Search results for: learning management systems
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 23010

Search results for: learning management systems

20100 Investigating Elements That Influence Higher Education Institutions’ Digital Maturity

Authors: Zarah M. Bello, Nathan Baddoo, Mariana Lilley, Paul Wernick

Abstract:

In this paper, we present findings from a multi-part study to evaluate candidate elements reflecting the level of digital capability maturity (DCM) in higher education and the relationship between these elements. We will use these findings to propose a model of DCM for educational institutions. We suggest that the success of learning in higher education is dependent in part on the level of maturity of digital capabilities of institutions as well as the abilities of learners and those who support the learning process. It is therefore important to have a good understanding of the elements that underpin this maturity as well as their impact and interactions in order to better exploit the benefits that technology presents to the modern learning environment and support its continued improvement. Having identified ten candidate elements of digital capability that we believe support the level of a University’s maturity in this area as well as a number of relevant stakeholder roles, we conducted two studies utilizing both quantitative and qualitative research methods. In the first of these studies, 85 electronic questionnaires were completed by various stakeholders in a UK university, with a 100% response rate. We also undertook five in-depth interviews with management stakeholders in the same university. We then utilized statistical analysis to process the survey data and conducted a textual analysis of the interview transcripts. Our findings support our initial identification of candidate elements and support our contention that these elements interact in a multidimensional manner. This multidimensional dynamic suggests that any proposal for improvement in digital capability must reflect the interdependency and cross-sectional relationship of the elements that contribute to DCM. Our results also indicate that the notion of DCM is strongly data-centric and that any proposed maturity model must reflect the role of data in driving maturity and improvement. We present these findings as a key step towards the design of an operationalisable DCM maturity model for universities.

Keywords: digital capability, elements, maturity, maturity framework, university

Procedia PDF Downloads 144
20099 Elements of Usability and Sociability in Activity Management System for e-Masjid

Authors: Hidayah bt Rahmalan, Marhazli Kipli, Muhammad Suffian Sikandar Ghani, Maisarah Abu, Muhammad Faisal Ashaari, Norlizam Md Sukiban

Abstract:

This study presents an example of activity management system for e-Masjid implementing elements of usability and sociability. It is expected to resolve the shortcomings of the most e-Masjid that provide lot of activities to their community. However, the data on handling a lot of activities or events in which involve a lot of people will be difficult to manipulate. Thus, this paper presents the usability and sociability element on an activity management system that not only eases the job for the user but being practical for future when the community join any events. For the time being, this activity management system was only applied for Sayyidina Abu Bakar Mosque in Utem, Malacca.

Keywords: e-masjid, usability, sociability, activity management system

Procedia PDF Downloads 367
20098 Cells Detection and Recognition in Bone Marrow Examination with Deep Learning Method

Authors: Shiyin He, Zheng Huang

Abstract:

In this paper, deep learning methods are applied in bio-medical field to detect and count different types of cells in an automatic way instead of manual work in medical practice, specifically in bone marrow examination. The process is mainly composed of two steps, detection and recognition. Mask-Region-Convolutional Neural Networks (Mask-RCNN) was used for detection and image segmentation to extract cells and then Convolutional Neural Networks (CNN), as well as Deep Residual Network (ResNet) was used to classify. Result of cell detection network shows high efficiency to meet application requirements. For the cell recognition network, two networks are compared and the final system is fully applicable.

Keywords: cell detection, cell recognition, deep learning, Mask-RCNN, ResNet

Procedia PDF Downloads 191
20097 Investigating the Dimensions of Perceived Attributions in Making Sense of Failure: An Exploratory Study of Lebanese Entrepreneurs

Authors: Ghiwa Dandach

Abstract:

By challenging the anti-failure bias and contributing to the theoretical territory of the attribution theory, this thesis develops a comprehensive process for entrepreneurial learning from failure. The practical implication of the findings suggests assisting entrepreneurs (current, failing, and nascent) in effectively anticipating and reflecting upon failure. Additionally, the process is suggested to enhance the level of institutional and private (accelerators and financers) support provided to entrepreneurs, the implications of which may improve future opportunities for entrepreneurial success. Henceforth, exploring learning from failure is argued to impact the potential survival of future ventures, subsequently revitalizing the economic contribution of entrepreneurship. This learning process can be enhanced with the cognitive development of causal ascriptions for failure, which eventually impacts learning outcomes. However, the mechanism with which entrepreneurs make sense of failure, reflect on the journey, and transform experience into knowledge is still under-researched. More specifically, the cognitive process of failure attribution is under-explored, majorly in the context of developing economies, calling for a more insightful understanding on how entrepreneurs ascribe failure. Responding to the call for more thorough research in such cultural contexts, this study expands the understanding of the dimensions of failure attributions as perceived by entrepreneurs and the impact of these dimensions on learning outcomes in the Lebanese context. The research adopted the exploratory interpretivism paradigm and collected data from interviews with industry experts first, followed by narratives of entrepreneurs using the qualitative multimethod approach. The holistic and categorical content analysis of narratives, preceded by the thematic analysis of interviews, unveiled how entrepreneurs ascribe failure by developing minor and major dimensions of each failure attribution. The findings have also revealed how each dimension impacts the learning from failure when accompanied by emotional resilience. The thesis concludes that exploring in-depth the dimensions of failure attributions significantly determines the level of learning generated. They are moving beyond the simple categorisation of ascriptions as primary internal or external unveiled how learning may occur with each attribution at the individual, venture, and ecosystem levels. This has further accentuated that a major internal attribution of failure combined with a minor external attribution generated the highest levels of transformative and double-loop learning, emphasizing the role of personal blame and responsibility on enhancing learning outcomes.

