern time can attest that you are essentially giving the computer commands by words and when the program is compiled, whatever is processed as output is limited to what the computer was given as an ability and furthermore as an instruction. So one can deduce that GOD created everything around us with HIS words, programming everything around in six days, just like how we can program a virtual world on the computer. GOD did mention in the Quran that one day where GOD’s throne is, is 1000 years of what we count; therefore, one might understand that GOD spoke non-stop for 6000 years of what we count, and gave everything it’s the function, attributes, class, methods and interactions. Similar to what we do in object-oriented programming. Of course, GOD has the higher example, and what HE created is much more than OOP. So when GOD said that everything is already predetermined, it is because any input, whether physical, spiritual or by thought, is outputted by any of HIS creatures, the answer has already been programmed. Any path, any thought, any idea has already been laid out with a reaction to any decision an inputter makes. Exalted is GOD!. GOD refers to HIMSELF as The Fastest Accountant in The Quran; the Arabic word that was used is close to processor or calculator. If you create a 3D simulation of a supernova explosion to understand how GOD produces certain elements and fuses protons together to spread more of HIS blessings around HIS skies; in 2022 you are going to require one of the strongest, fastest, most capable supercomputers of the world that has a theoretical speed of 50 petaFLOPS to accomplish that. In other words, the ability to perform one quadrillion (1015) floating-point operations per second. A number a human cannot even fathom. To put in more of a perspective, GOD is calculating when the computer is going through those 50 petaFLOPS calculations per second and HE is also calculating all the physics of every atom and what is smaller than that in all the actual explosion, and it’s all in truth. When GOD said HE created the world in truth, one of the meanings a person can understand is that when certain things occur around you, whether how a car crashes or how a tree grows; there is a science and a way to understand it, and whatever programming or science you deduce from whatever event you observed, it can relate to other similar events. That is why GOD might have said in The Quran that it is the people of knowledge, scholars, or scientist that fears GOD the most! One thing that is essential for us to keep up with what the computer is doing and for us to track our progress along with any errors is we incorporate logging mechanisms and backups. GOD in The Quran said that ‘WE used to copy what you used to do’. Essentially as the world is running, think of it as an interactive movie that is being played out in front of you, in a full-immersive non-virtual reality setting. GOD is recording it, from every angle to every thought, to every action. This brings the idea of how scary the Day of Judgment will be when one might realize that it’s going to be a fully immersive video when we would be getting and reading our book.

Keywords: programming, the Quran, object orientation, computers and humans, GOD

Procedia PDF Downloads 89
30335 A Highly Efficient Broadcast Algorithm for Computer Networks

Authors: Ganesh Nandakumaran, Mehmet Karaata

Abstract:

A wave is a distributed execution, often made up of a broadcast phase followed by a feedback phase, requiring the participation of all the system processes before a particular event called decision is taken. Wave algorithms with one initiator such as the 1-wave algorithm have been shown to be very efficient for broadcasting messages in tree networks. Extensions of this algorithm broadcasting a sequence of waves using a single initiator have been implemented in algorithms such as the m-wave algorithm. However as the network size increases, having a single initiator adversely affects the message delivery times to nodes further away from the initiator. As a remedy, broadcast waves can be allowed to be initiated by multiple initiator nodes distributed across the network to reduce the completion time of broadcasts. These waves initiated by one or more initiator processes form a collection of waves covering the entire network. Solutions to global-snapshots, distributed broadcast and various synchronization problems can be solved efficiently using waves with multiple concurrent initiators. In this paper, we propose the first stabilizing multi-wave sequence algorithm implementing waves started by multiple initiator processes such that every process in the network receives at least one sequence of broadcasts. Due to being stabilizing, the proposed algorithm can withstand transient faults and do not require initialization. We view a fault as a transient fault if it perturbs the configuration of the system but not its program.

Keywords: distributed computing, multi-node broadcast, propagation of information with feedback and cleaning (PFC), stabilization, wave algorithms

Procedia PDF Downloads 478
30334 Constructing the Density of States from the Parallel Wang Landau Algorithm Overlapping Data

Authors: Arman S. Kussainov, Altynbek K. Beisekov

Abstract:

This work focuses on building an efficient universal procedure to construct a single density of states from the multiple pieces of data provided by the parallel implementation of the Wang Landau Monte Carlo based algorithm. The Ising and Pott models were used as the examples of the two-dimensional spin lattices to construct their densities of states. Sampled energy space was distributed between the individual walkers with certain overlaps. This was made to include the latest development of the algorithm as the density of states replica exchange technique. Several factors of immediate importance for the seamless stitching process have being considered. These include but not limited to the speed and universality of the initial parallel algorithm implementation as well as the data post-processing to produce the expected smooth density of states.

