Search results for: educational approaches
4348 Analysis of Factors Affecting Public Awareness in Paying Zakat
Authors: Roikhan Mochamad Aziz
Abstract:
This study aims to analze the interdependence of several variables simultaneously in order to simplify the form of the relationship between some of the variables studied a number of factors less than the variable studied which means it can also describe the data structure of a research. Based 100 respondents from the public, such as the people of South Tangerang, this study used factor analysis tool. The results of this study indicate that the studied variables being formed into nine factors, namely faith factors, community factors, factors of social care, confidence factor, factor income, educational factors, self-satisfaction factors, factors work, and knowledge factor. Total variance of the 9 factors is 67,30% means that all nine of these factors are factors that can contribute too paying zakat of muzakki consciousness of 67,30% while the remaining 32,70% is supported by other factors outside the 9 factors.Keywords: zakat, analysis factor, faith, education, knowledge
Procedia PDF Downloads 2804347 Generating Real-Time Visual Summaries from Located Sensor-Based Data with Chorems
Authors: Z. Bouattou, R. Laurini, H. Belbachir
Abstract:
This paper describes a new approach for the automatic generation of the visual summaries dealing with cartographic visualization methods and sensors real time data modeling. Hence, the concept of chorems seems an interesting candidate to visualize real time geographic database summaries. Chorems have been defined by Roger Brunet (1980) as schematized visual representations of territories. However, the time information is not yet handled in existing chorematic map approaches, issue has been discussed in this paper. Our approach is based on spatial analysis by interpolating the values recorded at the same time, by sensors available, so we have a number of distributed observations on study areas and used spatial interpolation methods to find the concentration fields, from these fields and by using some spatial data mining procedures on the fly, it is possible to extract important patterns as geographic rules. Then, those patterns are visualized as chorems.Keywords: geovisualization, spatial analytics, real-time, geographic data streams, sensors, chorems
Procedia PDF Downloads 4014346 CoP-Networks: Virtual Spaces for New Faculty’s Professional Development in the 21st Higher Education
Authors: Eman AbuKhousa, Marwan Z. Bataineh
Abstract:
The 21st century higher education and globalization challenge new faculty members to build effective professional networks and partnership with industry in order to accelerate their growth and success. This creates the need for community of practice (CoP)-oriented development approaches that focus on cognitive apprenticeship while considering individual predisposition and future career needs. This work adopts data mining, clustering analysis, and social networking technologies to present the CoP-Network as a virtual space that connects together similar career-aspiration individuals who are socially influenced to join and engage in a process for domain-related knowledge and practice acquisitions. The CoP-Network model can be integrated into higher education to extend traditional graduate and professional development programs.Keywords: clustering analysis, community of practice, data mining, higher education, new faculty challenges, social network, social influence, professional development
Procedia PDF Downloads 1834345 Calculation of the Added Mass of a Submerged Object with Variable Sizes at Different Distances from the Wall via Lattice Boltzmann Simulations
Authors: Nastaran Ahmadpour Samani, Shahram Talebi
Abstract:
Added mass is an important quantity in analysis of the motion of a submerged object ,which can be calculated by solving the equation of potential flow around the object . Here, we consider systems in which a square object is submerged in a channel of fluid and moves parallel to the wall. The corresponding added mass at a given distance from the wall d and for the object size s (which is the side of square object) is calculated via lattice Blotzmann simulation . By changing d and s separately, their effect on the added mass is studied systematically. The simulation results reveal that for the systems in which d > 4s, the distance does not influence the added mass any more. The added mass increases when the object approaches the wall and reaches its maximum value as it moves on the wall (d -- > 0). In this case, the added mass is about 73% larger than which of the case d=4s. In addition, it is observed that the added mass increases by increasing of the object size s and vice versa.Keywords: Lattice Boltzmann simulation , added mass, square, variable size
