Search results for: professional protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2923

Search results for: professional protocol

2893 Asynchronous Low Duty Cycle Media Access Control Protocol for Body Area Wireless Sensor Networks

Authors: Yasin Ghasemi-Zadeh, Yousef Kavian

Abstract:

Wireless body area networks (WBANs) technology has achieved lots of popularity over the last decade with a wide range of medical applications. This paper presents an asynchronous media access control (MAC) protocol based on B-MAC protocol by giving an application for medical issues. In WBAN applications, there are some serious problems such as energy, latency, link reliability (quality of wireless link) and throughput which are mainly due to size of sensor networks and human body specifications. To overcome these problems and improving link reliability, we concentrated on MAC layer that supports mobility models for medical applications. In the presented protocol, preamble frames are divided into some sub-frames considering the threshold level. Actually, the main reason for creating shorter preambles is the link reliability where due to some reasons such as water, the body signals are affected on some frequency bands and causes fading and shadowing on signals, therefore by increasing the link reliability, these effects are reduced. In case of mobility model, we use MoBAN model and modify that for some more areas. The presented asynchronous MAC protocol is modeled by OMNeT++ simulator. The results demonstrate increasing the link reliability comparing to B-MAC protocol where the packet reception ratio (PRR) is 92% also covers more mobility areas than MoBAN protocol.

Keywords: wireless body area networks (WBANs), MAC protocol, link reliability, mobility, biomedical

Procedia PDF Downloads 347
2892 Teacher Professional Development –Current Practices in a Secondary School in Brunei Darussalam

Authors: Shanthi Thomas

Abstract:

This research paper presents the current practices of teacher professional development, perceived as beneficial by teachers themselves, in a private secondary school in Brunei Darussalam. This is part of the findings of a larger qualitative study on teacher empowerment, using ethnographic methods for data collection, i.e. participant observation, interviews and document analysis. The field work was carried out over a period of six months in 2013. An analysis of the field data revealed multiple pathways of teacher professional development existing in the school. The results indicate that school leaders, the teacher community in the school, students, and the teachers themselves were the agents in a school that facilitated teacher empowerment. Besides contributing to the knowledge base on teacher professional development, the results of this study provides directions for educational policy makers in their efforts to enhance professional development in secondary schools of similar characteristics. For school leaders and the teacher community, these findings offer guidelines for maximizing the opportunities for these professional development practices, by strengthening collegiality and by using the existing structures optimally for the benefit of all concerned.

Keywords: colleagues and the wider teacher community, school leaders, self-driven professional development, teacher professional development

Procedia PDF Downloads 384
2891 An Analytical Approach for Medication Protocol Errors from Pediatric Nurse Curriculum

Authors: Priyanka Jani

Abstract:

The main focus of this research is to consider the objective of nursing curriculum in concern with pediatric nurses in respect to various parameters such as causes, reporting and prevention of medication protocol errors. A design or method selected for the study is the descriptive and cross sectional with respect to analytical study. Nurses were selected from inpatient pediatric wards of 5 hospitals in Gujarat, as a population. 126 pediatric nurses gave approval to participate in the research and completed with quarter questionnaires. The actual data was collected and analyzed. The actual data was collected and analyzed. The medium age of the nurses was 25.7 ± 3.68 years; the maximum was lady (97.6%) pediatric nurses stated that the most common causes of medication protocol errors were large work time (69.2%) and a huge ratio of patient: nurse (59.9%). Even though the highest number of nurses (89%) made use of a medication protocol errors notification system, or else they use to check it before. Many errors were not reported and nurses cited abeyant claims of nurses in case of adverse and opposite output for patient (53.97%), distrust (52.45%), and fear of various/different protocol for mediations (42%) among the causes of insufficient of notification in concern to ignorance, nurses most commonly noted the requirement for efficient data concerning the safe use of medications (47.5%). This is the frequent study made by researcher in Gujarat about the pediatric nurse curriculum regarding medication protocol errors. The outputs debate that there is a requirement for ongoing coaching of pediatric nurses regarding safe & secure medication observation and that the causes and post reporting of medication protocol errors by hand further survey.