Keywords: attribution, entrepreneurship, reflection, sense-making, emotions, learning outcomes, failure, exit

Procedia PDF Downloads 227
20096 Reference Management Software: Comparative Analysis of RefWorks and Zotero

Authors: Sujit K. Basak

Abstract:

This paper presents a comparison of reference management software between RefWorks and Zotero. The results were drawn by comparing two software and the novelty of this paper is the comparative analysis of software and it has shown that ReftWorks can import more information from the Google Scholar for the researchers. This finding could help to know researchers to use the reference management software.

Keywords: analysis, comparative analysis, reference management software, researchers

Procedia PDF Downloads 544
20095 Incident Management System: An Essential Tool for Oil Spill Response

Authors: Ali Heyder Alatas, D. Xin, L. Nai Ming

Abstract:

An oil spill emergency can vary in size and complexity, subject to factors such as volume and characteristics of spilled oil, incident location, impacted sensitivities and resources required. A major incident typically involves numerous stakeholders; these include the responsible party, response organisations, government authorities across multiple jurisdictions, local communities, and a spectrum of technical experts. An incident management team will encounter numerous challenges. Factors such as limited access to location, adverse weather, poor communication, and lack of pre-identified resources can impede a response; delays caused by an inefficient response can exacerbate impacts caused to the wider environment, socio-economic and cultural resources. It is essential that all parties work based on defined roles, responsibilities and authority, and ensure the availability of sufficient resources. To promote steadfast coordination and overcome the challenges highlighted, an Incident Management System (IMS) offers an essential tool for oil spill response. It provides clarity in command and control, improves communication and coordination, facilitates the cooperation between stakeholders, and integrates resources committed. Following the preceding discussion, a comprehensive review of existing literature serves to illustrate the application of IMS in oil spill response to overcome common challenges faced in a major-scaled incident. With a primary audience comprising practitioners in mind, this study will discuss key principles of incident management which enables an effective response, along with pitfalls and challenges, particularly, the tension between government and industry; case studies will be used to frame learning and issues consolidated from previous research, and provide the context to link practice with theory. It will also feature the industry approach to incident management which was further crystallized as part of a review by the Joint Industry Project (JIP) established in the wake of the Macondo well control incident. The authors posit that a common IMS which can be adopted across the industry not only enhances response capacity towards a major oil spill incident but is essential to the global preparedness effort.

Keywords: command and control, incident management system, oil spill response, response organisation

Procedia PDF Downloads 156
20094 Observer-Based Control Design for Double Integrators Systems with Long Sampling Periods and Actuator Uncertainty

Authors: Tomas Menard

Abstract:

The design of control-law for engineering systems has been investigated for many decades. While many results are concerned with continuous systems with continuous output, nowadays, many controlled systems have to transmit their output measurements through network, hence making it discrete-time. But it is well known that the sampling of a system whose control-law is based on the continuous output may render the system unstable, especially when this sampling period is long compared to the system dynamics. The control design then has to be adapted in order to cope with this issue. In this paper, we consider systems which can be modeled as double integrator with uncertainty on the input since many mechanical systems can be put under such form. We present a control scheme based on an observer using only discrete time measurement and which provides continuous time estimation of the state, combined with a continuous control law, which stabilized a system with second-order dynamics even in the presence of uncertainty. It is further shown that arbitrarily long sampling periods can be dealt with properly setting the control scheme parameters.

