Search results for: limited resources
6455 The Application of Hellomac Rockfall Alert System in Rockfall Barriers: An Explainer
Authors: Kinjal Parmar, Matteo Lelli
Abstract:
The usage of IoT technology as a rockfall alert system is relatively new. This paper explains the potential of such an alert system called HelloMac from Maccaferri which provides transportation infrastructure asset owners the way to effectively utilize their resources in the detection of boulder impacts on rockfall barriers. This would ensure a faster assessment of the impacted barrier and subsequently facilitates the implementation of remedial works in an effective and timely manner. In addition, the HelloMac can also be integrated with another warning system to alert vehicle users of the unseen dangers ahead. HelloMac is developed to work also in remote areas, where cell coverage is not available. User gets notified when a rockfall even occurs via mobile app, SMS and email. Using such alarming systems effectively, we can reduce the risk of rockfall hazard.Keywords: rockfall, barrier, HelloMac, rockfall alert system
Procedia PDF Downloads 526454 Effectiveness of an Unorthodox Intervention for Work-Family Interaction: A Field Experiment
Authors: Hassan Rasool
Abstract:
There is limited research in the intervention domain of work family interaction. We identified that meditation could be effective in coping work family conflict and nurturing work family facilitation across domains. We conducted pretest posttest control group field experiment on a sample of sixty employees to test the effectiveness of meditation in a financial sector organization. Empirical evidence confirms that the intervention was effective in coping work family conflict & nurturing facilitation across work & home domains. The intervention, also positively affected a known outcome (i.e. satisfaction at work and home) of work family interaction. Future research perspectives on the use of unorthodox interventions in the domain of work family interaction are also discussed.Keywords: work family interaction, meditation, satisfaction, experiment
Procedia PDF Downloads 4586453 Gifted Disadvantage in Education Safety Net: A Reality Check: A Case Study From India
Authors: Jyoti Sharma
Abstract:
Although notion of giftedness is a reality, yet it swings along the pendulum of equality and excellence. At times, nurturance of gifted abilities becomes a struggle of better catchment of resources and facilities. Those from affluent setup are blessed with better support system whereas gifted children from disadvantaged group suffer from submissive upbringing. In developing countries like India, with diverse demographic profiles, socio-cultural diversity and economic disparity, the very concept of equality in education face severe challenge. The present paper presents the dichotomy of ideology of equality and excellence in education practices. It highlights the need of wider vision, better policy making and decentralized implementation services to allow gifted children to enjoy what they are; dream what they can be; and promote what they will be.Keywords: gifted, disadvantaged, education safety net, India
Procedia PDF Downloads 5286452 Gender Equality and the Politics of Presence among the Maasai in Kenya
Authors: Shillah Memusi
Abstract:
Underrepresentation of women in governance structures is a global phenomenon, with patriarchal considerations being among the main, if not the top, reason for this in Sub Saharan Africa. This paper demonstrates that gender norms and informal rules have perpetuated a culture of stereotypical gender roles that have limited women’s public participation and leadership in society. To achieve this, the paper explores barriers to women’s political engagement, and how these are navigated in the face of gender equality laws. Situated in Kenya’s Maasai community, the paper investigates the influence of set laws on the increased involvement of women from the patriarchal community in the political economy. It gives special attention to the intersectionality of formal and informal laws and the subsequent interpretation and implementation of gender equality. The paper then concludes by demonstrating the benefits of exploring alternative gender equality pathways, as informed by contextual realities of settings such as patriarchal communities.Keywords: equality, Kenya, patriarchy, public participation, women
Procedia PDF Downloads 3006451 A New Method for Fault Detection
Authors: Mehmet Hakan Karaata, Ali Hamdan, Omer Yusuf Adam Mohamed
Abstract:
Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths.Keywords: Byzantine faults, distributed systems, fault detection, network protocols, node-disjoint paths
Procedia PDF Downloads 4486450 Identifying Physiological Markers That Are Sensitive to Cognitive Load in Preschoolers
Authors: Priyashri Kamlesh Sridhar, Suranga Nanayakkara
Abstract:
Current frameworks in assessment follow lesson delivery and rely heavily on test performance or teacher’s observations. This, however, neglects the underlying cognitive load during the learning process. Identifying the pivotal points when the load occurs helps design effective pedagogies and tools that respond to learners’ cognitive state. There has been limited research on quantifying cognitive load in preschoolers, real-time. In this study, we recorded electrodermal activity and heart rate variability (HRV) from 10 kindergarteners performing executive function tasks and Johnson Woodcock test of cognitive abilities. Preliminary findings suggest that there are indeed sensitive task-dependent markers in skin conductance (number of SCRs and average amplitude of SCRs) and HRV (mean heart rate and low frequency component) captured during the learning process.Keywords: early childhood, learning, methodologies, pedagogies
