Search results for: client identification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3292

Search results for: client identification

3052 Identification and Force Control of a Two Chambers Pneumatic Soft Actuator

Authors: Najib K. Dankadai, Ahmad 'Athif Mohd Faudzi, Khairuddin Osman, Muhammad Rusydi Muhammad Razif, IIi Najaa Aimi Mohd Nordin

Abstract:

Researches in soft actuators are now growing rapidly because of their adequacy to be applied in sectors like medical, agriculture, biological and welfare. This paper presents system identification (SI) and control of the force generated by a two chambers pneumatic soft actuator (PSA). A force mathematical model for the actuator was identified experimentally using data acquisition card and MATLAB SI toolbox. Two control techniques; a predictive functional control (PFC) and conventional proportional integral and derivative (PID) schemes are proposed and compared based on the identified model for the soft actuator flexible mechanism. Results of this study showed that both of the proposed controllers ensure accurate tracking when the closed loop system was tested with the step, sinusoidal and multi step reference input through MATLAB simulation although the PFC provides a better response than the PID.

Keywords: predictive functional control (PFC), proportional integral and derivative (PID), soft actuator, system identification

Procedia PDF Downloads 325
3051 Leader Self-sacrifice in Sports Organizations

Authors: Stefano Ruggieri, Rubinia C. Bonfanti

Abstract:

Research on leadership in sports organizations has proved extremely fruitful in recent decades, favoring the growing and diffusion of figures such as mental coaches, trainers, etc. Recent scholarly attention on organizations has been directed towards the phenomenon of leader self-sacrifice, wherein leaders who display such behavior are perceived by their followers as more effective, charismatic, and legitimate compared to those who prioritize self-interest. This growing interest reflects the importance of leaders who prioritize the collective welfare over personal gain, as they inspire greater loyalty, trust, and dedication among their followers, ultimately fostering a more cohesive and high-performing team environment. However, there is limited literature on the mechanisms through which self-sacrifice influences both group dynamics (such as cohesion and team identification) and individual factors (such as self-competence). The aim of the study is to analyze the impact of the leader self-sacrifice on cohesion, team identification and self-competence. Team identification is a crucial determinant of individual identity, delineated by the extent to which a team member aligns with a specific organizational team rather than broader social collectives. This association motivates members to synchronize their actions with the collective interests of the group, thereby fostering cohesion among its constituents, and cultivating a shared sense of purpose and unity within the team. In the domain of team sports, particularly soccer and water polo, two studies involving 447 participants (men = 238, women = 209) between 22 and 35 years old (M = 26.36, SD = 5.51) were conducted. The first study employed a correlational methodology to investigate the predictive capacity of self-sacrifice on cohesion, team identification, self-efficacy, and self-competence. The second study utilized an experimental design to explore the relationship between team identification and self-sacrifice. Together, these studies provided comprehensive insights into the multifaceted nature of leader self-sacrifice and its profound implications for group cohesion and individual well-being within organizational settings. The findings underscored the pivotal role of leader self-sacrifice in not only fostering stronger bonds among team members but also in enhancing critical facets of group dynamics, ultimately contributing to the overall effectiveness and success of the team.

Keywords: cohesion, leadership, self-sacrifice, sports organizations, team-identification

Procedia PDF Downloads 46
3050 Application of a Synthetic DNA Reference Material for Optimisation of DNA Extraction and Purification for Molecular Identification of Medicinal Plants

Authors: Mina Kalantarzadeh, Claire Lockie-Williams, Caroline Howard

Abstract:

DNA barcoding is increasingly used for identification of medicinal plants worldwide. In the last decade, a large number of DNA barcodes have been generated, and their application in species identification explored. The success of DNA barcoding process relies on the accuracy of the results from polymerase chain reaction (PCR) amplification step which could be negatively affected due to a presence of inhibitors or degraded DNA in herbal samples. An established DNA reference material can be used to support molecular characterisation protocols and prove system suitability, for fast and accurate identification of plant species. The present study describes the use of a novel reference material, the trnH-psbA British Pharmacopoeia Nucleic Acid Reference Material (trnH-psbA BPNARM), which was produced to aid in the identification of Ocimum tenuiflorum L., a widely used herb. During DNA barcoding of O. tenuiflorum, PCR amplifications of isolated DNA produced inconsistent results, suggesting an issue with either the method or DNA quality of the tested samples. The trnH-psbA BPNARM was produced and tested to check for the issues caused during PCR amplification. It was added to the plant material as control DNA before extraction and was co-extracted and amplified by PCR. PCR analyses revealed that the amplification was not as successful as expected which suggested that the amplification is affected by presence of inhibitors co-extracted from plant materials. Various potential issues were assessed during DNA extraction and optimisations were made accordingly. A DNA barcoding protocol for O. tenuiflorum was published in the British Pharmacopoeia 2016, which included the reference sequence. The trnH-psbA BPNARM accelerated degradation test which investigates the stability of the reference material over time demonstrated that it has been stable when stored at 56 °C for a year. Using this protocol and trnH-psbA reference material provides a fast and accurate method for identification of O. tenuiflorum. The optimisations of the DNA extraction using the trnH-psbA BPNARM provided a signposting method which can assist in overcoming common problems encountered when using molecular methods with medicinal plants.