Keywords: pediatric, medication, protocol, errors

Procedia PDF Downloads 274
2890 A Unique Professional Development of Teacher Educators: Teaching Colleagues

Authors: Naomi Weiner-Levy

Abstract:

The Mofet Institute of Research, established a School of Professional Development, the only one of its kind in Israel and throughout the world. It offers specialized programs for teacher educators, providing them with the professional knowledge and skills. The studies aim at updating teachers about rapidly changing knowledge and skills. Teacher educators are conceptualized as shifting from first order practitioners (school teachers) to second order practitioners. Those who train teachers are referred to as third order practitioners. The instructors in the School of Professional Development are third-order practitioners – teacher educators specializing in teaching their colleagues. Collegial guidance by teachers’ college staff members is no simple task: Tutors must be expert in their field of specialization, as well as in instruction. Moreover, although colleagues, they have to position themselves within the group as authoritative figures in terms of instruction and knowledge. To date, the role and professional identity of these third-order practitioners, has not been studied. To understand the nature and development of professional identity, a qualitative study was conducted in which 12 tutors of various subjects were interviewed. These were analyzed by categorical content analysis. The findings, assessed professional identity through a post-modern prism, while examining the interplay among events that tutors experienced, the knowledge they acquired and the structuring of their professional identity. The Tutors’ identity transformed through negotiating with ‘self’ and ‘other’ in the class, and constructed by their mutual experiences as tutors and learners. Understanding the function and identity of tutors facilitates comprehension of this unique training process for teacher educators.

Keywords: professional development, professional identity, teacher education, tutoring

Procedia PDF Downloads 187
2889 Case Study of Obstructive Sleep Apnea and Methods of Treatment for a Professional Driver

Authors: R. Pääkkönen, L. Korpinen, T. Kava, I. Salmi

Abstract:

This study evaluates obstructive sleep apnea treatment through a case study involving a 67-year-old male driver who had a successful continuous positive airway pressure (CPAP) treatment at home but experienced difficulties with traveling and dental care. There are many cheap sleep apnea and snoring devices available, but there is little professional advice on what kind of devices can help. Professional drivers receive yearly specialized medical care follow-up.

Keywords: sleep, apnea patient, CPAP, professional driver

Procedia PDF Downloads 176
2888 A Study on Assertiveness, Stigmatization, Gender Role Beliefs and Attitudes toward Seeking Professional Psychological Help among Young Adults in South East Asian

Authors: Chee Kwan Foong, Foong Mei Kei

Abstract:

This study aimed to investigate the influence of self-stigma, perceived public stigma, assertiveness and gender role beliefs on attitudes toward seeking professional psychological help. Two hundred and fifty young adults from universities in Brunei were recruited through convenience sampling to complete a survey. Individuals facing higher stigmatisation (both self-stigma and public-stigma) had less positive attitude towards seeking professional psychological help. Individuals who were more assertive had more positive attitude towards seeking professional psychological help. For males, individuals with more traditional gender role belief showed less positive attitude towards seeking professional psychological help. For female, there was no relationship between gender role beliefs and attitude towards seeking professional psychological help. Results confirmed there was a significant mediating effect between public stigma and attitude toward seeking professional psychological help. This study could guide the mental-health professionals in promoting more positive help-seeking attitude and raise the awareness about mental challenges which could assist in reducing stigmatization, and therefore, gain a deeper understanding.

Keywords: assertiveness, attitude towards seeking professional psychological help, gender role beliefs, stigmatization

Procedia PDF Downloads 370
2887 Effect of Common Yoga Protocol on Reaction Time of Football Players

Authors: Vikram Singh

Abstract:

The objective of the study was to study the effectiveness of common yoga protocol on reaction time (simple visual reaction time-SVRT measured in milliseconds/seconds) of male football players in the age group of 15 to 21 years. The 40 boys were randomly assigned into two groups i.e. control and experimental. SVRT for both the groups were measured on day-1 and post intervention (common yoga protocol here) was measured after 45 days of training to the experimental group only. One way ANOVA (Univariate analysis) and Independent t-test using SPSS 23 statistical package was applied to get and analyze the results. There was a significant difference after 45 days of yoga protocol in simple visual reaction time of experimental group (p = .032), t (33.05) = 3.881, p = .000 (two-tailed). Null hypothesis (that there would be no post measurement differences in reaction times of control and experimental groups) was rejected. Where p<.05. Therefore alternate hypothesis was accepted.