Procedia PDF Downloads 4764344 Towards Better Quality in Healthcare and Operations Management: A Developmental Literature Review
Authors: Marc Dorval, Marie-Hélène Jobin
Abstract:
This work presents the various perspectives, dimensions, components and definitions given to quality in the operations management (OM) and healthcare services (HCS) literature in time, highlighting gaps and learning opportunities between the two disciplines through a thorough search into their rich and distinct body of knowledge. Greater and new insights about the general nature of quality are obtained with findings such as in OM, quality has been approached in six fairly distinct paradigms (excellence, value, conformity to specifications, attributes, satisfaction and meeting or exceeding customer expectations), whereas in HCS, two approaches are prominent (Donabedian’s structure, process and outcomes model and Lohr and Schroeder’s circumscribed definition). The two disciplines views on quality seem to have progressed much in parallel with little cross-learning from each other. This work then proposes an encompassing definition of quality as a lever and suggests further research and development avenues for a better use of the concept of quality by academics and practitioners alike toward the goals of greater organizational performance and improved management in healthcare and possibly other service domains.Keywords: healthcare, management, operations, quality, services
Procedia PDF Downloads 2294343 Time "And" Dimension(s) - Visualizing the 4th and 4+ Dimensions
Authors: Siddharth Rana
Abstract:
As we know so far, there are 3 dimensions that we are capable of interpreting and perceiving, and there is a 4th dimension, called time, about which we don’t know much yet. We, as humans, live in the 4th dimension, not the 3rd. We travel 3 dimensionally but cannot yet travel 4 dimensionally; perhaps if we could, then visiting the past and the future would be like climbing a mountain or going down a road. So far, we humans are not even capable of imagining any higher dimensions than the three dimensions in which we can travel. We are the beings of the 4th dimension; we are the beings of time; that is why we can travel 3 dimensionally; however, if, say, there were beings of the 5th dimension, then they would easily be able to travel 4 dimensionally, i.e., they could travel in the 4th dimension as well. Beings of the 5th dimension can easily time travel. However, beings of the 4th dimension, like us, cannot time travel because we live in a 4-D world, traveling 3 dimensionally. That means to ever do time travel, we just need to go to a higher dimension and not only perceive it but also be able to travel in it. However, traveling to the past is not very possible, unlike traveling to the future. Even if traveling to the past were possible, it would be very unlikely that an event in the past would be changed. In this paper, some approaches are provided to define time, our movement in time to the future, some aspects of time travel using dimensions, and how we can perceive a higher dimension.Keywords: time, dimensions, String theory, relativity
Procedia PDF Downloads 1074342 Teacher’s Self-Efficacy and Self-Perception of Teaching Professional Competences
Authors: V. Biasi, A. M. Ciraci, G. Domenici, N. Patrizi
Abstract:
We present two studies centered on the teacher’s perception of self-efficacy and professional competences. The first study aims to evaluate the levels of self-efficacy as attitude in 200 teachers of primary and secondary schools. Teacher self-efficacy is related to many educational outcomes: such as teachers’ persistence, enthusiasm, commitment and instructional behavior. High level of teacher self-efficacy beliefs enhance student motivation and pupil’s learning level. On this theoretical and empirical basis we are planning a second study oriented to assess teacher self-perception of competences that are linked to teacher self-efficacy. With the CDVR Questionnaire, 287 teachers graduated in Education Sciences in e-learning mode, showed an increase in their self-perception of didactic-evaluation and relational competences and an increased confidence also in their own professionalism.Keywords: teacher competence, teacher self-efficacy, selfperception, self-report evaluation
Procedia PDF Downloads 5194341 Solving Single Machine Total Weighted Tardiness Problem Using Gaussian Process Regression
Authors: Wanatchapong Kongkaew
Abstract:
This paper proposes an application of probabilistic technique, namely Gaussian process regression, for estimating an optimal sequence of the single machine with total weighted tardiness (SMTWT) scheduling problem. In this work, the Gaussian process regression (GPR) model is utilized to predict an optimal sequence of the SMTWT problem, and its solution is improved by using an iterated local search based on simulated annealing scheme, called GPRISA algorithm. The results show that the proposed GPRISA method achieves a very good performance and a reasonable trade-off between solution quality and time consumption. Moreover, in the comparison of deviation from the best-known solution, the proposed mechanism noticeably outperforms the recently existing approaches.Keywords: Gaussian process regression, iterated local search, simulated annealing, single machine total weighted tardiness