Procedia PDF Downloads 3206449 Pareto Optimal Material Allocation Mechanism
Authors: Peter Egri, Tamas Kis
Abstract:
Scheduling problems have been studied by the algorithmic mechanism design research from the beginning. This paper is focusing on a practically important, but theoretically rather neglected field: the project scheduling problem where the jobs connected by precedence constraints compete for various nonrenewable resources, such as materials. Although the centralized problem can be solved in polynomial-time by applying the algorithm of Carlier and Rinnooy Kan from the Eighties, obtaining materials in a decentralized environment is usually far from optimal. It can be observed in practical production scheduling situations that project managers tend to cache the required materials as soon as possible in order to avoid later delays due to material shortages. This greedy practice usually leads both to excess stocks for some projects and materials, and simultaneously, to shortages for others. The aim of this study is to develop a model for the material allocation problem of a production plant, where a central decision maker—the inventory—should assign the resources arriving at different points in time to the jobs. Since the actual due dates are not known by the inventory, the mechanism design approach is applied with the projects as the self-interested agents. The goal of the mechanism is to elicit the required information and allocate the available materials such that it minimizes the maximal tardiness among the projects. It is assumed that except the due dates, the inventory is familiar with every other parameters of the problem. A further requirement is that due to practical considerations monetary transfer is not allowed. Therefore a mechanism without money is sought which excludes some widely applied solutions such as the Vickrey–Clarke–Groves scheme. In this work, a type of Serial Dictatorship Mechanism (SDM) is presented for the studied problem, including a polynomial-time algorithm for computing the material allocation. The resulted mechanism is both truthful and Pareto optimal. Thus the randomization over the possible priority orderings of the projects results in a universally truthful and Pareto optimal randomized mechanism. However, it is shown that in contrast to problems like the many-to-many matching market, not every Pareto optimal solution can be generated with an SDM. In addition, no performance guarantee can be given compared to the optimal solution, therefore this approximation characteristic is investigated with experimental study. All in all, the current work studies a practically relevant scheduling problem and presents a novel truthful material allocation mechanism which eliminates the potential benefit of the greedy behavior that negatively influences the outcome. The resulted allocation is also shown to be Pareto optimal, which is the most widely used criteria describing a necessary condition for a reasonable solution.Keywords: material allocation, mechanism without money, polynomial-time mechanism, project scheduling
Procedia PDF Downloads 3336448 A Literature Review Evaluating the Use of Online Problem-Based Learning and Case-Based Learning Within Dental Education
Authors: Thomas Turner
Abstract:
Due to the Covid-19 pandemic alternative ways of delivering dental education were required. As a result, many institutions moved teaching online. The impact of this is poorly understood. Is online problem-based learning (PBL) and case-based learning (CBL) effective and is it suitable in the post-pandemic era? PBL and CBL are both types of interactive, group-based learning which are growing in popularity within many dental schools. PBL was first introduced in the 1960’s and can be defined as learning which occurs from collaborative work to resolve a problem. Whereas CBL encourages learning from clinical cases, encourages application of knowledge and helps prepare learners for clinical practice. To evaluate the use of online PBL and CBL. A literature search was conducted using the CINAHL, Embase, PubMed and Web of Science databases. Literature was also identified from reference lists. Studies were only included from dental education. Seven suitable studies were identified. One of the studies found a high learner and facilitator satisfaction rate with online CBL. Interestingly one study found learners preferred CBL over PBL within an online format. A study also found, that within the context of distance learning, learners preferred a hybrid curriculum including PBL over a traditional approach. A further study pointed to the limitations of PBL within an online format, such as reduced interaction, potentially hindering the development of communication skills and the increased time and technology support required. An audience response system was also developed for use within CBL and had a high satisfaction rate. Interestingly one study found achievement of learning outcomes was correlated with the number of student and staff inputs within an online format. Whereas another study found the quantity of learner interactions were important to group performance, however the quantity of facilitator interactions was not. This review identified generally favourable evidence for the benefits of online PBL and CBL. However, there is limited high quality evidence evaluating these teaching methods within dental education and there appears to be limited evidence comparing online and faceto-face versions of these sessions. The importance of the quantity of learner interactions is evident, however the importance of the quantity of facilitator interactions appears to be