Keywords: footballers, t-test, yoga protocol, reaction time

Procedia PDF Downloads 232
2886 Emerging Research Trends in Routing Protocol for Wireless Sensor Network

Authors: Subhra Prosun Paul, Shruti Aggarwal

Abstract:

Now a days Routing Protocol in Wireless Sensor Network has become a promising technique in the different fields of the latest computer technology. Routing in Wireless Sensor Network is a demanding task due to the different design issues of all sensor nodes. Network architecture, no of nodes, traffic of routing, the capacity of each sensor node, network consistency, service value are the important factor for the design and analysis of Routing Protocol in Wireless Sensor Network. Additionally, internal energy, the distance between nodes, the load of sensor nodes play a significant role in the efficient routing protocol. In this paper, our intention is to analyze the research trends in different routing protocols of Wireless Sensor Network in terms of different parameters. In order to explain the research trends on Routing Protocol in Wireless Sensor Network, different data related to this research topic are analyzed with the help of Web of Science and Scopus databases. The data analysis is performed from global perspective-taking different parameters like author, source, document, country, organization, keyword, year, and a number of the publication. Different types of experiments are also performed, which help us to evaluate the recent research tendency in the Routing Protocol of Wireless Sensor Network. In order to do this, we have used Web of Science and Scopus databases separately for data analysis. We have observed that there has been a tremendous development of research on this topic in the last few years as it has become a very popular topic day by day.

Keywords: analysis, routing protocol, research trends, wireless sensor network

Procedia PDF Downloads 191
2885 A Genetic Algorithm Based Sleep-Wake up Protocol for Area Coverage in WSNs

Authors: Seyed Mahdi Jameii, Arash Nikdel, Seyed Mohsen Jameii

Abstract:

Energy efficiency is an important issue in the field of Wireless Sensor Networks (WSNs). So, minimizing the energy consumption in this kind of networks should be an essential consideration. Sleep/wake scheduling mechanism is an efficient approach to handling this issue. In this paper, we propose a Genetic Algorithm-based Sleep-Wake up Area Coverage protocol called GA-SWAC. The proposed protocol puts the minimum of nodes in active mode and adjusts the sensing radius of each active node to decrease the energy consumption while maintaining the network’s coverage. The proposed protocol is simulated. The results demonstrate the efficiency of the proposed protocol in terms of coverage ratio, number of active nodes and energy consumption.

Keywords: wireless sensor networks, genetic algorithm, coverage, connectivity

Procedia PDF Downloads 488
2884 Maximizing the Role of Companion Teachers for the Achievement of Professional Competencies and Pedagogics Workshop Activities of Teacher Professional Participants in the Faculty of Teaching and Education of Mulawarman University

Authors: Makrina Tindangen

Abstract:

The problems faced by participants of teacher profession program in Faculty of teaching and education Mulawarman University is professional and pedagogic competence. Professional competence related to the mastery of teaching materials, while pedagogic competence related with the ability to plan and to implement learning. Based on the problems, the purpose of the research is to maximize the role of companion teacher for the achievement of professional and pedagogic competencies in the workshop of the participants of teacher professional education in the Faculty of Teaching and Education of Mulawarman University. Qualitative research method with interview guidance and document to get in-depth data on how to maximize the role of companion teachers in the achievement of professional and pedagogic competencies in the workshop participants of professional education participants. Location of this research is on the Faculty of Teaching and Education of Mulawarman University, Samarinda City, East Kalimantan Province. Research respondents were 12 teachers of workshop facilitator. Descriptive data analysis is through interpretation of interview data. The conclusion of the research result, how to maximize the role of assistant teachers in workshop activities for the professional competence and pedagogic competence of professional teacher training program participants, through facilitation activities conducted by teachers of companion related to real problems faced by students in school, so that the workshop participants have professional competence and pedagogic as an initial competence before carrying out practical activities of field experience in school.