Procedia PDF Downloads 3094340 Knowledge-Based Virtual Community System (KBVCS) for Enhancing Knowledge Sharing in Mechatronics System Diagnostic and Repair: A Case of Automobile
Authors: Adedeji W. Oyediran, Yekini N. Asafe
Abstract:
Mechatronics is synergistic integration of mechanical engineering, with electronics and intelligent computer control in the design and manufacturing of industrial products and processes. Automobile (auto car, motor car or car is a wheeled motor vehicle used for transporting passengers, which also carries its own engine or motor) is a mechatronic system which served as major means of transportation around the world. Virtually all community has a need for automobile. This makes automobile issues as related to diagnostic and repair interesting to all communities. Consequent to the diversification of skill in diagnosing automobile faults and approaches in solving some problems and innovation in automobile industry. It is appropriate to say that repair and diagnostic of automobile will be better enhanced if community has opportunity of sharing knowledge and idea globally. This paper discussed the desirable elements in automobile as mechatronics system and present conceptual framework of virtual community model for automobile users.Keywords: automobile, automobile users, knowledge sharing, mechatronics system, virtual community
Procedia PDF Downloads 5084339 Migration, Assimilation and Well-Being of Interstate Migrant Workers in Kerala: A Critical Assessment
Authors: Arun Perumbilavil Anand
Abstract:
It may no longer be just anecdotal that every twelfth person in Kerala is a migrant worker from outside the state. For the past few years, the state has been witnessing large inflow of migrants from other states of India, which emerged as a result of demographic transition and Gulf emigration. Initially, the migrants were from the neighbouring states but, at a later period, the state started getting migrants from the distant parts of the country. Currently, migrants have turned to be a decisive force in the state and their increasing numbers have already started creating turbulences in the state. Over the past years, the increasing involvement of migrants in unlawful and criminal activities have generated apprehensions on their presence in the state. Moreover, at present, the Kerala society is not just hosting the first generation migrants, but there has been an increase in the second generation migrants making the situations more complex and diverse. In such a paradigm, the study ponders into the issues of migrants concerning their assimilation and well-being in the host society. Also, the study looks into the factors that impede the assimilation process, along with the perceptions of the migrants about the host society and the people. The study also tries to bring out the differences in the levels of assimilation among the migrants along the lines of religion, caste, state of origin, gender, stay duration and education. Methodology: The study is based on the empirical findings obtained out of the primary survey conducted on migrants employed in the Kanjikode industrial area of Kerala. The samples were selected through purposive sampling and the study employed techniques like observation, questionnaire and in-depth interviews. The findings are based on interviews conducted with 100 migrants. Findings and Conclusion: The study was an attempt of its kind in addressing the issues of assimilation and integration of interstate migrants working in the Kerala. As mentioned, the study could bring out differences in the levels of assimilation along the lines of different characteristics. The study could also locate the importance, and the role played by the peer groups and neighborhoods in accelerating the process of assimilation among the migrants. As an extension, the study also looked at the assimilation and educational issues of the migrant children living in Kerala, and it found that the place of birth, age at entry and the peer group plays a pivotal role in the assimilation process. The study through its findings recommends the need for incorporating the concept of inclusive education into the state educational system by giving due emphasis to the needs of the marginalized. The study points out that owing to the existing demographic conditions, the state will inevitably have to depend on migrant labor in future. Moreover, in such a paradigm, the host community and the government should strive to create a conducive environment for the proper assimilation of the migrants and which in turn can be an impetus for the fulfilment of the needs of both the migrants and the state.Keywords: assimilation, integration, Kerala, migrant workers, well-being