Keywords: dynamical system, control law design, sampled output, observer design

Procedia PDF Downloads 187
20093 Framework to Organize Community-Led Project-Based Learning at a Massive Scale of 900 Indian Villages

Authors: Ayesha Selwyn, Annapoorni Chandrashekar, Kumar Ashwarya, Nishant Baghel

Abstract:

Project-based learning (PBL) activities are typically implemented in technology-enabled schools by highly trained teachers. In rural India, students have limited access to technology and quality education. Implementing typical PBL activities is challenging. This study details how Pratham Education Foundation’s Hybrid Learning model was used to implement two PBL activities related to music in 900 remote Indian villages with 46,000 students aged 10-14. The activities were completed by 69% of groups that submitted a total of 15,000 videos (completed projects). Pratham’s H-Learning model reaches 100,000 students aged 3-14 in 900 Indian villages. The community-driven model engages students in 20,000 self-organized groups outside of school. The students are guided by 6,000 youth volunteers and 100 facilitators. The students partake in learning activities across subjects with the support of community stakeholders and offline digital content on shared Android tablets. A training and implementation toolkit for PBL activities is designed by subject experts. This toolkit is essential in ensuring efficient implementation of activities as facilitators aren’t highly skilled and have limited access to training resources. The toolkit details the activity at three levels of student engagement - enrollment, participation, and completion. The subject experts train project leaders and facilitators who train youth volunteers. Volunteers need to be trained on how to execute the activity and guide students. The training is focused on building the volunteers’ capacity to enable students to solve problems, rather than developing the volunteers’ subject-related knowledge. This structure ensures that continuous intervention of subject matter experts isn’t required, and the onus of judging creativity skills is put on community members. 46,000 students in the H-Learning program were engaged in two PBL activities related to Music from April-June 2019. For one activity, students had to conduct a “musical survey” in their village by designing a survey and shooting and editing a video. This activity aimed to develop students’ information retrieval, data gathering, teamwork, communication, project management, and creativity skills. It also aimed to identify talent and document local folk music. The second activity, “Pratham Idol”, was a singing competition. Students participated in performing, producing, and editing videos. This activity aimed to develop students’ teamwork and creative skills and give students a creative outlet. Students showcased their completed projects at village fairs wherein a panel of community members evaluated the videos. The shortlisted videos from all villages were further evaluated by experts who identified students and adults to participate in advanced music workshops. The H-Learning framework enables students in low resource settings to engage in PBL and develop relevant skills by leveraging community support and using video creation as a tool. In rural India, students do not have access to high-quality education or infrastructure. Therefore designing activities that can be implemented by community members after limited training is essential. The subject experts have minimal intervention once the activity is initiated, which significantly reduces the cost of implementation and allows the activity to be implemented at a massive scale.

Keywords: community supported learning, project-based learning, self-organized learning, education technology

Procedia PDF Downloads 186
20092 Spectral Efficiency Improvement in 5G Systems by Polyphase Decomposition

Authors: Wilson Enríquez, Daniel Cardenas

Abstract:

This article proposes a filter bank format combined with the mathematical tool called polyphase decomposition and the discrete Fourier transform (DFT) with the purpose of improving the performance of the fifth-generation communication systems (5G). We started with a review of the literature and the study of the filter bank theory and its combination with DFT in order to improve the performance of wireless communications since it reduces the computational complexity of these communication systems. With the proposed technique, several experiments were carried out in order to evaluate the structures in 5G systems. Finally, the results are presented in graphical form in terms of bit error rate against the ratio bit energy/noise power spectral density (BER vs. Eb / No).

Keywords: multi-carrier system (5G), filter bank, polyphase decomposition, FIR equalizer

Procedia PDF Downloads 203
20091 Temporal Case-Based Reasoning System for Automatic Parking Complex

Authors: Alexander P. Eremeev, Ivan E. Kurilenko, Pavel R. Varshavskiy

Abstract:

In this paper, the problem of the application of temporal reasoning and case-based reasoning in intelligent decision support systems is considered. The method of case-based reasoning with temporal dependences for the solution of problems of real-time diagnostics and forecasting in intelligent decision support systems is described. This paper demonstrates how the temporal case-based reasoning system can be used in intelligent decision support systems of the car access control. This work was supported by RFBR.

Keywords: analogous reasoning, case-based reasoning, intelligent decision support systems, temporal reasoning

Procedia PDF Downloads 529
20090 The Relation between Earnings Management with the Financial Reporting

Authors: Anocha Rojanapanich

Abstract:

The objective of this research is to investigate the effects of earnings management on corporate transparency of the company in Dusit area workplace via financial reporting reliability and stakeholder acceptance as independent variable. And the company in Dusit are are taken as the population and sample. The questionnaire is used to collect data. Exploratory Factor Analysis is implemented to ensure construct validity, and correlation statistic is selected to test the relationship among all variable and the ordinary least squares regression is used to explore the hypothesized. The results show that earnings management has a significant and negative impact on financial reporting reliability, stakeholder acceptance, and corporate transparency. Both financial reporting reliability and stakeholder acceptance have an important and positive effect on corporate transparency, and they are then mediators of the earnings management-corporate transparency relationships.