Keywords: density of states, Monte Carlo, parallel algorithm, Wang Landau algorithm

Procedia PDF Downloads 376
30333 Engaging Students in Multimedia Constructivist Learning: Analysis of Students' Science Achievement

Authors: Maria Georgiou

Abstract:

This study examined whether there was a statistically significant difference between pretest and posttest achievement scores for students who received multimedia-based instructions in science. The paired samples t-test was used to address the research question and to establish whether there was a significant difference between pretest and posttest scores that may have occurred based on the students’ learning experience with multimedia technology. Findings indicated that there was a significant difference in students’ achievement scores before and after a multimedia-based instruction. Students’ achievement scores were increased by approximately two points, after students received multimedia-based instruction. On a paired samples t-test, a high level of significance was found, p = 0.000. Opportunities to learn with multimedia are more likely to result in sustained improvements in student achievement and a deeper understanding of science content. Multimedia can make learning more active and student-centered and activate student motivation.

Keywords: constructivist learning, hyperstudio, multimedia, multimedia-based instruction

Procedia PDF Downloads 137
30332 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security

Authors: James Andrew Fitzjohn

Abstract:

This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.

Keywords: quantum computing, encryption, RSA, roadmap, real world

Procedia PDF Downloads 106
30331 Pupils' and Teachers' Perceptions and Experiences of Welsh Language Instruction

Authors: Mirain Rhys, Kevin Smith

Abstract:

In 2017, the Welsh Government introduced an ambitious, new strategy to increase the number of Welsh speakers in Wales to 1 million by 2050. The Welsh education system is a vitally important feature of this strategy. All children attending state schools in Wales learn Welsh as a second language until the age of 16 and are assessed at General Certificate of Secondary Education (GCSE) level. In 2013, a review of Welsh second language instruction in Key Stages 3 and 4 was completed. The report identified considerable gaps in teachers’ preparation and training for teaching Welsh; poor Welsh language ethos at many schools; and a general lack of resources to support the instruction of Welsh. Recommendations were made across a number of dimensions including curriculum content, pedagogical practice, and teacher assessment, training, and resources. With a new national curriculum currently in development, this study builds on this review and provides unprecedented detail into pupils’ and teachers’ perceptions of Welsh language instruction. The current research built on data taken from an existing capacity building research project on Welsh education, the Wales multi-cohort study (WMS). Quantitative data taken from WMS surveys with over 1200 pupils in schools in Wales indicated that Welsh language lessons were the least enjoyable subject among pupils. The current research aimed to unpick pupil experiences in order to add to the policy development context. To achieve this, forty-four pupils and four teachers in three schools from the larger WMS sample participated in focus groups. Participants from years 9, 11 and 13 who had indicated positive, negative and neutral attitudes towards the Welsh language in a previous WMS survey were selected. Questions were based on previous research exploring issues including, but not limited to pedagogy, policy, assessment, engagement and (teacher) training. A thematic analysis of the focus group recordings revealed that the majority of participants held positive views around keeping the language alive but did not want to take on responsibility for its maintenance. These views were almost entirely based on their experiences of learning Welsh at school, especially in relation to their perceived lack of choice and opinions around particular lesson strategies and assessment. Analysis of teacher interviews highlighted a distinct lack of resources (materials and staff alike) compared to modern foreign languages, which had a negative impact on student motivation and attitudes. Both staff and students indicated a need for more practical, oral language instruction which could lead to Welsh being used outside the classroom. The data corroborate many of the review’s previous findings, but what makes this research distinctive is the way in which pupils poignantly address generally misguided aims for Welsh language instruction, poor pedagogical practice and a general disconnect between Welsh instruction and its daily use in their lives. These findings emphasize the complexity of incorporating the educational sector in strategies for Welsh language maintenance and the complications arising from pedagogical training, support, and resources, as well as teacher and pupil perceptions of, and attitudes towards, teaching and learning Welsh.