Procedia PDF Downloads 1444338 Virtual Reality Exposure Therapy for Post-Traumatic Stress Disorder: A Literature Review
Authors: Daniel Azizyan, Marina Vardanyan, Astghik Dallakyan
Abstract:
The objective of this literature review is to bring valuable and much-needed insight into Virtual Reality Exposure Therapy (VRET) for the treatment of Post-Traumatic Stress Disorder (PTSD) among military personnel. As the issues regarding war veterans who suffer from PTSD become more and more widespread, the task of finding possible solutions that would provide alternative approaches to existing methods being used today becomes more relevant than ever. By analyzing the previous applications of VRET, this literature review covers the state of the research done currently on the topic, reviews the known information while identifying the main problems, and aims to use missed opportunities and find potential solutions. It provides the answers to the most relevant questions concerning VRET and leads to important conclusions in the hope of making the technology more practical, widespread, and effective.Keywords: military PTSD, post-traumatic stress disorder, prolonged exposure, virtual reality exposure therapy, VRE
Procedia PDF Downloads 1184337 Journals' Productivity in the Literature on Malaria in Africa
Authors: Yahya Ibrahim Harande
Abstract:
The purpose of this study was to identify the journals that published articles on malaria disease in Africa and to determine the core of productive journals from the identified journals. The data for the study were culled out from African Index Medicus (AIM) database. A total of 529 articles was gathered from 115 journal titles from 1979-2011. In order to obtain the core of productive journals, Bradford`s law was applied to the collected data. Five journal titles were identified and determined as core journals. The data used for the study was analyzed and that, the subject matter used, Malaria was in conformity with the Bradford`s law. On the aspect dispersion of the literature, English was found to be the dominant language of the journals. (80.9%) followed by French (16.5%). Followed by Portuguese (1.7%) and German (0.9%). Recommendation is hereby proposed for the medical libraries to acquire these five journals that constitute the core in malaria literature for the use of their clients. It could also help in streamlining their acquision and selection exercises. More researches in the subject area using Bibliometrics approaches are hereby recommended.Keywords: productive journals, malaria disease literature, Bradford`s law, core journals, African scholars
Procedia PDF Downloads 3454336 Critical Design - Concepts, Methods and Practices for Innovative Societal Relationships
Authors: Martina Maria Keitsch
Abstract:
Critical Design (CD) confronts traditional design practice. Instead of reproducing and reinforcing contemporary perceptions of products and services, CD seeks to challenge them with the goal to stimulate debates and visions on societal innovation. CD methods comprise, among other narratives and design of critical objects. The oral presentation is based on a study that discusses concepts, methods, and applications of CD links CD to traditional design, and identifies CD benefits and challenges for design research and practice. The objective of the study is to introduce CD as an alternative for design researchers and practitioners supplementing commercially oriented design approaches. The study utilizes a literature review on CD concepts and methods based on current publications and online documents and illustrates CD practice with help of selected case studies. Findings of the study indicate that CD contribute, among others, to create new societal roles for designers, foster innovative relationships between designers and users, and encourage creativity through imaginative aesthetics.Keywords: critical design, postmodern design theories, narratives, rhizome
Procedia PDF Downloads 1714335 Household Survey on Food Behaviors and Nutrition Status in Suburb of Thailand
Authors: P. Chonsin, N. Neelapaichit, N. Piaseu
Abstract:
This household survey aimed to describe food behaviors and nutritional status of households in suburb nearby Bangkok, Thailand. Through convenience sampling, sample included 187 food providers from 125 households in three communities. Data were collected by structured interview and nutritional assessment. Results revealed that majority of the sample were female (68.4 %), aged between 18 to 91 years. The households selected raw foods concerning quality as the first priority (46.5%), cooking for their family members as 91.2%, using seasonings as 71.2%. The most favorite tastes were sweet (19.8%), salty (20.3%), and fatty (1.6%). Food related health problems were hypertension (40.1%), diabetes (26.7%), and dyslipidemia (19.3%). Approximately half of the overall samples (55.1%) and the sample with hypertension (84.5%) had excessive body mass index (BMI). Moreover, one-fourth of the sample with hypertension (25.3%) had salty food preference. Results suggest approaches to promote behavioral modification for sodium reduction particularly in food providers of households with hypertension and excessive BMI.Keywords: food behavior, nutrition status, household, suburb
Procedia PDF Downloads 3934334 Innovations in the Organization of Adaptation Program for International Students in Russia Based on Human Capital Approach
Authors: Kalinina Anastasiya, Pevnaya Mariya
Abstract:
The authors present the results of research of educational and cultural habitat of international students at Ural Federal University, revealing problem zones in the organization of adaptation program in 2014-2015 as well as innovations in adaptation program for 2015-2016. The research is based on U-curve theory of culture shock and theory of human capital. The authors provide also the first results for all stakeholders of practically implemented pilot adaptation program for foreign students which was based on the human capital approach.Keywords: adaptation, human capital, international students, student volunteering, social community, youth politics
Procedia PDF Downloads 3484333 Secure Mobile E-Business Applications
Authors: Hala A. Alrumaih
Abstract:
It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.Keywords: e-business, mobile applications, risk mitigations, security assurance
Procedia PDF Downloads 2954332 Attention-based Adaptive Convolution with Progressive Learning in Speech Enhancement
Authors: Tian Lan, Yixiang Wang, Wenxin Tai, Yilan Lyu, Zufeng Wu
Abstract:
The monaural speech enhancement task in the time-frequencydomain has a myriad of approaches, with the stacked con-volutional neural network (CNN) demonstrating superiorability in feature extraction and selection. However, usingstacked single convolutions method limits feature represen-tation capability and generalization ability. In order to solvethe aforementioned problem, we propose an attention-basedadaptive convolutional network that integrates the multi-scale convolutional operations into a operation-specific blockvia input dependent attention to adapt to complex auditoryscenes. In addition, we introduce a two-stage progressivelearning method to enlarge the receptive field without a dra-matic increase in computation burden. We conduct a series ofexperiments based on the TIMIT corpus, and the experimen-tal results prove that our proposed model is better than thestate-of-art models on all metrics.Keywords: speech enhancement, adaptive convolu-tion, progressive learning, time-frequency domain
Procedia PDF Downloads 1224331 Application of the MOOD Technique to the Steady-State Euler Equations
Authors: Gaspar J. Machado, Stéphane Clain, Raphael Loubère
Abstract:
The goal of the present work is to numerically study steady-state nonlinear hyperbolic equations in the context of the finite volume framework. We will consider the unidimensional Burgers' equation as the reference case for the scalar situation and the unidimensional Euler equations for the vectorial situation. We consider two approaches to solve the nonlinear equations: a time marching algorithm and a direct steady-state approach. We first develop the necessary and sufficient conditions to obtain the existence and unicity of the solution. We treat regular examples and solutions with a steady shock and to provide very-high-order finite volume approximations we implement a method based on the MOOD technology (Multi-dimensional Optimal Order Detection). The main ingredient consists in using an 'a posteriori' limiting strategy to eliminate non physical oscillations deriving from the Gibbs phenomenon while keeping a high accuracy for the smooth part.Keywords: Euler equations, finite volume, MOOD, steady-state
Procedia PDF Downloads 2774330 The Different Learning Path Analysis of Students with Different Learning Attitudes and Styles in Arts Creation
Authors: Tracy Ho, Huann-Shyang Lin, Mina Lin
Abstract:
This study investigated the different learning path of students with different learning attitude and learning styles in Arts Creation. Based on direct instruction, guided-discovery learning, and discovery learning theories, a tablet app including the following three learning areas were developed for students: (1) replication and remix practice area, (2) guided creation area, and (3) free creation area. Thirty. students with different learning attitude and learning styles were invited to use this app. Students’ learning behaviors were categorized and defined. The results will provide both educators and researchers with insights that can form a useful foundation for designing different content and strategy with the application of new technologies in school teaching. It also sheds light on how an educational App can be designed to enhance Arts Creation.Keywords: App, arts creation, learning attitude, learning style, tablet