Keywords: degradation, DNA extraction, nucleic acid reference material, trnH-psbA

Procedia PDF Downloads 199
3049 Analyzing the Effectiveness of Communication Practices and Processes within Project-Based Firms

Authors: Paul Saah, Charles Mbohwa, Nelson Sizwe Madonsela

Abstract:

The capacity to deliver projects on schedule, within budget, and to the pleasure of the client depends on effective communication, which is the lifeblood of project-based businesses. In order to pinpoint areas for development and shed light on the crucial role that communication plays in project success, the aim of this study is to evaluate the efficacy of communication practises and processes inside project-based organisations. In order to analyse concepts and get a greater grasp of their theoretical basis, this study's methodology combines a careful review of the relevant literature with a conceptual analysis of the subject. Data from a varied sample of project-based businesses spanning all industries and sizes were collected via document analysis. The relationship between communication practises, and processes were investigated in connection to key performance measures such as project outcomes, client satisfaction, and team dynamics. According to the study's findings, project-based businesses that adopt effective communication practises, and procedures experience a reduction in unfavourable experiences, stronger integration, and coordination, clarity of purpose, and practises that can hasten problem resolution. However, failing to adopt effective communication practises and procedures in project-based company result in counter issues, including project derailment from the schedule, failure to meet goals, inefficient use of existing resources, and failure to meet organisational goals. Therefore, optimising their communication practises, and procedures are crucial for sustainable growth and competitive advantage as project-based enterprises continue to play a crucial part in today's dynamic business scene.

Keywords: effective communication, project-based firms, communication practices, project success, communication strategies

Procedia PDF Downloads 70
3048 Age–Related Changes of the Sella Turcica Morphometry in Adults Older Than 20-25 Years

Authors: Yu. I. Pigolkin, M. A. Garcia Corro

Abstract:

Age determination of unknown dead bodies in forensic personal identification is a complicated process which involves the application of numerous methods and techniques. Skeletal remains are less exposed to influences of environmental factors. In order to enhance the accuracy of forensic age estimation additional properties of bones correlating with age are required to be revealed. Material and Methods: Dimensional examination of the sella turcica was carried out on cadavers with the cranium opened by a circular vibrating saw. The sample consisted of a total of 90 Russian subjects, ranging in age from two months and 87 years. Results: The tendency of dimensional variations throughout life was detected. There were no observed gender differences in the morphometry of the sella turcica. The shared use of the sella turcica depth and length values revealed the possibility to categorize an examined sample in a certain age period. Conclusions: Based on the results of existing methods of age determination, the morphometry of the sella turcica can be an additional characteristic, amplifying the received values, and accordingly, increasing the accuracy of forensic biological age diagnosis.

Keywords: age–related changes in bone structures, forensic personal identification, sella turcica morphometry, body identification

Procedia PDF Downloads 275
3047 Influence of Radio Frequency Identification Technology at Cost of Supply Chain as a Driver for the Generation of Competitive Advantage

Authors: Mona Baniahmadi, Saied Haghanifar

Abstract:

Radio Frequency Identification (RFID) is regarded as a promising technology for the optimization of supply chain processes since it improves manufacturing and retail operations from forecasting demand for planning, managing inventory, and distribution. This study precisely aims at learning to know the RFID technology and at explaining how it can concretely be used for supply chain management and how it can help improving it in the case of Hejrat Company which is located in Iran and works on the distribution of medical drugs and cosmetics. This study uses some statistical analysis to calculate the expected benefits of an integrated RFID system on supply chain obtained through competitive advantages increases with decreasing cost factor. The study investigates how the cost of storage process, labor cost, the cost of missing goods, inventory management optimization, on-time delivery, order cost, lost sales and supply process optimization affect the performance of the integrated RFID supply chain regarding cost factors and provides a competitive advantage.

Keywords: cost, competitive advantage, radio frequency identification, supply chain

Procedia PDF Downloads 276
3046 Cost Overrun in Delivery of Public Projects in the Saudi Construction Industry: A Review

Authors: A. Aljohani, D. Moore, D. D. Ahiaga-Dagbui

Abstract:

Cost overruns are endemic in the delivery of construction projects. The problem is global. It occurs irrespective of type and size of the project, its location, procurement method or client. The size of overruns can be as high as 200% in some cases. Projects thus unfortunately often make the news headlines, not for their immense socio-economic contribution to society, but for being poorly procured. In Saudi Arabia, two-thirds of construction projects are publicly procured by the Saudi government, which has been invested Billions of dollars in infrastructure projects each year as part of an ambitious strategic development agenda to shift from mainly oil dependency to multi-source dependency. However, reports show that about 3,000 public projects face diverse issues related to time and cost overrun. As part of an on-going study to develop a framework for effective public procurement for the Saudi Arabian construction industry, this paper reports the initial findings of the causes of cost overruns in the context of the Gulf State. It also evaluates the interface between some of the front-end loading issues in public procurement in Saudi and their effects on project performance. A systematic review of the existing literature on construction cost overruns, with focus on the Saudi Arabian construction industry has been used. One of the initial findings is that a fixed-price contract is usually used by the client in an attempt to transfer all financial risks to the contractors. This has the unintended consequence of creating a turbulent environment for the delivery of the project which leads to project abandonment by contractors, poor quality of work and substantial rework. Further work is being undertaken to empirically verify the initial findings reported in this paper and their generalizability for the construction industry as a whole.