questionable. An element to this may be down to the quality of interactions, rather than just quantity. Limitations of online learning regarding technological issues and time required for a session are also highlighted, however as learners and facilitators get familiar with online formats, these may become less of an issue. It is also important learners are encouraged to interact and communicate during these sessions, to allow for the development of communication skills. Interestingly CBL appeared to be preferred to PBL in an online format. This may reflect the simpler nature of CBL, however further research is required to explore this finding. Online CBL and PBL appear promising, however further research is required before online formats of these sessions are widely adopted in the post-pandemic era.Keywords: case-based learning, online, problem-based learning, remote, virtual
Procedia PDF Downloads 776447 Groundwater Level Modelling by ARMA and PARMA Models (Case Study: Qorveh Aquifer)
Authors: Motalleb Byzedi, Seyedeh Chaman Naderi Korvandan
Abstract:
Regarding annual statistics of groundwater level resources about current piezometers at Qorveh plains, both ARMA & PARMA modeling methods were applied in this study by the using of SAMS software. Upon performing required tests, a model was used with minimum amount of Akaike information criteria and suitable model was selected for piezometers. Then it was possible to make necessary estimations by using these models for future fluctuations in each piezometer. According to the results, ARMA model had more facilities for modeling of aquifer. Also it was cleared that eastern parts of aquifer had more failures than other parts. Therefore it is necessary to prohibit critical parts along with more supervision on taking rates of wells.Keywords: qorveh plain, groundwater level, ARMA, PARMA
Procedia PDF Downloads 2866446 Interface Fracture of Sandwich Composite Influenced by Multiwalled Carbon Nanotube
Authors: Alak Kumar Patra, Nilanjan Mitra
Abstract:
Higher strength to weight ratio is the main advantage of sandwich composite structures. Interfacial delamination between the face sheet and core is a major problem in these structures. Many research works are devoted to improve the interfacial fracture toughness of composites majorities of which are on nano and laminated composites. Work on influence of multiwalled carbon nano-tubes (MWCNT) dispersed resin system on interface fracture of glass-epoxy PVC core sandwich composite is extremely limited. Finite element study is followed by experimental investigation on interface fracture toughness of glass-epoxy (G/E) PVC core sandwich composite with and without MWCNT. Results demonstrate an improvement in interface fracture toughness values (Gc) of samples with a certain percentages of MWCNT. In addition, dispersion of MWCNT in epoxy resin through sonication followed by mixing of hardener and vacuum resin infusion (VRI) technology used in this study is an easy and cost effective methodology in comparison to previously adopted other methods limited to laminated composites. The study also identifies the optimum weight percentage of MWCNT addition in the resin system for maximum performance gain in interfacial fracture toughness. The results agree with finite element study, high-resolution transmission electron microscope (HRTEM) analysis and fracture micrograph of field emission scanning electron microscope (FESEM) investigation. Interface fracture toughness (GC) of the DCB sandwich samples is calculated using the compliance calibration (CC) method considering the modification due to shear. Compliance (C) vs. crack length (a) data of modified sandwich DCB specimen is fitted to a power function of crack length. The calculated mean value of the exponent n from the plots of experimental results is 2.22 and is different from the value (n=3) prescribed in ASTM D5528-01for mode 1 fracture toughness of laminate composites (which is the basis for modified compliance calibration method). Differentiating C with respect to crack length (a) and substituting it in the expression GC provides its value. The research demonstrates improvement of 14.4% in peak load carrying capacity and 34.34% in interface fracture toughness GC for samples with 1.5 wt% MWCNT (weight % being taken with respect to weight of resin) in comparison to samples without MWCNT. The paper focuses on significant improvement in experimentally determined interface fracture toughness of sandwich samples with MWCNT over the samples without MWCNT using much simpler method of sonication. Good dispersion of MWCNT was observed in HRTEM with 1.5 wt% MWCNT addition in comparison to other percentages of MWCNT. FESEM studies have also demonstrated good dispersion and fiber bridging of MWCNT in resin system. Ductility is also observed to be higher for samples with MWCNT in comparison to samples without.Keywords: carbon nanotube, epoxy resin, foam, glass fibers, interfacial fracture, sandwich composite
Procedia PDF Downloads 3036445 Water Crisis or Crisis of Water Management: Assessing Water Governance in Iran
Authors: Sedigheh Kalantari
Abstract:
Like many countries in the arid and semi-arid belt, Iran experiences a natural limitation in the availability of water resources. However, rapid socioeconomic development has created a serious water crisis in a nation that was once one of the world’s pioneers in sustainable water management, due to the Persians’ contribution to hydraulic engineering inventions – the Qanat – throughout history. The exogenous issues like the changing climate, frequent droughts, and international sanctions are only crisis catalyzers, not the main cause of the water crisis; and a resilient water management system is expected to be capable of coping with these periodic external pressures. The current dramatic water security issues in Iran are rooted in managerial, political, and institutional challenges rather than engineering and technical issues, and the country is suffering from challenges in water governance. The country, instead of rigorous water conservation efforts, is still focused on supply-driven approach, technology and centralized methods, and structural solutions that aim to increase water supply; while the effectiveness of water governance and management has often left unused. To solve these issues, it is necessary to assess the present situation and its evolution over time. In this respect, establishing water governance assessment mechanisms will be a significant aspect of this paper. The research framework, however, is a conceptual framework to assess governance performance of Iran to critically diagnose problematic issues and areas, as well as proffer empirically based solutions and determine the best possible steps towards transformational processes. This concept aims to measure the adequacy of current solutions and strategies designed to ameliorate these problems and then develop and prescribe adequate futuristic solutions. Thus, the analytical framework developed in this paper seeks to provide insights on key factors influencing water governance in Iranian cities, institutional frameworks to manage water across scales and authorities, multi-level management gaps and policy responses, through an evidence-based approach and good practices to drive reform toward sustainability and water resource conservation. The findings of this paper show that the current structure of the water governance system in Iran, coupled with the lack of a comprehensive understanding of the root causes of the problem, leaves minimal hope for developing sustainable solutions to Iran’s increasing water crisis. In order to follow sustainable development approaches, Iran needs to replace symptom management with problem prevention.Keywords: governance, Iran, sustainable development, water management, water resources
Procedia PDF Downloads 266444 Contemporary Mexican Shadow Politics: The War on Drugs and the Issue of Security
Authors: Lisdey Espinoza Pedraza
Abstract:
Organised crime in Mexico evolves faster that our capacity to understand and explain it. Organised gangs have become successful entrepreneurs in many ways ad they have somehow mimicked the working ways of the authorities and in many cases, they have successfully infiltrated the governmental spheres. This business model is only possible under a clear scheme of rampant impunity. Impunity, however, is not exclusive to the PRI. Nor the PRI, PAN, or PRD can claim the monopoly of corruption, but what is worse is that none can claim full honesty in their acts either. The current security crisis in Mexico shows a crisis in the Mexican political party system. Corruption today is not only a problem of dishonesty and the correct use of public resources. It is the principal threat to Mexican democracy, governance, and national security.Keywords: security, war on drugs, drug trafficking, Mexico, Latin America, United States
Procedia PDF Downloads 4176443 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks
Authors: Rossouw De Bruin, Sebastiaan H. Von Solms
Abstract:
The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model
Procedia PDF Downloads 2676442 Velocity Distribution in Density Currents Flowing over Rough Beds
Authors: Reza Nasrollahpour, Mohamad Hidayat Bin Jamal, Zulhilmi Bin Ismail
Abstract:
Density currents are generated when the fluid of one density is released into another fluid with a different density. These currents occur in a variety of natural and man-made environments, and this emphasises the importance of studying them. In most practical cases, the density currents flow over the surfaces which are not plane; however, there have been limited investigations in this regard. This study uses laboratory experiments to analyse the influence of bottom roughness on the velocity distribution within these dense underflows. The currents are analysed over a plane surface and three different configurations of beam-roughened beds. The velocity profiles are collected using Acoustic Doppler Velocimetry technique, and the distribution of velocity within these currents is formulated for the tested beds. The results indicate that the empirical power and Gaussian relations can describe the velocity distribution in the inner and outer regions of the profiles, respectively. Moreover, it is found that the bottom roughness is the primary controlling parameter in the inner region.Keywords: density currents, velocity profiles, Acoustic Doppler Velocimeter, bed roughness
Procedia PDF Downloads 1856441 Dark Heritage Tourism and Visitor Behaviour: The Case of Elmina Castle, Ghana
Authors: Girish Prayag, Wantanee Suntikul, Elizabeth Agyeiwaah
Abstract:
Current research on dark tourism largely follows residents’ perspectives with limited evaluations of tourists’ experiences. Unravelling the case of a dark heritage site in Elmina, Ghana, this paper develops a theoretical model to understand the relationships among four constructs namely, motivation, tourism impacts, place attachment, and satisfaction. Based on a sample of 414 domestic tourists, PLS-SEM confirmed several relationships and inter-relationships among the four constructs. For example, motivation had a positive relationship with perceptions of positive and negative tourism impacts suggesting that the more tourists were motivated to visit the site for cultural/learning experiences, the more positive and negative tourism impacts they perceived. Implications for dark tourism and heritage site management are offered.Keywords: dark tourism, motivation, place attachment, tourism impacts