Keywords: companion teacher, professional and pedagogical competence, activities, workshop participants

Procedia PDF Downloads 162
2883 Key Transfer Protocol Based on Non-invertible Numbers

Authors: Luis A. Lizama-Perez, Manuel J. Linares, Mauricio Lopez

Abstract:

We introduce a method to perform remote user authentication on what we call non-invertible cryptography. It exploits the fact that the multiplication of an invertible integer and a non-invertible integer in a ring Zn produces a non-invertible integer making infeasible to compute factorization. The protocol requires the smallest key size when is compared with the main public key algorithms as Diffie-Hellman, Rivest-Shamir-Adleman or Elliptic Curve Cryptography. Since we found that the unique opportunity for the eavesdropper is to mount an exhaustive search on the keys, the protocol seems to be post-quantum.

Keywords: invertible, non-invertible, ring, key transfer

Procedia PDF Downloads 143
2882 Non-Interactive XOR Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations

Authors: Lara Stroh, Nikola Horová, Robert Stárek, Ittoop V. Puthoor, Michal Mičuda, Miloslav Dušek, Erika Andersson

Abstract:

Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as a building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver, Bob, obtains either the first bit, the second bit, or their XOR. Bob should not learn anything more than this, and Alice should not learn what Bob has learned. Perfect quantum OT with information-theoretic security is known to be impossible. We determine the smallest possible cheating probabilities for unrestricted dishonest parties in non-interactive quantum XOT protocols using symmetric pure states and present an optimal protocol which outperforms classical protocols. We also "reverse" this protocol so that Bob becomes the sender of a quantum state and Alice the receiver who measures it while still implementing oblivious transfer from Alice to Bob. Cheating probabilities for both parties stay the same as for the unreversed protocol. We optically implemented both the unreversed and the reversed protocols and cheating strategies, noting that the reversed protocol is easier to implement.

Keywords: oblivious transfer, quantum protocol, cryptography, XOR

Procedia PDF Downloads 89
2881 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 265
2880 An Exploration on Competency-Based Curricula in Integrated Circuit Design

Authors: Chih Chin Yang, Chung Shan Sun

Abstract:

In this paper, the relationships between professional competences and school curricula in IC design industry are explored. The semi-structured questionnaire survey and focus group interview is the research method. Study participants are graduates of microelectronics engineering professional departments who are currently employed in the IC industry. The IC industries are defined as the electronic component manufacturing industry and optical-electronic component manufacturing industry in the semiconductor industry and optical-electronic material devices, respectively. Study participants selected from IC design industry include IC engineering and electronic & semiconductor engineering. The human training with IC design professional competence in microelectronics engineering professional departments is explored in this research. IC professional competences of human resources in the IC design industry include general intelligence and professional intelligence.

Keywords: IC design, curricula, competence, task, duty

Procedia PDF Downloads 356
2879 Modernization and Modernity: The Professional Education Concept in the Political Discourse of the Legislative Congress of Minas Gerais (1892-1930)

Authors: Milene Magalhães Pinto, Irlen Antônio Gonçalves

Abstract:

The purpose of this paper is to discuss how the historical processes of organization and reform of professional education contributed with the educational projects for the training/education starting from the idea of modernization of Brazil by way of industry and skilled worker. In the discourse of Congress Legislative of Minas Gerais is possible to identify the role of education as a mediating body of construction processes and rationalization modernizing of the country. The hypothesis is that education is an important instrument for promoting progress and citizenship and the way to form the professional who would serve the social and economic purposes of modernization of Brazil in the nineteenth and twentieth centuries. In this sense, we investigate the relationship of the concept of professional education with the ideas of modernization and modernity.