Keywords: bilingual education, language maintenance, language revitalisation, minority languages, Wales

Procedia PDF Downloads 94
30330 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 338
30329 Analyzing the Use of Augmented and Virtual Reality to Teach Social Skills to Students with Autism

Authors: Maggie Mosher, Adam Carreon, Sean Smith

Abstract:

A systematic literature review was conducted to explore the evidence base on the use of augmented reality (AR), virtual reality (VR), mixed reality (MR), and extended reality (XR) to present social skill instruction to school-age students with autism spectrum disorder (ASD). Specifically, the systematic review focus was on a. the participants and intervention agents using AR, VR, MR, and XR for social skill acquisition b. the social skills taught through these mediums and c. the social validity measures (i.e., goals, procedures, and outcomes) reported in these studies. Forty-one articles met the inclusion criteria. Researchers in six studies taught social skills to students through AR, in 27 studies through non-immersive VR, and in 10 studies through immersive VR. No studies used MR or XR. The primary targeted social skills were relationship skills, emotion recognition, social awareness, cooperation, and executive functioning. An intervention to improve many social skills was implemented by 73% of researchers, 17% taught a single skill, and 10% did not clearly state the targeted skill. The intervention was considered effective in 26 of the 41 studies (63%), not effective in four studies (10%), and 11 studies (27%) reported mixed results. No researchers reported information for all 17 social validity indicators. The social validity indicators reported by researchers ranged from two to 14. Social validity measures on the feelings toward and use of the technology were provided in 22 studies (54%). Findings indicated both AR and VR are promising platforms for providing social skill instruction to students with ASD. Studies utilizing this technology show a number of social validity indicators. However, the limited information provided on the various interventions, participant characteristics, and validity measures, offers insufficient evidence of the impact of these technologies in teaching social skills to students with ASD. Future research should develop a protocol for training treatment agents to assess the role of different variables (i.e., whether agents are customizing content, monitoring student learning, using intervention specific vocabulary in their day to day instruction). Sustainability may be increased by providing training in the technology to both treatment agents and participants. Providing scripts of instruction occurring within the intervention would provide the needed information to determine the primary method of teaching within the intervention. These variables play a role in maintenance and generalization of the social skills. Understanding the type of feedback provided would help researchers determine if students were able to feel rewarded for progressing through the scenarios or if students require rewarding aspects within the intervention (i.e., badges, trophies). AR has the potential to generalize instruction and VR has the potential for providing a practice environment for performance deficits. Combining these two technologies into a mixed reality intervention may provide a more cohesive and effective intervention.

Keywords: autism, augmented reality, social and emotional learning, social skills, virtual reality

Procedia PDF Downloads 86
30328 Identification and Origins of Multiple Personality: A Criterion from Wiggins

Authors: Brittany L. Kang

Abstract:

One familiar theory of the origin of multiple personalities focuses on how symptoms of trauma or abuse are central causes, as seen in paradigmatic examples of the condition. The theory states that multiple personalities constitute a congenital condition, as babies all exhibit multiplicity, and that generally alters only remain separated due to trauma. In more typical cases, the alters converge and become a single identity; only in cases of trauma, according to this account, do the alters remain separated. This theory is misleading in many aspects, the most prominent being that not all multiple personality patients are victims of child abuse or trauma, nor are all cases of multiple personality observed in early childhood. The use of this criterion also causes clinical problems, including an inability to identify multiple personalities through the variety of symptoms and traits seen across observed cases. These issues present a need for revision in the currently applied criterion in order to separate the notion of child abuse and to be able to better understand the origins of multiple personalities itself. Identifying multiplicity through the application of identity theories will improve the current criterion, offering a bridge between identifying existing cases and understanding their origins. We begin by applying arguments from Wiggins, who held that each personality within a multiple was not a whole individual, but rather characters who switch off. Wiggins’ theory is supported by observational evidence of how such characters are differentiated. Alters of older ages are seen to require different prescription lens, in addition to having different handwriting. The alters may also display drastically varying styles of clothing, preferences in food, their gender, sexuality, religious beliefs and more. The definitions of terms such as 'personality' or 'persons' also become more distinguished, leading to greater understanding of who is exactly able to be classified as a patient of multiple personalities. While a more common meaning of personality is a designation of specific characteristics which account for the entirety of a person, this paper argues from Wiggins’ theory that each 'personality' is in fact only partial. Clarification of the concept in question will allow for more successful future clinical applications.