Keywords: cost overrun, public procurement, Saudi Arabia, construction projects

Procedia PDF Downloads 270
3045 Parallelization of Random Accessible Progressive Streaming of Compressed 3D Models over Web

Authors: Aayushi Somani, Siba P. Samal

Abstract:

Three-dimensional (3D) meshes are data structures, which store geometric information of an object or scene, generally in the form of vertices and edges. Current technology in laser scanning and other geometric data acquisition technologies acquire high resolution sampling which leads to high resolution meshes. While high resolution meshes give better quality rendering and hence is used often, the processing, as well as storage of 3D meshes, is currently resource-intensive. At the same time, web applications for data processing have become ubiquitous owing to their accessibility. For 3D meshes, the advancement of 3D web technologies, such as WebGL, WebVR, has enabled high fidelity rendering of huge meshes. However, there exists a gap in ability to stream huge meshes to a native client and browser application due to high network latency. Also, there is an inherent delay of loading WebGL pages due to large and complex models. The focus of our work is to identify the challenges faced when such meshes are streamed into and processed on hand-held devices, owing to its limited resources. One of the solutions that are conventionally used in the graphics community to alleviate resource limitations is mesh compression. Our approach deals with a two-step approach for random accessible progressive compression and its parallel implementation. The first step includes partition of the original mesh to multiple sub-meshes, and then we invoke data parallelism on these sub-meshes for its compression. Subsequent threaded decompression logic is implemented inside the Web Browser Engine with modification of WebGL implementation in Chromium open source engine. This concept can be used to completely revolutionize the way e-commerce and Virtual Reality technology works for consumer electronic devices. These objects can be compressed in the server and can be transmitted over the network. The progressive decompression can be performed on the client device and rendered. Multiple views currently used in e-commerce sites for viewing the same product from different angles can be replaced by a single progressive model for better UX and smoother user experience. Can also be used in WebVR for commonly and most widely used activities like virtual reality shopping, watching movies and playing games. Our experiments and comparison with existing techniques show encouraging results in terms of latency (compressed size is ~10-15% of the original mesh), processing time (20-22% increase over serial implementation) and quality of user experience in web browser.

Keywords: 3D compression, 3D mesh, 3D web, chromium, client-server architecture, e-commerce, level of details, parallelization, progressive compression, WebGL, WebVR

Procedia PDF Downloads 170
3044 Identification of the Parameters of a AC Servomotor Using Genetic Algorithm

Authors: J. G. Batista, K. N. Sousa, ¬J. L. Nunes, R. L. S. Sousa, G. A. P. Thé

Abstract:

This work deals with parameter identification of permanent magnet motors, a class of ac motor which is particularly important in industrial automation due to characteristics like applications high performance, are very attractive for applications with limited space and reducing the need to eliminate because they have reduced size and volume and can operate in a wide speed range, without independent ventilation. By using experimental data and genetic algorithm we have been able to extract values for both the motor inductance and the electromechanical coupling constant, which are then compared to measured and/or expected values.

Keywords: modeling, AC servomotor, permanent magnet synchronous motor-PMSM, genetic algorithm, vector control, robotic manipulator, control

Procedia PDF Downloads 470
3043 Modal Density Influence on Modal Complexity Quantification in Dynamic Systems

Authors: Fabrizio Iezzi, Claudio Valente

Abstract:

The viscous damping in dynamic systems can be proportional or non-proportional. In the first case, the mode shapes are real whereas in the second case they are complex. From an engineering point of view, the complexity of the mode shapes is important in order to quantify the non-proportional damping. Different indices exist to provide estimates of the modal complexity. These indices are or not zero, depending whether the mode shapes are not or are complex. The modal density problem arises in the experimental identification when the dynamic systems have close modal frequencies. Depending on the entity of this closeness, the mode shapes can hold fictitious imaginary quantities that affect the values of the modal complexity indices. The results are the failing in the identification of the real or complex mode shapes and then of the proportional or non-proportional damping. The paper aims to show the influence of the modal density on the values of these indices in case of both proportional and non-proportional damping. Theoretical and pseudo-experimental solutions are compared to analyze the problem according to an appropriate mechanical system.

Keywords: complex mode shapes, dynamic systems identification, modal density, non-proportional damping

Procedia PDF Downloads 387
3042 Structural Parameter Identification of Old Steel Truss Bridges

Authors: A. Bogdanovic, M. Vitanova, J. Bojadjieva, Z. Rakicevic, V. Sesov, K. Edip, N. Naumovski, F. Manojlovski, A.Popovska, A. Shoklarovski, T. Kitanovski, D. Ivanovski, I. Markovski, D. Filipovski

Abstract:

The conditions of existing structures change in the course of time and can hardly be characterized particularly if a bridge has long been in function and there is no design documentation related to it. To define the real conditions of a structure, detailed static and dynamic analysis of the structure has to be carried out and its modal parameters have to be defined accurately. Modal analysis enables a quite accurate identification of the natural frequencies and mode shapes. Presented in this paper are the results from the performed detailed analyses of a steel truss bridge that has been in use for more than 7 decades by the military services of R.N. Macedonia and for which there is no documentation at all. Static and dynamic investigations and ambient vibration measurements were performed. The acquired data were used to identify the mode shapes that were used for comparison with the numerical model. Dynamic tests were performed to define the bridge behaviour and the damping index. Finally, based on all the conducted detailed analyses and investigations, conclusions on the conditions of the bridge structure were drawn.