Keywords: dusit area workplace, earnings management, financial report, business and marketing management

Procedia PDF Downloads 407
20089 Application of Deep Learning in Top Pair and Single Top Quark Production at the Large Hadron Collider

Authors: Ijaz Ahmed, Anwar Zada, Muhammad Waqas, M. U. Ashraf

Abstract:

We demonstrate the performance of a very efficient tagger applies on hadronically decaying top quark pairs as signal based on deep neural network algorithms and compares with the QCD multi-jet background events. A significant enhancement of performance in boosted top quark events is observed with our limited computing resources. We also compare modern machine learning approaches and perform a multivariate analysis of boosted top-pair as well as single top quark production through weak interaction at √s = 14 TeV proton-proton Collider. The most relevant known background processes are incorporated. Through the techniques of Boosted Decision Tree (BDT), likelihood and Multlayer Perceptron (MLP) the analysis is trained to observe the performance in comparison with the conventional cut based and count approach

Keywords: top tagger, multivariate, deep learning, LHC, single top

Procedia PDF Downloads 111
20088 Random Access in IoT Using Naïve Bayes Classification

Authors: Alhusein Almahjoub, Dongyu Qiu

Abstract:

This paper deals with the random access procedure in next-generation networks and presents the solution to reduce total service time (TST) which is one of the most important performance metrics in current and future internet of things (IoT) based networks. The proposed solution focuses on the calculation of optimal transmission probability which maximizes the success probability and reduces TST. It uses the information of several idle preambles in every time slot, and based on it, it estimates the number of backlogged IoT devices using Naïve Bayes estimation which is a type of supervised learning in the machine learning domain. The estimation of backlogged devices is necessary since optimal transmission probability depends on it and the eNodeB does not have information about it. The simulations are carried out in MATLAB which verify that the proposed solution gives excellent performance.

Keywords: random access, LTE/LTE-A, 5G, machine learning, Naïve Bayes estimation

Procedia PDF Downloads 145
20087 DNpro: A Deep Learning Network Approach to Predicting Protein Stability Changes Induced by Single-Site Mutations

Authors: Xiao Zhou, Jianlin Cheng

Abstract:

A single amino acid mutation can have a significant impact on the stability of protein structure. Thus, the prediction of protein stability change induced by single site mutations is critical and useful for studying protein function and structure. Here, we presented a deep learning network with the dropout technique for predicting protein stability changes upon single amino acid substitution. While using only protein sequence as input, the overall prediction accuracy of the method on a standard benchmark is >85%, which is higher than existing sequence-based methods and is comparable to the methods that use not only protein sequence but also tertiary structure, pH value and temperature. The results demonstrate that deep learning is a promising technique for protein stability prediction. The good performance of this sequence-based method makes it a valuable tool for predicting the impact of mutations on most proteins whose experimental structures are not available. Both the downloadable software package and the user-friendly web server (DNpro) that implement the method for predicting protein stability changes induced by amino acid mutations are freely available for the community to use.

Keywords: bioinformatics, deep learning, protein stability prediction, biological data mining

Procedia PDF Downloads 470
20086 Promoting Teaching and Learning Structures Based on Innovation and Entrepreneurship in Valahia University of Targoviste

Authors: Gabriela Teodorescu, Ioana Daniela Dulama

Abstract:

In an ever-changing society, the education system needs to constantly evolve to meet market demands. During its 30 years of existence, Valahia University of Targoviste (VUT) tried to offer its students a series of teaching-learning schemes that would prepare them for a remarkable career. In VUT, the achievement of performance through innovation can be analyzed by reference to several key indicators (i.e., university climate, university resources, and innovative methods applied to classes), but it is possible to differentiate between activities in the classic format: participate to courses; interactive seminars and tutorials; laboratories, workshops, project-based learning; entrepreneurial activities, through simulated enterprises; mentoring activities. Thus, VUT has implemented over time a series of schemes and projects based on innovation and entrepreneurship, and in this paper, some of them will be briefly presented. All these schemes were implemented by facilitating an effective dialog with students and the opportunity to listen to their views at all levels of the University and in all fields of study, as well as by developing a partnership with students to set out priority areas. VUT demonstrates innovation and entrepreneurial capacity through its new activities for higher education, which will attract more partnerships and projects dedicated to students.