Keywords: identification, multiple personalities, origin, Wiggins' theory

Procedia PDF Downloads 218
30327 The Collaborative Advocacy Work of Language Teachers

Authors: Sora Suh, Catherine Michener

Abstract:

This paper examines the collaborative forms of advocacy that a group of four public school teachers took for their emergent bilingual students in one public school district. While teacher advocacy takes many forms in and out of the classroom, much advocacy work is done by individuals and less by collective action. As a result, individual teachers risk isolation or marginalization in their school contexts when they advocate for immigrant youth. This paper is intended to contribute to the documentation and understanding of teachers’ advocacy work as a collaborative act in teacher education research. The increase of ELs in US classrooms and a corresponding lack of teacher preparation to meet the needs of ELs has motivated the training of educators in linguistically responsive education (e.g., ESL, sheltered English instruction [SEI], bilingual education). Drawing from educational theories of linguistically responsive teaching for preparing educators, we trace the linguistically responsive advocacy work of the teachers. The paper is a multiple case study that tracks how teachers’ discussions on advocacy during a teacher preparation program leading to collaborative actions in their daily teaching lives in and out of school. Data collected includes online discussion forums on the topic of advocacy, course assignments on the topic of advocacy, video-audio recordings of classroom teaching observations, and video-audio recordings of individual and focus group interviews. The findings demonstrate that the teachers’ understanding of advocacy developed through collaborative partnerships formed in the teacher preparation program and grew into active forms of collaborative advocacy in their teaching practice in and out of school. The teachers formed multi-level and collaborative partnerships with teachers, families, community members, policymakers from the local government, and educational researchers to advocate for their emergent bilingual students by planning advocacy events such as new family orientations for emergent bilinguals, professional development for general education teachers on the topic of linguistically responsive instruction, and family nights hosted by the district. The paper’s findings present types of advocacy work in which teachers engage (pedagogical, curricular, out-of-school work) and provide evidence of collaborative advocacy work by a group of engaged educators. The paper highlights the increased agency and effective advocacy of teachers through teacher education and collaborative partnerships and suggests a need for more research on collaborative forms of teacher advocacy for emergent bilinguals.

Keywords: language education, teacher advocacy, language instruction, teacher education

Procedia PDF Downloads 94
30326 Influence of Single and Multiple Skin-Core Debonding on Free Vibration Characteristics of Innovative GFRP Sandwich Panels

Authors: Indunil Jayatilake, Warna Karunasena, Weena Lokuge

Abstract:

An Australian manufacturer has fabricated an innovative GFRP sandwich panel made from E-glass fiber skin and a modified phenolic core for structural applications. Debonding, which refers to separation of skin from the core material in composite sandwiches, is one of the most common types of damage in composites. The presence of debonding is of great concern because it not only severely affects the stiffness but also modifies the dynamic behaviour of the structure. Generally, it is seen that the majority of research carried out has been concerned about the delamination of laminated structures whereas skin-core debonding has received relatively minor attention. Furthermore, it is observed that research done on composite slabs having multiple skin-core debonding is very limited. To address this gap, a comprehensive research investigating dynamic behaviour of composite panels with single and multiple debonding is presented. The study uses finite-element modelling and analyses for investigating the influence of debonding on free vibration behaviour of single and multilayer composite sandwich panels. A broad parametric investigation has been carried out by varying debonding locations, debonding sizes and support conditions of the panels in view of both single and multiple debonding. Numerical models were developed with Strand7 finite element package by innovatively selecting the suitable elements to diligently represent their actual behavior. Three-dimensional finite element models were employed to simulate the physically real situation as close as possible, with the use of an experimentally and numerically validated finite element model. Comparative results and conclusions based on the analyses are presented. For similar extents and locations of debonding, the effect of debonding on natural frequencies appears greatly dependent on the end conditions of the panel, giving greater decrease in natural frequency when the panels are more restrained. Some modes are more sensitive to debonding and this sensitivity seems to be related to their vibration mode shapes. The fundamental mode seems generally the least sensitive mode to debonding with respect to the variation in free vibration characteristics. The results indicate the effectiveness of the developed three-dimensional finite element models in assessing debonding damage in composite sandwich panels

Keywords: debonding, free vibration behaviour, GFRP sandwich panels, three dimensional finite element modelling