Keywords: ambient vibrations, dynamic identification, in-situ measurement, steel truss bridge

Procedia PDF Downloads 91
3041 Contractual Risk Transfer in Islamic Home Financing: Analysis in Bank Malaysia

Authors: Ahmad Dahlan Salleh, Nik Abdul Rahim Nik Abdul Ghani, Muhamad Firdaus M. Hatta

Abstract:

Risk management has implications on pricing, governance arrangements, business practices and strategy. Nowadays, home financing contract offers more in the risk transfer form to increase bank profit. This is parallel with Islamic jurisprudence method al-Kharaj bi al-thaman (gain accompanies liability for loss) and al-ghurm bil ghunm (gain is justified with risk) that determine the matching between risk transfer and returns. Malaysian financing trend is to buy house. Besides, exists transparency lacking risk transfer issues to the clients because of not been informed clearly. Terms and conditions of each financing also do not reflect clearly that the risk has been transferred to the client, justifying a determination price been made. The assumption on risk occurrence is also inaccurate as each risk is different with the type of financing contract. This makes the Islamic Financial Services Act 2013 in providing standards that transparent and consistent can be used by Islamic financial institution less effective. This study examines how far the level of the risk and obligation incurred by bank and client under various Islamic home financing contract. This research is qualitative by using two methods, document analysis, and semi-structured interviews. Document analysis from literature review to identify profile, themes and risk transfer element in home financing from Islamic jurisprudence perspective. This study finds that need to create a risk transfer parameter by banks which are consistent with risk transfer theory according to Islamic jurisprudence. This study has potential to assist the authority in Islamic finance such as The Central Bank of Malaysia (Bank Negara Malaysia) in regulating Islamic banking industry so that the risk transfer valuation in home financing contract based on home financing good practice and determined risk limits.

Keywords: risk transfer, home financing contract, Sharia compliant, Malaysia

Procedia PDF Downloads 420
3040 Identification of Coauthors in Scientific Database

Authors: Thiago M. R Dias, Gray F. Moita

Abstract:

The analysis of scientific collaboration networks has contributed significantly to improving the understanding of how does the process of collaboration between researchers and also to understand how the evolution of scientific production of researchers or research groups occurs. However, the identification of collaborations in large scientific databases is not a trivial task given the high computational cost of the methods commonly used. This paper proposes a method for identifying collaboration in large data base of curriculum researchers. The proposed method has low computational cost with satisfactory results, proving to be an interesting alternative for the modeling and characterization of large scientific collaboration networks.

Keywords: extraction, data integration, information retrieval, scientific collaboration

Procedia PDF Downloads 396
3039 Expert System: Debugging Using MD5 Process Firewall

Authors: C. U. Om Kumar, S. Kishore, A. Geetha

Abstract:

An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.

Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization

Procedia PDF Downloads 427
3038 Bio-Medical Equipment Technicians: Crucial Workforce to Improve Quality of Health Services in Rural Remote Hospitals in Nepal

Authors: C. M. Sapkota, B. P. Sapkota

Abstract:

Background: Continuous developments in science and technology are increasing the availability of thousands of medical devices – all of which should be of good quality and used appropriately to address global health challenges. It is obvious that bio medical devices are becoming ever more indispensable in health service delivery and among the key workforce responsible for their design, development, regulation, evaluation and training in their use: biomedical technician (BMET) is the crucial. As a pivotal member of health workforce, biomedical technicians are an essential component of the quality health service delivery mechanism supporting the attainment of the Sustainable Development Goals. Methods: The study was based on cross sectional descriptive design. Indicators measuring the quality of health services were assessed in Mechi Zonal Hospital (MZH) and Sagarmatha Zonal Hospital (SZH). Indicators were calculated based on the data about hospital utilization and performance of 2018 available in Medical record section of both hospitals. MZH had employed the BMET during 2018 but SZH had no BMET in 2018.Focus Group Discussion with health workers in both hospitals was conducted to validate the hospital records. Client exit interview was conducted to assess the level of client satisfaction in both the hospitals. Results: In MZH there was round the clock availability and utilization of Radio diagnostics equipment, Laboratory equipment. Operation Theater was functional throughout the year. Bed Occupancy rate in MZH was 97% but in SZH it was only 63%.In SZH, OT was functional only 54% of the days in 2018. CT scan machine was just installed but not functional. Computerized X-Ray in SZH was functional only in 72% of the days. Level of client satisfaction was 87% in MZH but was just 43% in SZH. MZH performed all (256) the Caesarean Sections but SZH performed only 36% of 210 Caesarean Sections in 2018. In annual performance ranking of Government Hospitals, MZH was placed in 1st rank while as SZH was placed in 19th rank out of 32 referral hospitals nationwide in 2018. Conclusion: Biomedical technicians are the crucial member of the human resource for health team with the pivotal role. Trained and qualified BMET professionals are required within health-care systems in order to design, evaluate, regulate, acquire, maintain, manage and train on safe medical technologies. Applying knowledge of engineering and technology to health-care systems to ensure availability, affordability, accessibility, acceptability and utilization of the safer, higher quality, effective, appropriate and socially acceptable bio medical technology to populations for preventive, promotive, curative, rehabilitative and palliative care across all levels of the health service delivery.