Procedia PDF Downloads 2774329 Data-Centric Anomaly Detection with Diffusion Models
Authors: Sheldon Liu, Gordon Wang, Lei Liu, Xuefeng Liu
Abstract:
Anomaly detection, also referred to as one-class classification, plays a crucial role in identifying product images that deviate from the expected distribution. This study introduces Data-centric Anomaly Detection with Diffusion Models (DCADDM), presenting a systematic strategy for data collection and further diversifying the data with image generation via diffusion models. The algorithm addresses data collection challenges in real-world scenarios and points toward data augmentation with the integration of generative AI capabilities. The paper explores the generation of normal images using diffusion models. The experiments demonstrate that with 30% of the original normal image size, modeling in an unsupervised setting with state-of-the-art approaches can achieve equivalent performances. With the addition of generated images via diffusion models (10% equivalence of the original dataset size), the proposed algorithm achieves better or equivalent anomaly localization performance.Keywords: diffusion models, anomaly detection, data-centric, generative AI
Procedia PDF Downloads 824328 Lifelong Learning in Applied Fields (LLAF) Tempus Funded Project: Assessing Constructivist Learning Features in Higher Education Settings
Authors: Dorit Alt, Nirit Raichel
Abstract:
Educational practice is continually subjected to renewal needs, due mainly to the growing proportion of information communication technology, globalization of education, and the pursuit of quality. These types of renewal needs require developing updated instructional and assessment practices that put a premium on adaptability to the emerging requirements of present society. However, university instruction is criticized for not coping with these new challenges while continuing to exemplify the traditional instruction. In order to overcome this critical inadequacy between current educational goals and instructional methods, the LLAF consortium (including 16 members from 8 countries) is collaborating to create a curricular reform for lifelong learning (LLL) in teachers' education, health care and other applied fields. This project aims to achieve its objectives by developing, and piloting models for training students in LLL and promoting meaningful learning activities that could integrate knowledge with the personal transferable skills. LLAF has created a practical guide for teachers containing updated pedagogical strategies and assessment tools based on the constructivist approach for learning. This presentation will be limited to teachers' education only and to the contribution of a pre-pilot research aimed at providing a scale designed to measure constructivist activities in higher education learning environments. A mix-method approach was implemented in two phases to construct the scale: The first phase included a qualitative content analysis involving both deductive and inductive category applications of students' observations. The results foregrounded eight categories: knowledge construction, authenticity, multiple perspectives, prior knowledge, in-depth learning, teacher- student interaction, social interaction and cooperative dialogue. The students' descriptions of their classes were formulated as 36 items. The second phase employed structural equation modeling (SEM). The scale was submitted to 597 undergraduate students. The goodness of fit of the data to the structural model yielded sufficient fit results. This research elaborates the body of literature by adding a category of in-depth learning which emerged from the content analysis. Moreover, the theoretical category of social activity has been extended to include two distinctive factors: cooperative dialogue and social interaction. Implications of these findings for the LLAF project are discussed.Keywords: constructivist learning, higher education, mix-methodology, lifelong learning
Procedia PDF Downloads 3344327 The Estimation of Human Vital Signs Complexity
Authors: L. Bikulciene, E. Venskaityte, G. Jarusevicius
Abstract:
Non-stationary and nonlinear signals generated by living complex systems defy traditional mechanistic approaches, which are based on homeostasis. Previous our studies have shown that the evaluation of the interactions of physiological signals by using special analysis methods is suitable for observation of physiological processes. It is demonstrated the possibility of using deep physiological model, based interpretation of the changes of the human body’s functional states combined with an application of the analytical method based on matrix theory for the physiological signals analysis, which was applied on high risk cardiac patients. It is shown that evaluation of cardiac signals interactions show peculiar for each individual functional changes at the onset of hemodynamic restoration procedure. Therefore we suggest that the alterations of functional state of the body, after patients overcome surgery can be complemented by the data received from the suggested approach of the evaluation of functional variables interactions.Keywords: cardiac diseases, complex systems theory, ECG analysis, matrix analysis
Procedia PDF Downloads 3444326 A Review Article on Physical Therapy Methods for Children with Cerebral Palsy Rehabilitation
Authors: Andrew Anis Fakhrey Mosaad
Abstract:
Introduction: Children with cerebral palsy (CP) can be rehabilitated using a variety of methods and strategies, from traditional and conservative methods to more intricate motor learning-based theories such as sensory-motor integration and neurodevelopmental treatment. Method: Since sensory, cognitive, communication, perceptual, and/or behavioral abnormalities are often present alongside motor impairments in children with cerebral palsy, therapy approaches are tailored to each child's specific needs. Using evidence-based practices guarantees that kids make the most progress possible. Task-specific exercises and active engagement are the cornerstones of effective physical therapy regimens, which enhance motor recovery by potentially plasticizing the central nervous system (CNS). Conclusion: The goal of CP rehabilitation for kids is to improve their functional ability, gait, balance, and motor development. Presenting various methods frequently employed in the rehabilitation of children with cerebral palsy was the aim of this review.Keywords: children, cerebral palsy, rehabilitation, physical therapy
Procedia PDF Downloads 04325 Management of Organizational Behavior Utilizing Human Resources
Authors: Habab Ahmed Hassan Abuzeid
Abstract:
Organizations are social systems. If one wishes to work in them or to manage them, it is necessary to understand how they operate. Organizations combine science and people–technology and humanity. Unless we have qualified people to design and implement, techniques alone will not produce desirable results. Human behavior in organizations is rather unpredictable. It is unpredictable because it arises from people’s deep-seated needs and value systems. However, it can be partially understood in terms of the framework of behavioral science, management and other disciplines. There is no idealistic solution to organizational problems. All that can be done is to increase our understanding and skills so that human relations at work can be enhanced. In this paper, we consider management of organization behavior utilizing human resources. Study the elements of organization behavior, the effectiveness of mechanism to enhance staff relationships. Many approaches could be applied for healthy organizational environment, it’s highlighted more details in this paper. Organization behavior can raise the employees’ engagement, loyalty and commitment; to accomplish the goal.Keywords: environment, engagement, human resources, organization behavior
Procedia PDF Downloads 3644324 Structural Reliability Analysis Using Extreme Learning Machine
Authors: Mehul Srivastava, Sharma Tushar Ravikant, Mridul Krishn Mishra
Abstract:
In structural design, the evaluation of safety and probability failure of structure is of significant importance, mainly when the variables are random. On real structures, structural reliability can be evaluated obtaining an implicit limit state function. The structural reliability limit state function is obtained depending upon the statistically independent variables. In the analysis of reliability, we considered the statistically independent random variables to be the load intensity applied and the depth or height of the beam member considered. There are many approaches for structural reliability problems. In this paper Extreme Learning Machine technique and First Order Second Moment Method is used to determine the reliability indices for the same set of variables. The reliability index obtained using ELM is compared with the reliability index obtained using FOSM. Higher the reliability index, more feasible is the method to determine the reliability.Keywords: reliability, reliability index, statistically independent, extreme learning machine
Procedia PDF Downloads 6824323 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 874322 Corporate Social Responsibility and Dividend Policy
Authors: Mohammed Benlemlih
Abstract:
Using a sample of 22,839 US firm-year observations over the 1991-2012 period, we find that high CSR firms pay more dividends than low CSR firms. The analysis of individual components of CSR provides strong support for this main finding: five of the six individual dimensions are also associated with high dividend payout. When analyzing the stability of dividend payout, our results show that socially irresponsible firms adjust dividends more rapidly than socially responsible firms do: dividend payout is more stable in high CSR firms. Additional results suggest that firms involved in two controversial activities -the military and alcohol - are associated with low dividend payouts. These findings are robust to alternative assumptions and model specifications, alternative measures of dividend, additional control, and several approaches to address endogeneity. Overall, our results are consistent with the expectation that high CSR firms may use dividend policy to manage the agency problems related to overinvestment in CSR.Keywords: corporate social responsibility, dividend policy, Lintner model, agency theory, signaling theory, dividend stability
Procedia PDF Downloads 2654321 Extending the AOP Joinpoint Model for Memory and Type Safety
Authors: Amjad Nusayr
Abstract:
Software security is a general term used to any type of software architecture or model in which security aspects are incorporated in this architecture. These aspects are not part of the main logic of the underlying program. Software security can be achieved using a combination of approaches, including but not limited to secure software designs, third part component validation, and secure coding practices. Memory safety is one feature in software security where we ensure that any object in memory has a valid pointer or a reference with a valid type. Aspect-Oriented Programming (AOP) is a paradigm that is concerned with capturing the cross-cutting concerns in code development. AOP is generally used for common cross-cutting concerns like logging and DB transaction managing. In this paper, we introduce the concepts that enable AOP to be used for the purpose of memory and type safety. We also present ideas for extending AOP in software security practices.Keywords: aspect oriented programming, programming languages, software security, memory and type safety
Procedia PDF Downloads 1274320 A Collaborative Platform for Multilingual Ontology Development
Authors: Ahmed Tawfik, Fausto Giunchiglia, Vincenzo Maltese
Abstract:
Ontologies provide a common understanding of a specific domain of interest that can be communicated between people and used as background knowledge for automated reasoning in a wide range of applications. In this paper we address the design of multilingual ontologies following well-defined knowledge engineering methodologies with the support of novel collaborative development approaches. In particular, we present a collaborative platform which allows ontologies to be developed incrementally in multiple languages. This is made possible via an appropriate mapping between language independent concepts and one lexicalization per language (or a lexical gap in case such lexicalization does not exist). The collaborative platform has been designed to support the development of the Universal Knowledge Core, a multilingual ontology currently in English, Italian, Chinese, Mongolian, Hindi, and Bangladeshi. Its design follows a workflow-based development methodology that models resources as a set of collaborative objects and assigns customizable workflows to build and maintain each collaborative object in a community driven manner, with extensive support of modern web 2.0 social and collaborative features.Keywords: knowledge diversity, knowledge representation, ontology, development
Procedia PDF Downloads 3924319 Design and Implementation of Security Middleware for Data Warehouse Signature, Framework
Authors: Mayada Al Meghari
Abstract:
Recently, grid middlewares have provided large integrated use of network resources as the shared data and the CPU to become a virtual supercomputer. In this work, we present the design and implementation of the middleware for Data Warehouse Signature, DWS Framework. The aim of using the middleware in our DWS framework is to achieve the high performance by the parallel computing. This middleware is developed on Alchemi.Net framework to increase the security among the network nodes through the authentication and group-key distribution model. This model achieves the key security and prevents any intermediate attacks in the middleware. This paper presents the flow process structures of the middleware design. In addition, the paper ensures the implementation of security for DWS middleware enhancement with the authentication and group-key distribution model. Finally, from the analysis of other middleware approaches, the developed middleware of DWS framework is the optimal solution of a complete covering of security issues.Keywords: middleware, parallel computing, data warehouse, security, group-key, high performance
Procedia PDF Downloads 119