Procedia PDF Downloads 293
30325 Design and Implementation of a Hardened Cryptographic Coprocessor with 128-bit RISC-V Core

Authors: Yashas Bedre Raghavendra, Pim Vullers

Abstract:

This study presents the design and implementation of an abstract cryptographic coprocessor, leveraging AMBA(Advanced Microcontroller Bus Architecture) protocols - APB (Advanced Peripheral Bus) and AHB (Advanced High-performance Bus), to enable seamless integration with the main CPU(Central processing unit) and enhance the coprocessor’s algorithm flexibility. The primary objective is to create a versatile coprocessor that can execute various cryptographic algorithms, including ECC(Elliptic-curve cryptography), RSA(Rivest–Shamir–Adleman), and AES (Advanced Encryption Standard) while providing a robust and secure solution for modern secure embedded systems. To achieve this goal, the coprocessor is equipped with a tightly coupled memory (TCM) for rapid data access during cryptographic operations. The TCM is placed within the coprocessor, ensuring quick retrieval of critical data and optimizing overall performance. Additionally, the program memory is positioned outside the coprocessor, allowing for easy updates and reconfiguration, which enhances adaptability to future algorithm implementations. Direct links are employed instead of DMA(Direct memory access) for data transfer, ensuring faster communication and reducing complexity. The AMBA-based communication architecture facilitates seamless interaction between the coprocessor and the main CPU, streamlining data flow and ensuring efficient utilization of system resources. The abstract nature of the coprocessor allows for easy integration of new cryptographic algorithms in the future. As the security landscape continues to evolve, the coprocessor can adapt and incorporate emerging algorithms, making it a future-proof solution for cryptographic processing. Furthermore, this study explores the addition of custom instructions into RISC-V ISE (Instruction Set Extension) to enhance cryptographic operations. By incorporating custom instructions specifically tailored for cryptographic algorithms, the coprocessor achieves higher efficiency and reduced cycles per instruction (CPI) compared to traditional instruction sets. The adoption of RISC-V 128-bit architecture significantly reduces the total number of instructions required for complex cryptographic tasks, leading to faster execution times and improved overall performance. Comparisons are made with 32-bit and 64-bit architectures, highlighting the advantages of the 128-bit architecture in terms of reduced instruction count and CPI. In conclusion, the abstract cryptographic coprocessor presented in this study offers significant advantages in terms of algorithm flexibility, security, and integration with the main CPU. By leveraging AMBA protocols and employing direct links for data transfer, the coprocessor achieves high-performance cryptographic operations without compromising system efficiency. With its TCM and external program memory, the coprocessor is capable of securely executing a wide range of cryptographic algorithms. This versatility and adaptability, coupled with the benefits of custom instructions and the 128-bit architecture, make it an invaluable asset for secure embedded systems, meeting the demands of modern cryptographic applications.

Keywords: abstract cryptographic coprocessor, AMBA protocols, ECC, RSA, AES, tightly coupled memory, secure embedded systems, RISC-V ISE, custom instructions, instruction count, cycles per instruction

Procedia PDF Downloads 47
30324 Design and Implementation of a Geodatabase and WebGIS

Authors: Sajid Ali, Dietrich Schröder

Abstract:

The merging of internet and Web has created many disciplines and Web GIS is one these disciplines which is effectively dealing with the geospatial data in a proficient way. Web GIS technologies have provided an easy accessing and sharing of geospatial data over the internet. However, there is a single platform for easy and multiple accesses of the data lacks for the European Caribbean Association (Europaische Karibische Gesselschaft - EKG) to assist their members and other research community. The technique presented in this paper deals with designing of a geodatabase using PostgreSQL/PostGIS as an object oriented relational database management system (ORDBMS) for competent dissemination and management of spatial data and Web GIS by using OpenGeo Suite for the fast sharing and distribution of the data over the internet. The characteristics of the required design for the geodatabase have been studied and a specific methodology is given for the purpose of designing the Web GIS. At the end, validation of this Web based geodatabase has been performed over two Desktop GIS software and a web map application and it is also discussed that the contribution has all the desired modules to expedite further research in the area as per the requirements.