Procedia PDF Downloads 4326440 Competitive Strategy that Affect to the Competitive Advantage for Hotel and Resort in Samut Songkram Province
Authors: Phatthanan Chaiyabut
Abstract:
This research paper investigates whether the development of environmentally friendly practices by luxury hotel resorts can be used as a strategy for gaining competitive advantage through differentiation, and suggests ways to do it. The focus is on luxury hotel resorts in Samut Songkram Province, Thailand. A questionnaire was utilized as a tool to collect data. Statistics utilized in this research included frequency, percentage, mean, standard deviation, and multiple regression analysis. Findings indicate that environmentally friendly development of hotel resorts in Samut Songkram Province has a very limited use as a corporate strategy. Only two luxury hotel resorts had it incorporated in their strategy, it is not much used in marketing indicating environmental issues are not seen as important. This was confirmed through the interviews with the managers that it is not seen as important issue to promote.Keywords: competitive advantage, competitive strategy, Samut Songkram Province, hotel and resort
Procedia PDF Downloads 2786439 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation
Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han
Abstract:
As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.Keywords: actuator, user authentication, security evaluation, haptic actuator
Procedia PDF Downloads 3466438 Computer Aide Discrimination of Benign and Malignant Thyroid Nodules by Ultrasound Imaging
Authors: Akbar Gharbali, Ali Abbasian Ardekani, Afshin Mohammadi
Abstract:
Introduction: Thyroid nodules have an incidence of 33-68% in the general population. More than 5-15% of these nodules are malignant. Early detection and treatment of thyroid nodules increase the cure rate and provide optimal treatment. Between the medical imaging methods, Ultrasound is the chosen imaging technique for assessment of thyroid nodules. The confirming of the diagnosis usually demands repeated fine-needle aspiration biopsy (FNAB). So, current management has morbidity and non-zero mortality. Objective: To explore diagnostic potential of automatic texture analysis (TA) methods in differentiation benign and malignant thyroid nodules by ultrasound imaging in order to help for reliable diagnosis and monitoring of the thyroid nodules in their early stages with no need biopsy. Material and Methods: The thyroid US image database consists of 70 patients (26 benign and 44 malignant) which were reported by Radiologist and proven by the biopsy. Two slices per patient were loaded in Mazda Software version 4.6 for automatic texture analysis. Regions of interests (ROIs) were defined within the abnormal part of the thyroid nodules ultrasound images. Gray levels within an ROI normalized according to three normalization schemes: N1: default or original gray levels, N2: +/- 3 Sigma or dynamic intensity limited to µ+/- 3σ, and N3: present intensity limited to 1% - 99%. Up to 270 multiscale texture features parameters per ROIs per each normalization schemes were computed from well-known statistical methods employed in Mazda software. From the statistical point of view, all calculated texture features parameters are not useful for texture analysis. So, the features based on maximum Fisher coefficient and the minimum probability of classification error and average correlation coefficients (POE+ACC) eliminated to 10 best and most effective features per normalization schemes. We analyze this feature under two standardization states (standard (S) and non-standard (NS)) with Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA) and Non-Linear Discriminant Analysis (NDA). The 1NN classifier was performed to distinguish between benign and malignant tumors. The confusion matrix and Receiver operating characteristic (ROC) curve analysis were used for the formulation of more reliable criteria of the performance of employed texture analysis methods. Results: The results demonstrated the influence of the normalization schemes and reduction methods on the effectiveness of the obtained features as a descriptor on discrimination power and classification results. The selected subset features under 1%-99% normalization, POE+ACC reduction and NDA texture analysis yielded a high discrimination performance with the area under the ROC curve (Az) of 0.9722, in distinguishing Benign from Malignant Thyroid Nodules which correspond to sensitivity of 94.45%, specificity of 100%, and accuracy of 97.14%. Conclusions: Our results indicate computer-aided diagnosis is a reliable method, and can provide useful information to help radiologists in the detection and classification of benign and malignant thyroid nodules.Keywords: ultrasound imaging, thyroid nodules, computer aided diagnosis, texture analysis, PCA, LDA, NDA
Procedia PDF Downloads 2796437 Capture Zone of a Well Field in an Aquifer Bounded by Two Parallel Streams
Authors: S. Nagheli, N. Samani, D. A. Barry
Abstract:
In this paper, the velocity potential and stream function of capture zone for a well field in an aquifer bounded by two parallel streams with or without a uniform regional flow of any directions are presented. The well field includes any number of extraction or injection wells or a combination of both types with any pumping rates. To delineate the capture envelope, the potential and streamlines equations are derived by conformal mapping method. This method can help us to release constrains of other methods. The equations can be applied as useful tools to design in-situ groundwater remediation systems, to evaluate the surface–subsurface water interaction and to manage the water resources.Keywords: complex potential, conformal mapping, image well theory, Laplace’s equation, superposition principle