Keywords: Romania, project-based learning, entrepreneurial activities, simulated enterprises

Procedia PDF Downloads 163
20085 Numerical Simulations on Feasibility of Stochastic Model Predictive Control for Linear Discrete-Time Systems with Random Dither Quantization

Authors: Taiki Baba, Tomoaki Hashimoto

Abstract:

The random dither quantization method enables us to achieve much better performance than the simple uniform quantization method for the design of quantized control systems. Motivated by this fact, the stochastic model predictive control method in which a performance index is minimized subject to probabilistic constraints imposed on the state variables of systems has been proposed for linear feedback control systems with random dither quantization. In other words, a method for solving optimal control problems subject to probabilistic state constraints for linear discrete-time control systems with random dither quantization has been already established. To our best knowledge, however, the feasibility of such a kind of optimal control problems has not yet been studied. Our objective in this paper is to investigate the feasibility of stochastic model predictive control problems for linear discrete-time control systems with random dither quantization. To this end, we provide the results of numerical simulations that verify the feasibility of stochastic model predictive control problems for linear discrete-time control systems with random dither quantization.

Keywords: model predictive control, stochastic systems, probabilistic constraints, random dither quantization

Procedia PDF Downloads 282
20084 Attitudes of Saudi Students Attending the English Programmes of the Royal Commission for Jubail and Yanbu toward Using Computer-Assisted Language Learning

Authors: Sultan Ahmed Arishi

Abstract:

The objective of the study was to investigate the attitude of the Saudi students attending the English Language programmes of the Royal Commission for Jubail towards using CALL, as well as to discover whether computer-assisted teaching is useful and valuable for students in learning English. Data were collected with the help of interviews and survey questionnaires. The outcomes of the investigation showed that students had a positive attitude towards CALL. Moreover, the listening skills of the students had the most substantial effect on students learning English through CALL. Unexpectedly, the teaching staff, equipment, curriculum, or even a student's poor English background was a distinct barrier that attributed to any weaknesses of using CALL, or in other words, all these factors were of a similar attitude.

Keywords: CALL, teaching aids, teaching technology, teaching English with technology, teaching English in Saudi Arabia

Procedia PDF Downloads 146
20083 ATM Location Problem and Cash Management in ATM's

Authors: M. Erol Genevois, D. Celik, H. Z. Ulukan

Abstract:

Automated teller machines (ATMs) can be considered among one of the most important service facilities in the banking industry. The investment in ATMs and the impact on the banking industry is growing steadily in every part of the world. The banks take into consideration many factors like safety, convenience, visibility, cost in order to determine the optimum locations of ATMs. Today, ATMs are not only available in bank branches but also at retail locations. Another important factor is the cash management in ATMs. A cash demand model for every ATM is needed in order to have an efficient cash management system. This forecasting model is based on historical cash demand data which is highly related to the ATMs location. So, the location and the cash management problem should be considered together. Although the literature survey on facility location models is quite large, it is surprising that there are only few studies which handle together ATMs location and cash management problem. In order to fulfill the gap, this paper provides a general review on studies, efforts and development in ATMs location and cash management problem.

Keywords: ATM location problem, cash management problem, ATM cash replenishment problem, literature review in ATMs

Procedia PDF Downloads 480
20082 Empirical Evaluation of Game Components Based on Learning Theory: A Preliminary Study

Authors: Seoi Lee, Dongjoo Chin, Heewon Kim

Abstract:

Gamification refers to a technique that applies game elements to non-gaming elements, such as education and exercise, to make people more engaged in these behaviors. The purpose of this study was to identify effective elements in gamification for changing human behaviors. In order to accomplish this purpose, a survey based on learning theory was developed, especially for assessing antecedents and consequences of behaviors, and 8 popular and 8 unpopular games were selected for comparison. A total of 407 adult males and females were recruited via crowdsourcing Internet marketplace and completed the survey, which consisted of 19 questions for antecedent and 14 questions for consequences. Results showed no significant differences in consequence questions between popular and unpopular games. For antecedent questions, popular games are superior to unpopular games in character customization, play type selection, a sense of belonging, patch update cycle, and influence or dominance. This study is significant in that it reveals the elements of gamification based on learning theory. Future studies need to empirically validate whether these factors affect behavioral change.

Keywords: gamification, learning theory, antecedent, consequence, behavior change, behaviorism

Procedia PDF Downloads 223
20081 Data Management System for Environmental Remediation

Authors: Elizaveta Petelina, Anton Sizo

Abstract:

Environmental remediation projects deal with a wide spectrum of data, including data collected during site assessment, execution of remediation activities, and environmental monitoring. Therefore, an appropriate data management is required as a key factor for well-grounded decision making. The Environmental Data Management System (EDMS) was developed to address all necessary data management aspects, including efficient data handling and data interoperability, access to historical and current data, spatial and temporal analysis, 2D and 3D data visualization, mapping, and data sharing. The system focuses on support of well-grounded decision making in relation to required mitigation measures and assessment of remediation success. The EDMS is a combination of enterprise and desktop level data management and Geographic Information System (GIS) tools assembled to assist to environmental remediation, project planning, and evaluation, and environmental monitoring of mine sites. EDMS consists of seven main components: a Geodatabase that contains spatial database to store and query spatially distributed data; a GIS and Web GIS component that combines desktop and server-based GIS solutions; a Field Data Collection component that contains tools for field work; a Quality Assurance (QA)/Quality Control (QC) component that combines operational procedures for QA and measures for QC; Data Import and Export component that includes tools and templates to support project data flow; a Lab Data component that provides connection between EDMS and laboratory information management systems; and a Reporting component that includes server-based services for real-time report generation. The EDMS has been successfully implemented for the Project CLEANS (Clean-up of Abandoned Northern Mines). Project CLEANS is a multi-year, multimillion-dollar project aimed at assessing and reclaiming 37 uranium mine sites in northern Saskatchewan, Canada. The EDMS has effectively facilitated integrated decision-making for CLEANS project managers and transparency amongst stakeholders.

Keywords: data management, environmental remediation, geographic information system, GIS, decision making

Procedia PDF Downloads 161
20080 A Comparative Study of Natural Language Processing Models for Detecting Obfuscated Text

Authors: Rubén Valcarce-Álvarez, Francisco Jáñez-Martino, Rocío Alaiz-Rodríguez

Abstract:

Cybersecurity challenges, including scams, drug sales, the distribution of child sexual abuse material, fake news, and hate speech on both the surface and deep web, have significantly increased over the past decade. Users who post such content often employ strategies to evade detection by automated filters. Among these tactics, text obfuscation plays an essential role in deceiving detection systems. This approach involves modifying words to make them more difficult for automated systems to interpret while remaining sufficiently readable for human users. In this work, we aim at spotting obfuscated words and the employed techniques, such as leetspeak, word inversion, punctuation changes, and mixed techniques. We benchmark Named Entity Recognition (NER) using models from the BERT family as well as two large language models (LLMs), Llama and Mistral, on XX_NER_WordCamouflage dataset. Our experiments evaluate these models by comparing their precision, recall, F1 scores, and accuracy, both overall and for each individual class.

Keywords: natural language processing (NLP), text obfuscation, named entity recognition (NER), deep learning

Procedia PDF Downloads 5
20079 Overcoming Challenges of Teaching English as a Foreign Language in Technical Classrooms: A Case Study at TVTC College of Technology

Authors: Sreekanth Reddy Ballarapu

Abstract:

The perception of the whole process of teaching and learning is undergoing a drastic and radical change. More and more student-centered, pragmatic, and flexible approaches are gradually replacing teacher-centered lecturing and structural-syllabus instruction. The issue of teaching English as a Foreign language is no exception in this regard. The traditional Present-Practice-Produce (P-P-P) method of teaching English is overtaken by Task-Based Teaching which is a subsidiary branch of Communicative Language Teaching. At this juncture this article strongly tries to convey that - Task-based learning, has an advantage over other traditional methods of teaching. All teachers of English must try to customize their texts into productive tasks, apply them, and evaluate the students as well as themselves. Task Based Learning is a double edged tool which can enhance the performance of both the teacher and the taught. The sample for this case study is a class of 35 students from Semester III - Network branch at TVTC College of Technology, Adhum - Kingdom of Saudi Arabia. The students are high school passed out and aged between 19-21years.For the present study the prescribed textbook Technical English 1 by David Bonamy was used and a number of language tasks were chalked out during the pre- task stage and the learners were made to participate voluntarily and actively. The Action Research methodology was adopted within the dual framework of Communicative Language Teaching and Task-Based Learning. The different tools such as questionnaires, feedback and interviews were used to collect data. This study provides information about various techniques of Communicative Language Teaching and Task Based Learning and focuses primarily on the advantages of using a Task Based Learning approach. This article presents in detail the objectives of the study, the planning and implementation of the action research, the challenges encountered during the execution of the plan, and the pedagogical outcome of this project. These research findings serve two purposes: first, it evaluates the effectiveness of Task Based Learning and, second, it empowers the teacher's professionalism in designing and implementing the tasks. In the end, the possibility of scope for further research is presented in brief.