Keywords: biomedical equipment technicians, BMET, human resources for health, HRH, quality health service, rural hospitals

Procedia PDF Downloads 126
3037 Identification of Body Fluid at the Crime Scene by DNA Methylation Markers for Use in Forensic Science

Authors: Shirin jalili, Hadi Shirzad, Mahasti Modarresi, Samaneh Nabavi, Somayeh Khanjani

Abstract:

Identifying the source tissue of biological material found at crime scenes can be very informative in a number of cases. Despite their usefulness, current visual, catalytic, enzymatic, and immunologic tests for presumptive and confirmatory tissue identification are applicable only to a subset of samples, might suffer limitations such as low specificity, lack of sensitivity, and are substantially impacted by environmental insults. In addition their results are operator-dependent. Recently the possibility of discriminating body fluids using mRNA expression differences in tissues has been described but lack of long term stability of that Molecule and the need to normalize samples for each individual are limiting factors. The use of DNA should solve these issues because of its long term stability and specificity to each body fluid. Cells in the human body have a unique epigenome, which includes differences in DNA methylation in the promoter of genes. DNA methylation, which occurs at the 5′-position of the cytosine in CpG dinucleotides, has great potential for forensic identification of body fluids, because tissue-specific patterns of DNA methylation have been demonstrated, and DNA is less prone to degradation than proteins or RNA. Previous studies have reported several body fluid-specific DNA methylation markers.The presence or absence of a methyl group on the 5’ carbon of the cytosine pyridine ring in CpG dinucleotide regions called ‘CpG islands’ dictates whether the gene is expressed or silenced in the particular body fluid. Were described methylation patterns at tissue specific differentially methylated regions (tDMRs) to be stable and specific, making them excellent markers for tissue identification. The results demonstrate that methylation-based tissue identification is more than a proof-of-concept. The methodology holds promise as another viable forensic DNA analysis tool for characterization of biological materials.

Keywords: DNA methylation, forensic science, epigenome, tDMRs

Procedia PDF Downloads 429
3036 Bag of Local Features for Person Re-Identification on Large-Scale Datasets

Authors: Yixiu Liu, Yunzhou Zhang, Jianning Chi, Hao Chu, Rui Zheng, Libo Sun, Guanghao Chen, Fangtong Zhou

Abstract:

In the last few years, large-scale person re-identification has attracted a lot of attention from video surveillance since it has a potential application prospect in public safety management. However, it is still a challenging job considering the variation in human pose, the changing illumination conditions and the lack of paired samples. Although the accuracy has been significantly improved, the data dependence of the sample training is serious. To tackle this problem, a new strategy is proposed based on bag of visual words (BoVW) model of designing the feature representation which has been widely used in the field of image retrieval. The local features are extracted, and more discriminative feature representation is obtained by cross-view dictionary learning (CDL), then the assignment map is obtained through k-means clustering. Finally, the BoVW histograms are formed which encodes the images with the statistics of the feature classes in the assignment map. Experiments conducted on the CUHK03, Market1501 and MARS datasets show that the proposed method performs favorably against existing approaches.

Keywords: bag of visual words, cross-view dictionary learning, person re-identification, reranking

Procedia PDF Downloads 195
3035 Simulation-Based Learning in the Exercise Science Curriculum: Peer Role Play vs Professional Simulated Patient

Authors: Nathan Reeves

Abstract:

Aim: The aim of this study was to evaluate if there was an impact on student learning when peer role play was substituted for a professional actor in the role of simulated patient in a simulation-based scenario. Method: Third-year exercise science students enrolled in a field project course in 2015 (n=24), and 2016 (n=20) participated in a simulation-based case scenario designed to develop their client-centred exercise prescription skills. During the simulation, students were provided with feedback from the simulated patients. In 2015, three professional actors played the part of the simulated patient, and in 2016 one of the simulated patients was a student from another exercise science cohort (peer role play). The student learning experience, consistency in case fidelity and feedback provided by the simulated patients was evaluated using a 5-point Likert scale survey and collecting phenomenological data. Results: Improvements to student pre and post confidence remained constant between the 2015 and 2016 cohorts (1.04 and 0.85). The perceived usefulness and enjoyability also remained high across the two cohorts (4.96 and 4.71). The feedback provided by all three simulated patients in 2016 was seen to strongly support student learning experience (4.82), and was of a consistent level (4.47). Significance of the findings to allied health: Simulation-based education is rapidly expanding in the curricula across the allied health professions. The simulated patient methodology continues to receive support as a pedagogy to develop a range of clinical skills including communication, engagement and client-centeredness. Upskilling students to peer role play can be a reasonable alternative to engaging paid actors.

Keywords: exercise science, simulation-based learning, simulated patient, peer role play

Procedia PDF Downloads 295
3034 Attachment Theory and Quality of Life: Grief Education and Training

Authors: Jane E. Hill

Abstract:

Quality of life is an important component for many. With that in mind, everyone will experience some type of loss within his or her lifetime. A person can experience loss due to break up, separation, divorce, estrangement, or death. An individual may experience loss of a job, loss of capacity, or loss caused by human or natural-caused disasters. An individual’s response to such a loss is unique to them, and not everyone will seek services to assist them with their grief due to loss. Counseling can promote positive outcomes for clients that are grieving by addressing the client’s personal loss and helping the client process their grief. However, a lack of understanding on the part of counselors of how people grieve may result in negative client outcomes such as poor health, psychological distress, or an increased risk of depression. Education and training in grief counseling can improve counselors’ problem recognition and skills in treatment planning. The purpose of this study was to examine whether the Council for Accreditation of Counseling and Related Educational Programs (CACREP) master’s degree counseling students view themselves as having been adequately trained in grief theories and skills. Many people deal with grief issues that prevent them from having joy or purpose in their lives and that leaves them unable to engage in positive opportunities or relationships. This study examined CACREP-accredited master’s counseling students’ self-reported competency, training, and education in providing grief counseling. The implications for positive social change arising from the research may be to incorporate and promote education and training in grief theories and skills in a majority of counseling programs and to provide motivation to incorporate professional standards for grief training and practice in the mental health counseling field. The theoretical foundation used was modern grief theory based on John Bowlby’s work on Attachment Theory. The overall research question was how competent do master’s-level counselors view themselves regarding the education or training they received in grief theories or counseling skills in their CACREP-accredited studies. The author used a non-experimental, one shot survey comparative quantitative research design. Cicchetti’s Grief Counseling Competency Scale (GCCS) was administered to CACREP master’s-level counseling students enrolled in their practicum or internship experience, which resulted in 153 participants. Using a MANCOVA, there was significance found for relationships between coursework taken and (a) perceived assessment skills (p = .029), (b) perceived treatment skills (p = .025), and (c) perceived conceptual skills and knowledge (p = .003). Results of this study provided insight for CACREP master’s-level counseling programs to explore and discuss curriculum coursework inclusion of education and training in grief theories and skills.

Keywords: counselor education and training, grief education and training, grief and loss, quality of life

Procedia PDF Downloads 191
3033 Design and Field Programmable Gate Array Implementation of Radio Frequency Identification for Boosting up Tag Data Processing

Authors: G. Rajeshwari, V. D. M. Jabez Daniel

Abstract:

Radio Frequency Identification systems are used for automated identification in various applications such as automobiles, health care and security. It is also called as the automated data collection technology. RFID readers are placed in any area to scan large number of tags to cover a wide distance. The placement of the RFID elements may result in several types of collisions. A major challenge in RFID system is collision avoidance. In the previous works the collision was avoided by using algorithms such as ALOHA and tree algorithm. This work proposes collision reduction and increased throughput through reading enhancement method with tree algorithm. The reading enhancement is done by improving interrogation procedure and increasing the data handling capacity of RFID reader with parallel processing. The work is simulated using Xilinx ISE 14.5 verilog language. By implementing this in the RFID system, we can able to achieve high throughput and avoid collision in the reader at a same instant of time. The overall system efficiency will be increased by implementing this.

Keywords: antenna, anti-collision protocols, data management system, reader, reading enhancement, tag

Procedia PDF Downloads 306
3032 Using Motives of Sports Consumption to Explain Team Identity: A Comparison between Football Fans across the Pond

Authors: G. Scremin, I. Y. Suh, S. Doukas

Abstract:

Spectators follow their favorite sports teams for different reasons. While some attend a sporting event simply for its entertainment value, others do so because of the personal sense of achievement and accomplishment their connection with a sports team creates. Moreover, the level of identity spectators feel toward their favorite sports team falls in a broad continuum. Some are mere spectators. For those spectators, their association to a sports team has little impact on their self-image. Others are die-hard fans who are proud of their association with their team and whose connection with that team is an important reflection of who they are. Several motives for sports consumption can be used to explain the level of spectator support in a variety of sports. Those motives can also be used to explain the variance in the identification, attachment, and loyalty spectators feel toward their favorite sports team. Motives for sports consumption can be used to discriminate the degree of identification spectators have with their favorite sports team. In this study, motives for sports consumption was used to discriminate the level of identity spectators feel toward their sports team. It was hypothesized that spectators with a strong level of team identity would report higher rates of interest in player, interest in sports, and interest in team than spectators with a low level of team identity. And spectators with a low level of team identity would report higher rates for entertainment value, bonding with friends or family, and wholesome environment. Football spectators in the United States and England were surveyed about their motives for football consumption and their level of identification with their favorite football team. To assess if the motives of sports fans differed by level of team identity and allegiance to an American or English football team, a Multivariate Analysis of Variance (MANOVA) under the General Linear Model (GLM) procedure found in SPSS was performed. The independent variables were level of team identity and allegiance to an American or English football team, and the dependent variables were the sport fan motives. A tripartite split (low, moderate, high) was used on a composite measure for team identity. Preliminary results show that effect of team identity is statistically significant (p < .001) for at least nine of the 17 motives for sports consumption assessed in this investigation. These results indicate that the motives of spectators with a strong level of team identity differ significantly from spectators with a low level of team identity. Those differences can be used to discriminate the degree of identification spectators have with their favorite sports team. Sports marketers can use these methods and results to develop identity profiles of spectators and create marketing strategies specifically designed to attract those spectators based on their unique motives for consumption and their level of team identification.