Procedia PDF Downloads 4326436 Personalized Learning: An Analysis Using Item Response Theory
Authors: A. Yacob, N. Hj. Ali, M. H. Yusoff, M. Y. MohdSaman, W. M. A. F. W. Hamzah
Abstract:
Personalized learning becomes increasingly popular which not is restricted by time, place or any other barriers. This study proposes an analysis of Personalized Learning using Item Response Theory which considers course material difficulty and learner ability. The study investigates twenty undergraduate students at TATI University College, who are taking programming subject. By using the IRT, it was found that, finding the most appropriate problem levels to each student include high and low level test items together is not a problem. Thus, the student abilities can be asses more accurately and fairly. Learners who experience more anxiety will affect a heavier cognitive load and receive lower test scores. Instructors are encouraged to provide a supportive learning environment to enhance learning effectiveness because Cognitive Load Theory concerns the limited capacity of the brain to absorb new information.Keywords: assessment, item response theory, cognitive load theory, learning, motivation, performance
Procedia PDF Downloads 3176435 A New Approach for Improving Accuracy of Multi Label Stream Data
Authors: Kunal Shah, Swati Patel
Abstract:
Many real world problems involve data which can be considered as multi-label data streams. Efficient methods exist for multi-label classification in non streaming scenarios. However, learning in evolving streaming scenarios is more challenging, as the learners must be able to adapt to change using limited time and memory. Classification is used to predict class of unseen instance as accurate as possible. Multi label classification is a variant of single label classification where set of labels associated with single instance. Multi label classification is used by modern applications, such as text classification, functional genomics, image classification, music categorization etc. This paper introduces the task of multi-label classification, methods for multi-label classification and evolution measure for multi-label classification. Also, comparative analysis of multi label classification methods on the basis of theoretical study, and then on the basis of simulation was done on various data sets.Keywords: binary relevance, concept drift, data stream mining, MLSC, multiple window with buffer
Procedia PDF Downloads 5846434 Exploring Health Care Self-Advocacy of Queer Patients
Authors: Tiffany Wicks
Abstract:
Queer patients can face issues with self-advocating due to the factors of implicit provider bias, lack of tools and resources to self-advocate, and lack of comfortability in self-advocating based on prior experiences. In this study, five participants who identify as queer discussed their interactions with their healthcare providers. This exploratory study revealed that there is a need for healthcare provider education to reduce implicit bias and judgments about queer patients. There is also an important need for peer advocates in order to further inform healthcare promotion and decision-making before and during provider visits in an effort for a better outcome. Through this exploration, queer patients voiced their experiences and concerns to inform a need for change in healthcare collaboration between providers and patients in the queer community.Keywords: queer, LGBT, patient, self-advocacy, healthcare
Procedia PDF Downloads 876433 Public Awareness of Aphasia in Taiwan: A Pilot Study
Authors: Ching-Yu Lin
Abstract:
The number of patients with aphasia has been gradually increasing; however, public awareness of aphasia is still limited. Moreover, surveys about public awareness of aphasia have been conducted in several countries, but there is no research about public awareness of aphasia in Taiwan so far. Therefore, this study aims at the investigation of public awareness of aphasia in Taiwan. In this pilot study, the original English-version questionnaire will be translated into Mandarin Chinese by a speech therapist (the author), and 100 Taiwanese over 18 years old will be recruited to finish the questionnaire. People with an occupation about health or medical will be excluded. In order to reach more people, the questionnaire will be an Internet survey by Google Forms, and the URL of the survey will be distributed by messaging, i.e. e-mail, Facebook Messenger, Instagram DM, or Line. Data will be analyzed via PASW Statistic 18. Descriptive statistics will be used to summarize what proportion of the public have heard of aphasia and what proportion of the public have basic knowledge of aphasia in Taiwan. The sources of information about aphasia will also be investigated. Further, differences in awareness of aphasia due to age, gender, and education level will be discussed.Keywords: aphasia, public awareness, public knowledge, taiwan
Procedia PDF Downloads 1056432 Studying Methodological Maps on the Engineering Education Program
Authors: Elsaed Elsaed
Abstract:
With the constant progress in our daily lives through information and communication technology and the presence of abundant in research activities in the hardware and software associated with them, and develop and improve their performance, but still there is a need to provide all combined solutions in one business. A systematic mapping study was conducted to investigate the contributions that have been prepared, and the areas of knowledge that are explored further, and any aspects of the research used to divide the common understanding of the latest technology in software engineering education. Which, we have categorized into a well-defined engineering framework. An overview of current research topics and trends and their distribution by type of research and scope of application. In addition, the topics were grouped into groups and a list of proposed methods and frameworks and tools was used. The map shows that the current research impact is limited to a few areas of knowledge are needed to map a future path to fill the gaps in the instruction activities.Keywords: methodological maps, engineering education program, literature survey, communication technology
Procedia PDF Downloads 1406431 Management and Agreement Protocol in Computer Security
Authors: Abdulameer K. Hussain
Abstract:
When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).Keywords: agreement parameters, key agreement, key exchange, security management
Procedia PDF Downloads 4216430 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207
Authors: Mazhar Hamayun
Abstract:
Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207
Procedia PDF Downloads 876429 Fine-Tuned Transformers for Translating Multi-Dialect Texts to Modern Standard Arabic
Authors: Tahar Alimi, Rahma Boujebane, Wiem Derouich, Lamia Hadrich Belguith
Abstract:
Machine translation task of low-resourced languages such as Arabic is a challenging task. Despite the appearance of sophisticated models based on the latest deep learning techniques, namely the transfer learning and transformers, all models prove incapable of carrying out an acceptable translation, which includes Arabic Dialects (AD), because they do not have official status. In this paper, we present a machine translation model designed to translate Arabic multidialectal content into Modern Standard Arabic (MSA), leveraging both new and existing parallel resources. The latter achieved the best results for both Levantine and Maghrebi dialects with a BLEU score of 64.99.Keywords: Arabic translation, dialect translation, fine-tune, MSA translation, transformer, translation
Procedia PDF Downloads 616428 System-Driven Design Process for Integrated Multifunctional Movable Concepts
Authors: Oliver Bertram, Leonel Akoto Chama
Abstract:
In today's civil transport aircraft, the design of flight control systems is based on the experience gained from previous aircraft configurations with a clear distinction between primary and secondary flight control functions for controlling the aircraft altitude and trajectory. Significant system improvements are now seen particularly in multifunctional moveable concepts where the flight control functions are no longer considered separate but integral. This allows new functions to be implemented in order to improve the overall aircraft performance. However, the classical design process of flight controls is sequential and insufficiently interdisciplinary. In particular, the systems discipline is involved only rudimentarily in the early phase. In many cases, the task of systems design is limited to meeting the requirements of the upstream disciplines, which may lead to integration problems later. For this reason, approaching design with an incremental development is required to reduce the risk of a complete redesign. Although the potential and the path to multifunctional moveable concepts are shown, the complete re-engineering of aircraft concepts with less classic moveable concepts is associated with a considerable risk for the design due to the lack of design methods. This represents an obstacle to major leaps in technology. This gap in state of the art is even further increased if, in the future, unconventional aircraft configurations shall be considered, where no reference data or architectures are available. This means that the use of the above-mentioned experience-based approach used for conventional configurations is limited and not applicable to the next generation of aircraft. In particular, there is a need for methods and tools for a rapid trade-off between new multifunctional flight control systems architectures. To close this gap in the state of the art, an integrated system-driven design process for multifunctional flight control systems of non-classical aircraft configurations will be presented. The overall goal of the design process is to find optimal solutions for single or combined target criteria in a fast process from the very large solution space for the flight control system. In contrast to the state of the art, all disciplines are involved for a holistic design in an integrated rather than a sequential process. To emphasize the systems discipline, this paper focuses on the methodology for designing moveable actuation systems in the context of this integrated design process of multifunctional moveables. The methodology includes different approaches for creating system architectures, component design methods as well as the necessary process outputs to evaluate the systems. An application example of a reference configuration is used to demonstrate the process and validate the results. For this, new unconventional hydraulic and electrical flight control system architectures are calculated which result from the higher requirements for multifunctional moveable concept. In addition to typical key performance indicators such as mass and required power requirements, the results regarding the feasibility and wing integration aspects of the system components are examined and discussed here. This is intended to show how the systems design can influence and drive the wing and overall aircraft design.Keywords: actuation systems, flight control surfaces, multi-functional movables, wing design process