Keywords: desktop GISSoftware, European Caribbean association, geodatabase, OpenGeo suite, postgreSQL/PostGIS, webGIS, web map application

Procedia PDF Downloads 311
30323 Examining the Relationship between Preferred Leadership Style and Motivation of Female Volleyball Players in Ethiopian Primer League Clubs

Authors: Meseret Mulugeta, Alemmebrat Kiflu, Belaynehchikle

Abstract:

The purpose of the present study was to examine the preferred leadership style and motivation of premier league volleyball players. The sample encompassed 46 female premier league volleyball players whose ages ranged between 15 and 35 years. The data were collected using standardized questionnaires. The questionnaires were distributed to 46 female players from five volleyball clubs in the Premier League. To evaluate the motivational level of the players, the Sports Motivation Scale (SMS-6) was used. The leadership scale for sport was used to evaluate leadership. Descriptive statistics and the person correlation coefficient (P <0.05) were used to validate the relationship between leadership style and motivation. The result showed that there is a meaningful and significant relationship between leadership style and motivation. Concerning preferred coaching styles, the most preferred style was training and instruction, with a mean score of 4.10, and the least preferred style was autocratic, with a mean score of 3.37. The result of the Pearson correlation coefficient showed that the correlation between motivation types and leadership styles showed that motivation was significantly and positively correlated with all independent variables except autocratic leadership style, which is negatively correlated with motivation. This study’s nobility is to provide evidence for the most effective coaching to practice the training and instruction behaviour and social support behaviour leadership styles and refrain from using the autocratic leadership style.

Keywords: autocratic, training and instruction, motivation, leadership style

Procedia PDF Downloads 56
30322 Formal Sector Employment, Economic Capital and Human Capacity Development: Voices of Single Mothers from South Africa and Germany

Authors: Tanusha Raniga, Michael Boecker, Maud Mthembu

Abstract:

This paper considers the formal employment sector, human capacity development and economic capital of single-mother households’ as they strive to sustain livelihoods. This paper advances empirical data in the field of economic and social development policy. The correlation between educational level, human capacity development and economic self-reliance of single-mother households is considered. This paper presents empirical evidence obtained from qualitative in-depth interviews conducted with twenty-five single mothers who were working in the formal work sector in Hagen, Germany and two provinces, namely KwaZulu-Natal and Gauteng in South Africa. This is an underexplored research area as most of the international literature focuses on pathology and victimhood related to single-mother households. Instead, this paper presents the biographic profiles and discusses two key themes that emerged from the data analysis namely; formal and informal streams of income enhanced human capital development through access to further education and training opportunities. The women perceived these themes as facilitating factors which helped them sustain their households. The paper presents some suggestions for policymakers and social work practitioners to consider to improve support systems and avoid economic exclusion of single mothers who work within the first economy.

Keywords: single mothers, formal work sector, economic capital, human capital

Procedia PDF Downloads 134
30321 Virtual Reality and Avatars in Education

Authors: Michael Brazley

Abstract:

Virtual Reality (VR) and 3D videos are the most current generation of learning technology today. Virtual Reality and 3D videos are being used in professional offices and Schools now for marketing and education. Technology in the field of design has progress from two dimensional drawings to 3D models, using computers and sophisticated software. Virtual Reality is being used as collaborative means to allow designers and others to meet and communicate inside models or VR platforms using avatars. This research proposes to teach students from different backgrounds how to take a digital model into a 3D video, then into VR, and finally VR with multiple avatars communicating with each other in real time. The next step would be to develop the model where people from three or more different locations can meet as avatars in real time, in the same model and talk to each other. This research is longitudinal, studying the use of 3D videos in graduate design and Virtual Reality in XR (Extended Reality) courses. The research methodology is a combination of quantitative and qualitative methods. The qualitative methods begin with the literature review and case studies. The quantitative methods come by way of student’s 3D videos, survey, and Extended Reality (XR) course work. The end product is to develop a VR platform with multiple avatars being able to communicate in real time. This research is important because it will allow multiple users to remotely enter your model or VR platform from any location in the world and effectively communicate in real time. This research will lead to improved learning and training using Virtual Reality and Avatars; and is generalizable because most Colleges, Universities, and many citizens own VR equipment and computer labs. This research did produce a VR platform with multiple avatars having the ability to move and speak to each other in real time. Major implications of the research include but not limited to improved: learning, teaching, communication, marketing, designing, planning, etc. Both hardware and software played a major role in project success.

Keywords: virtual reality, avatars, education, XR

Procedia PDF Downloads 74