Keywords: fan identification, market segmentation of sports fans, motives for sports consumption, team identity

Procedia PDF Downloads 167
3031 Social Identification among Employees: A System Dynamic Approach

Authors: Muhammad Abdullah, Salman Iqbal, Mamoona Rasheed

Abstract:

Social identity among people is an important source of pride and self-esteem, consequently, people struggle to preserve a positive perception of their groups and collectives. The purpose of this paper is to explain the process of social identification and to highlight the underlying causal factors of social identity among employees. There is a little research about how the social identity of employees is shaped in Pakistan’s organizational culture. This study is based on social identity theory. This study uses Systems’ approach as a research methodology. The feedback loop approach is applied to explain the underlying key elements of employee behavior that collectively form social identity among social groups in corporate arena. The findings of this study reveal that effective, evaluative and cognitive components of an individual’s personality are associated with the social identification. The system dynamic feedback loop approach has revealed the underlying structure that is associated with social identity, social group formation, and effective component proved to be the most associated factor. This may also enable to understand how social groups become stable and individuals act according to the group requirements. The value of this paper lies in the understanding gained about the underlying key factors that play a crucial role in social group formation in organizations. It may help to understand the rationale behind how employees socially categorize themselves within organizations. It may also help to design effective and more cohesive teams for better operations and long-term results. This may help to share knowledge among employees as well. The underlying structure behind the social identification is highlighted with the help of system modeling.

Keywords: affective commitment, cognitive commitment, evaluated commitment, system thinking

Procedia PDF Downloads 137
3030 The Results of the Systematic Archaeological Survey of Sistan (Iran)

Authors: Reza Mehrafarin, Nafiseh Mirshekari

Abstract:

The Sistan plain has always been a site for the settlement of various human societies, thanks to its favorable environmental conditions, such as abundant water from the Hirmand River and fertile sedimentary soil. Consequently, there was a need for a systematic archaeological investigation in the area. The survey had multiple objectives, with the most significant ones being the creation of an archaeological map and the identification and documentation of all ancient sites to establish their records and chronology. The survey was carried out in two phases, with each phase covering half of the area. The research method involved fieldwork, with two teams of professional archaeologists conducting a comprehensive survey of each of the 22 areas in Sistan. Once an area was identified, various recording, scientific, and field operations were executed to study the site. In the first phase (2007), an intensive field survey focused on the residential area of Sistan, including its northern and eastern regions. This phase resulted in the identification of 808 sites in eleven selected areas. In the second phase (2009), the desert area of Sistan, or its southern half, was surveyed, leading to the identification of approximately 853 sites. Overall, these surveys resulted in the identification of 1661 sites in Sistan. Among these sites, approximately 899 belong to the Bronze Age (late 4th millennium BCE to early 2nd millennium BCE). Of these sites, around 501 date back to the historical period, while nearly 590 sites pertain to the Islamic period. The archaeological investigations of both phases revealed that Sistan has consistently possessed fertile soil, abundant water, and a skilled workforce, making it capable of becoming Iran's granary and the center of the East once again if these conditions are restored.

Keywords: sistan, field surveys, archaeology, archaeological map

Procedia PDF Downloads 65
3029 An Overview on the Effectiveness of Brand Mascot and Celebrity Endorsement

Authors: Isari Pairoa, Proud Arunrangsiwed

Abstract:

Celebrity and brand mascot endorsement have been explored for more than three decades. Both endorsers can effectively transfer their reputation to corporate image and can influence the customers to purchase the product. However, there was little known about the mediators between the level of endorsement and its effect on buying behavior. The objective of the current study is to identify the gab of the previous studies and to seek possible mediators. It was found that consumer’s memory and identification are the mediators, of source credibility and endorsement effect. A future study should confirm the model of endorsement, which was established in the current study.

Keywords: product endorsement, memory, identification theory, source credibility, unintentional effect

Procedia PDF Downloads 227
3028 Adding Business Value in Enterprise Applications through Quality Matrices Using Agile

Authors: Afshan Saad, Muhammad Saad, Shah Muhammad Emaduddin

Abstract:

Nowadays the business condition is so quick paced that enhancing ourselves consistently has turned into a huge factor for the presence of an undertaking. We can check this for structural building and significantly more so in the quick-paced universe of data innovation and programming designing. The lithe philosophies, similar to Scrum, have a devoted advance in the process that objectives the enhancement of the improvement procedure and programming items. Pivotal to process enhancement is to pick up data that grants you to assess the condition of the procedure and its items. From the status data, you can design activities for the upgrade and furthermore assess the accomplishment of those activities. This investigation builds a model that measures the product nature of the improvement procedure. The product quality is dependent on the useful and auxiliary nature of the product items, besides the nature of the advancement procedure is likewise vital to enhance programming quality. Utilitarian quality covers the adherence to client prerequisites, while the auxiliary quality tends to the structure of the product item's source code with reference to its practicality. The procedure quality is identified with the consistency and expectedness of the improvement procedure. The product quality model is connected in a business setting by social occasion the information for the product measurements in the model. To assess the product quality model, we investigate the information and present it to the general population engaged with the light-footed programming improvement process. The outcomes from the application and the client input recommend that the model empowers a reasonable evaluation of the product quality and that it very well may be utilized to help the persistent enhancement of the advancement procedure and programming items.