Procedia PDF Downloads 1446427 Virtual Engineers on Wheels: Transitioning from Mobile to Online Outreach
Authors: Kauser Jahan, Jason Halvorsen, Kara Banks, Kara Natoli, Elizabeth McWeeney, Brittany LeMasney, Nicole Caramanna, Justin Hillman, Christopher Hauske, Meghan Sparks
Abstract:
The Virtual Engineers on Wheels (ViEW) is a revised version of our established mobile K-12 outreach program Engineers on Wheels in order to address the pandemic. The Virtual Engineers on Wheels' (VIEW) goal has stayed the same as in prior years: to provide K-12 students and educators with the necessary resources to peak interest in the expanding fields of engineering. With these trying times, the Virtual Engineers on Wheels outreach has adapted its medium of instruction to be more seamless with the online approach to teaching and outreach. In the midst of COVID-19, providing a safe transfer of information has become a constraint for research. The focus has become how to uphold a level of quality instruction without diminishing the safety of those involved by promoting proper health practices and giving hope to students as well as their families. Furthermore, ViEW has created resources on effective strategies that minimize risk factors of COVID-19 and inform families that there is still a promising future ahead. To obtain these goals while still maintaining true to the hands-on learning that is so crucial to young minds, the approach is online video lectures followed by experiments within different engineering disciplines. ViEW has created a comprehensive website that students can leverage to explore the different fields of study. One of the experiments entails teaching about drone usage and how it might play a factor in the future of unmanned deliveries. Some of the other experiments focus on the differences in mask materials and their effectiveness, as well as their environmental outlook. Having students perform from home enables them a safe environment to learn at their own pace while still providing quality instruction that would normally be achieved in the classroom. Contact information is readily available on the website to provide interested parties with a means to ask their inquiries. As it currently stands, the interest in engineering/STEM-related fields is underrepresented from women and certain minority groups. So alongside the desire to grow interest, helping balance the scales is one of the main priorities of VIEW. In previous years, VIEW surveyed students before and after instruction to see if their perception of engineering has changed. In general, it is the understanding that being exposed to engineering/STEM at a young age increases the chances that it will be pursued later in life.Keywords: STEM, engineering outreach, teaching pedagogy, pandemic
Procedia PDF Downloads 1296426 Tourism and Protected Areas: Challenges and Opportunities in Context of Arunachal Pradesh
Authors: Taba Tath
Abstract:
Arunachal Pradesh, located in the easternmost part of India, is known for its natural beauty and diverse tribal lifestyles. The state has the highest species richness and biological diversity among Northeast states in terms of flora, fauna, and tribal traditions and culture. The protection of nature and culture is a practice that is widely used by governments or nongovernmental organizations seeking to preserve the scenic beauty of landscapes and their natural resources in spaces that stand out for their natural and cultural value and have not been heavily impacted by human activity. The whole of Arunachal Pradesh comes under the purview of special permits such as the Inner Line Permit (ILP) and Protected Area Permit (PAP) for domestic and foreign travellers, respectively. Due to politically vibrant areas and naturally fragile in nature, the state needs to be protected, but at the same time, the demand for tourism activities is increasing gradually due to its unique blend of nature and socio-cultural richness. There are 13 protected areas in the state which is unexplored, and there are no tourism activities in these protected areas except for Namdapha National Park. Out of 13 protected areas, the Pakke Wildlife Sanctuary is one of the well-managed protected areas located near the Assam-Arunachal border, approximately 40km away from Tezpur town, Assam. The state has great potential for wildlife and nature-based tourism development, which can also indirectly support wildlife and nature-based livelihood options for the local inhabitants living in the peripheral of the sanctuary area due to its high richness in terms of flora and fauna. To promote the richness of the state, boost tourism, and the economic, social and environmental development of the area and local communities, a proper tourism management practice and framework are very much required. The research paper has made an attempt to study the role of stakeholders in preserving and promoting the Protected Areas for tourism development in a sustainable way. This is both a primary and secondary study conducted with field visits, interaction, questionnaire and observation with the various stakeholders and also conducted with the Government reports, magazines and other published sources available. Furthermore, this study will be relevant to all stakeholders for having knowledge and processes for promoting tourism in Protected Areas in a sustainable way. The results will provide relevant information and process for the management and promotion of the protected Areas and to strengthen the sustainable tourism activities in these areas.Keywords: protected area, inner line permit, protected area permit, management, government, nongovernmental organization, stakeholders, sustainable, natural resources
Procedia PDF Downloads 42