Keywords: action research, communicative language teaching, task based learning, perception

Procedia PDF Downloads 238
20078 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 126
20077 Spatial Mental Imagery in Students with Visual Impairments when Learning Literal and Metaphorical Uses of Prepositions in English as a Foreign Language

Authors: Natalia Sáez, Dina Shulfman

Abstract:

There is an important research gap regarding accessible pedagogical techniques for teaching foreign languages to adults with visual impairments. English as a foreign language (EFL), in particular, is needed in many countries to expand occupational opportunities and improve living standards. Within EFL research, teaching and learning prepositions have only recently gained momentum, considering that they constitute one of the most difficult structures to learn in a foreign language and are fundamental for communicating about spatial relations in the world, both on the physical and imaginary levels. Learning to use prepositions would not only facilitate communication when referring to the surrounding tangible environment but also when conveying ideas about abstract topics (e.g., justice, love, society), for which students’ sociocultural knowledge about space could play an important role. By potentiating visually impaired students’ ability to construe mental spatial imagery, this study made efforts to explore pedagogical techniques that cater to their strengths, helping them create new worlds by welcoming and expanding their sociocultural funds of knowledge as they learn to use English prepositions. Fifteen visually impaired adults living in Chile participated in the study. Their first language was Spanish, and they were learning English at the intermediate level of proficiency in an EFL workshop at La Biblioteca Central para Ciegos (The Central Library for the Blind). Within this workshop, a series of activities and interviews were designed and implemented with the intention of uncovering students’ spatial funds of knowledge when learning literal/physical uses of three English prepositions, namely “in,” “at,” and “on”. The activities and interviews also explored whether students used their original spatial funds of knowledge when learning metaphorical uses of these prepositions and if their use of spatial imagery changed throughout the learning activities. Over the course of approximately half a year, it soon became clear that the students construed mental images of space when learning both literal/physical and metaphorical uses of these prepositions. This research could inform a new approach to inclusive language education using pedagogical methods that are relevant and accessible to students with visual impairments.

Keywords: EFL, funds of knowledge, prepositions, spatial cognition, visually impaired students

Procedia PDF Downloads 80
20076 A Strategic Communication Design Model for Indigenous Knowledge Management

Authors: Dilina Janadith Nawarathne

Abstract:

This article presents the initial development of a communication model (Model_isi) as the means of gathering, preserving and transferring indigenous knowledge in the field of knowledge management. The article first discusses the need for an appropriate complimentary model for indigenous knowledge management which differs from the existing methods and models. Then the paper suggests the newly developed model for indigenous knowledge management which generate as result of blending key aspects of different disciplines, which can be implemented as a complementary approach for the existing scientific method. The paper further presents the effectiveness of the developed method in reflecting upon a pilot demonstration carried out on selected indigenous communities of Sri Lanka.

Keywords: indigenous knowledge management, knowledge transferring, tacit knowledge, research model, asian centric philosophy

Procedia PDF Downloads 480
20075 Relationship between Right Brain and Left Brain Dominance and Intonation Learning

Authors: Mohammad Hadi Mahmoodi, Soroor Zekrati

Abstract:

The aim of this study was to investigate the relationship between hemispheric dominance and intonation learning of Iranian EFL students. In order to gain this goal, 52 female students from three levels of beginner, elementary and intermediate in Paradise Institute, and 18 male university students at Bu-Ali Sina University constituted the sample. In order to assist students learn the correct way of applying intonation to their everyday speech, the study proposed an interactive approach and provided students with visual aid through which they were able to see the intonation pattern on computer screen using 'Speech Analyzer' software. This software was also used to record subjects’ voice and compare them with the original intonation pattern. Edinburg Handedness Questionnaire (EHD), which ranges from –100 for strong left-handedness to +100 for strong right-handedness was used to indicate the hemispheric dominance of each student. The result of an independent sample t-test indicated that girls learned intonation pattern better than boys, and that right brained students significantly outperformed the left brained ones. Using one-way ANOVA, a significant difference between three proficiency levels was also found. The posthoc Scheffer test showed that the exact difference was between intermediate and elementary, and intermediate and beginner levels, but no significant difference was observed between elementary and beginner levels. The findings of the study might provide researchers with some helpful implications and useful directions for future investigation into the domain of the relationship between mind and second language learning.

Keywords: intonation, hemispheric dominance, visual aid, language learning, second language learning

Procedia PDF Downloads 519
20074 An Efficient Resource Management Algorithm for Mobility Management in Wireless Mesh Networks

Authors: Mallikarjuna Rao Yamarthy, Subramanyam Makam Venkata, Satya Prasad Kodati

Abstract:

The main objective of the proposed work is to reduce the overall network traffic incurred by mobility management, packet delivery cost and to increase the resource utilization. The proposed algorithm, An Efficient Resource Management Algorithm (ERMA) for mobility management in wireless mesh networks, relies on pointer based mobility management scheme. Whenever a mesh client moves from one mesh router to another, the pointer is set up dynamically between the previous mesh router and current mesh router based on the distance constraints. The algorithm evaluated for signaling cost, data delivery cost and total communication cost performance metrics. The proposed algorithm is demonstrated for both internet sessions and intranet sessions. The proposed algorithm yields significantly better performance in terms of signaling cost, data delivery cost, and total communication cost.