Keywords: Agile SDLC Tools, Agile Software development, business value, enterprise applications, IBM, IBM Rational Team Concert, RTC, software quality, software metrics

Procedia PDF Downloads 174
3027 Jail Reentry in Rural America: A Quasi-Experimental Examination of a Rural Behavioral Health Reentry Program

Authors: Debra L. Stanley, Gabriela Wasileski

Abstract:

Offenders face many challenges as they transition from being incarcerated to the community, ranging from housing and employment needs to long standing problems with addictions and mental health issues. A lack of appropriate behavioral health services in the more remote parts of the United States has led to a significant illegal substance abuse problem, housing instability, and unaddressed mental health and trauma issues. High rates of poverty and unemployment exacerbate the growing behavioral health issues, drug overdoses, co-occurring disorders, and crime that are so prevalent across rural communities. This study examines the challenges of rural jail reentry faced by offenders in a treatment capacity. The client-centered evidence-based program is uniquely designed to provide continuity of care that focuses on issues which affect rural communities. Prior to release from jail, individuals go through comprehensive assessment screenings to measure mental health and substance use disorder as well as trauma and prior crime victimization histories; the assessments help to target client-specific services. The quasi-experimental research design tracks clients throughout their recovery and reintegration into the community. Individuals in a rural program often do not have the benefit of easy access or peer mentoring that is so often found in urban recovery programs. Therefore, much of the support is provided through telehealth and e-services. The goal of this study is to explore the nature of rural reentry programs and measures of recidivism, drug overdoses, and other behavioral health needs and successful reentry to include stable housing and employment.

Keywords: jail reentry, rehabilitation, behavioral health, drug abuse, recidivism

Procedia PDF Downloads 95
3026 A Study on Factors Affecting (Building Information Modelling) BIM Implementation in European Renovation Projects

Authors: Fatemeh Daneshvartarigh

Abstract:

New technologies and applications have radically altered construction techniques in recent years. In order to anticipate how the building will act, perform, and appear, these technologies encompass a wide range of visualization, simulation, and analytic tools. These new technologies and applications have a considerable impact on completing construction projects in today's (architecture, engineering and construction)AEC industries. The rate of changes in BIM-related topics is different worldwide, and it depends on many factors, e.g., the national policies of each country. Therefore, there is a need for comprehensive research focused on a specific area with common characteristics. Therefore, one of the necessary measures to increase the use of this new approach is to examine the challenges and obstacles facing it. In this research, based on the Delphi method, at first, the background and related literature are reviewed. Then, using the knowledge obtained from the literature, a primary questionnaire is generated and filled by experts who are selected using snowball sampling. It covered the experts' attitudes towards implementing BIM in renovation projects and their view of the benefits and obstacles in this regard. By analyzing the primary questionnaire, the second group of experts is selected among the participants to be interviewed. The results are analyzed using Theme analysis. Six themes, including Management support, staff resistance, client willingness, Cost of software and implementation, the difficulty of implementation, and other reasons, are obtained. Then a final questionnaire is generated from the themes and filled by the same group of experts. The result is analyzed by the Fuzzy Delphi method, showing the exact ranking of the obtained themes. The final results show that management support, staff resistance, and client willingness are the most critical barrier to BIM usage in renovation projects.

Keywords: building information modeling, BIM, BIM implementation, BIM barriers, BIM in renovation

Procedia PDF Downloads 167
3025 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 279
3024 Verification of Space System Dynamics Using the MATLAB Identification Toolbox in Space Qualification Test

Authors: Yuri V. Kim

Abstract:

This article presents a new approach to the Functional Testing of Space Systems (SS). It can be considered as a generic test and used for a wide class of SS that from the point of view of System Dynamics and Control may be described by the ordinary differential equations. Suggested methodology is based on using semi-natural experiment- laboratory stand that doesn’t require complicated, precise and expensive technological control-verification equipment. However, it allows for testing system as a whole totally assembled unit during Assembling, Integration and Testing (AIT) activities, involving system hardware (HW) and software (SW). The test physically activates system input (sensors) and output (actuators) and requires recording their outputs in real time. The data is then inserted in laboratory PC where it is post-experiment processed by Matlab/Simulink Identification Toolbox. It allows for estimating system dynamics in form of estimation of system differential equations by the experimental way and comparing them with expected mathematical model prematurely verified by mathematical simulation during the design process.

Keywords: system dynamics, space system ground tests and space qualification, system dynamics identification, satellite attitude control, assembling, integration and testing

Procedia PDF Downloads 163
3023 System Identification of Timber Masonry Walls Using Shaking Table Test

Authors: Timir Baran Roy, Luis Guerreiro, Ashutosh Bagchi

Abstract:

Dynamic study is important in order to design, repair and rehabilitation of structures. It has played an important role in the behavior characterization of structures; such as bridges, dams, high-rise buildings etc. There had been a substantial development in this area over the last few decades, especially in the field of dynamic identification techniques of structural systems. Frequency Domain Decomposition (FDD) and Time Domain Decomposition are most commonly used methods to identify modal parameters; such as natural frequency, modal damping, and mode shape. The focus of the present research is to study the dynamic characteristics of typical timber masonry walls commonly used in Portugal. For that purpose, a multi-storey structural prototypes of such walls have been tested on a seismic shake table at the National Laboratory for Civil Engineering, Portugal (LNEC). Signal processing has been performed of the output response, which is collected from the shaking table experiment of the prototype using accelerometers. In the present work signal processing of the output response, based on the input response has been done in two ways: FDD and Stochastic Subspace Identification (SSI). In order to estimate the values of the modal parameters, algorithms for FDD are formulated, and parametric functions for the SSI are computed. Finally, estimated values from both the methods are compared to measure the accuracy of both the techniques.

Keywords: frequency domain decomposition (fdd), modal parameters, signal processing, stochastic subspace identification (ssi), time domain decomposition

Procedia PDF Downloads 264