Keywords: data delivery cost, mobility management, pointer forwarding, resource management, wireless mesh networks

Procedia PDF Downloads 367
20073 The Multi-Sensory Teaching Practice for Primary Music Classroom in China

Authors: Xiao Liulingzi

Abstract:

It is important for using multi-sensory teaching in music learning. This article aims to provide knowledge in multi-sensory learning and teaching music in primary school. For primary school students, in addition to the training of basic knowledge and skills of music, students' sense of participation and creativity in music class are the key requirements, especially the flexibility and dynamics in music class, so that students can integrate into music and feel the music. The article explains the multi-sensory sense in music learning, the differences between multi-sensory music teaching and traditional music teaching, and music multi-sensory teaching in primary schools in China.

Keywords: multi-sensory, teaching practice, primary music classroom, China

Procedia PDF Downloads 130
20072 Enhancing Students’ Academic Engagement in Mathematics through a “Concept+Language Mapping” Approach

Authors: Jodie Lee, Lorena Chan, Esther Tong

Abstract:

Hong Kong students face a unique learning environment. Starting from the 2010/2011 school year, The Education Bureau (EDB) of the Government of the Hong Kong Special Administrative Region implemented the fine-tuned Medium of Instruction (MOI) arrangements for secondary schools. Since then, secondary schools in Hong Kong have been given the flexibility to decide the most appropriate MOI arrangements for their schools and under the new academic structure for senior secondary education, particularly on the compulsory part of the mathematics curriculum. In 2019, Hong Kong Diploma of Secondary Education Examination (HKDSE), over 40% of school day candidates attempted the Mathematics Compulsory Part examination in the Chinese version while the rest took the English version. Moreover, only 14.38% of candidates sat for one of the extended Mathematics modules. This results in a serious of intricate issues to students’ learning in post-secondary education programmes. It is worth to note that when students further pursue to an higher education in Hong Kong or even oversea, they may facing substantial difficulties in transiting learning from learning mathematics in their mother tongue in Chinese-medium instruction (CMI) secondary schools to an English-medium learning environment. Some students understood the mathematics concepts were found to fail to fulfill the course requirements at college or university due to their learning experience in secondary study at CMI. They are particularly weak in comprehending the mathematics questions when they are doing their assessment or attempting the test/examination. A government funded project was conducted with the aims of providing integrated learning context and language support to students with a lower level of numeracy and/or with CMI learning experience. By introducing this “integrated concept + language mapping approach”, students can cope with the learning challenges in the compulsory English-medium mathematics and statistics subjects in their tertiary education. Ultimately, in the hope that students can enhance their mathematical ability, analytical skills, and numerical sense for their lifelong learning. The “Concept + Language Mapping “(CLM) approach was adopted and tried out in the bridging courses for students with a lower level of numeracy and/or with CMI learning experiences. At the beginning of each class, a pre-test was conducted, and class time was then devoted to introducing the concepts by CLM approach. For each concept, the key thematic items and their different semantic relations are presented using graphics and animations via the CLM approach. At the end of each class, a post-test was conducted. Quantitative data analysis was performed to study the effect on students’ learning via the CLM approach. Stakeholders' feedbacks were collected to estimate the effectiveness of the CLM approach in facilitating both content and language learning. The results based on both students’ and lecturers’ feedback indicated positive outcomes on adopting the CLM approach to enhance the mathematical ability and analytical skills of CMI students.

Keywords: mathematics, Concept+Language Mapping, level of numeracy, medium of instruction

Procedia PDF Downloads 82
20071 A Deep Learning Approach to Online Social Network Account Compromisation

Authors: Edward K. Boahen, Brunel E. Bouya-Moko, Changda Wang

Abstract:

The major threat to online social network (OSN) users is account compromisation. Spammers now spread malicious messages by exploiting the trust relationship established between account owners and their friends. The challenge in detecting a compromised account by service providers is validating the trusted relationship established between the account owners, their friends, and the spammers. Another challenge is the increase in required human interaction with the feature selection. Research available on supervised learning (machine learning) has limitations with the feature selection and accounts that cannot be profiled, like application programming interface (API). Therefore, this paper discusses the various behaviours of the OSN users and the current approaches in detecting a compromised OSN account, emphasizing its limitations and challenges. We propose a deep learning approach that addresses and resolve the constraints faced by the previous schemes. We detailed our proposed optimized nonsymmetric deep auto-encoder (OPT_NDAE) for unsupervised feature learning, which reduces the required human interaction levels in the selection and extraction of features. We evaluated our proposed classifier using the NSL-KDD and KDDCUP'99 datasets in a graphical user interface enabled Weka application. The results obtained indicate that our proposed approach outperformed most of the traditional schemes in OSN compromised account detection with an accuracy rate of 99.86%.

Keywords: computer security, network security, online social network, account compromisation

Procedia PDF Downloads 119