Keywords: education, modernization and education, legislative congress of Minas Gerais, professional education

Procedia PDF Downloads 489
2878 A Wireless Sensor Network Protocol for a Car Parking Space Monitoring System

Authors: Jung-Ho Moon, Myung-Gon Yoon, Tae Kwon Ha

Abstract:

This paper presents a wireless sensor network protocol for a car parking monitoring system. A wireless sensor network for the purpose is composed of multiple sensor nodes, a sink node, a gateway, and a server. Each of the sensor nodes is equipped with a 3-axis AMR sensor and deployed in the center of a parking space. The sensor node reads its sensor values periodically and transmits the data to the sink node if the current and immediate past sensor values show a difference exceeding a threshold value. The operations of the sink and sensor nodes are described in detail along with flow diagrams. The protocol allows a low-duty cycle operation of the sensor nodes and a flexible adjustment of the threshold value used by the sensor nodes.

Keywords: car parking monitoring, sensor node, wireless sensor network, network protocol

Procedia PDF Downloads 502
2877 Optimized Cluster Head Selection Algorithm Based on LEACH Protocol for Wireless Sensor Networks

Authors: Wided Abidi, Tahar Ezzedine

Abstract:

Low-Energy Adaptive Clustering Hierarchy (LEACH) has been considered as one of the effective hierarchical routing algorithms that optimize energy and prolong the lifetime of network. Since the selection of Cluster Head (CH) in LEACH is carried out randomly, in this paper, we propose an approach of electing CH based on LEACH protocol. In other words, we present a formula for calculating the threshold responsible for CH election. In fact, we adopt three principle criteria: the remaining energy of node, the number of neighbors within cluster range and the distance between node and CH. Simulation results show that our proposed approach beats LEACH protocol in regards of prolonging the lifetime of network and saving residual energy.

Keywords: wireless sensors networks, LEACH protocol, cluster head election, energy efficiency

Procedia PDF Downloads 299
2876 Performance Comparison of AODV and Soft AODV Routing Protocol

Authors: Abhishek, Seema Devi, Jyoti Ohri

Abstract:

A mobile ad hoc network (MANET) represents a system of wireless mobile nodes that can self-organize freely and dynamically into arbitrary and temporary network topology. Unlike a wired network, wireless network interface has limited transmission range. Routing is the task of forwarding data packets from source to a given destination. Ad-hoc On Demand Distance Vector (AODV) routing protocol creates a path for a destination only when it required. This paper describes the implementation of AODV routing protocol using MATLAB-based Truetime simulator. In MANET's node movements are not fixed while they are random in nature. Hence intelligent techniques i.e. fuzzy and ANFIS are used to optimize the transmission range. In this paper, we compared the transmission range of AODV, fuzzy AODV and ANFIS AODV. For soft computing AODV, we have taken transmitted power and received threshold as input and transmission range as output. ANFIS gives better results as compared to fuzzy AODV.

Keywords: ANFIS, AODV, fuzzy, MANET, reactive routing protocol, routing protocol, truetime

Procedia PDF Downloads 458
2875 Hybrid Hierarchical Routing Protocol for WSN Lifetime Maximization

Authors: H. Aoudia, Y. Touati, E. H. Teguig, A. Ali Cherif

Abstract:

Conceiving and developing routing protocols for wireless sensor networks requires considerations on constraints such as network lifetime and energy consumption. In this paper, we propose a hybrid hierarchical routing protocol named HHRP combining both clustering mechanism and multipath optimization taking into account residual energy and RSSI measures. HHRP consists of classifying dynamically nodes into clusters where coordinators nodes with extra privileges are able to manipulate messages, aggregate data and ensure transmission between nodes according to TDMA and CDMA schedules. The reconfiguration of the network is carried out dynamically based on a threshold value which is associated with the number of nodes belonging to the smallest cluster. To show the effectiveness of the proposed approach HHRP, a comparative study with LEACH protocol is illustrated in simulations.

Keywords: routing protocol, optimization, clustering, WSN

Procedia PDF Downloads 435
2874 Revolutionizing RNA Extraction: A Unified, Sustainable, and Rapid Protocol for High-Quality Isolation from Diverse Tissues

Authors: Ying Qi Chan, Chunyu Li, Xu Rou Yoyo Ma, Yaya Li, Saber Khederzadeh

Abstract:

In the ever-evolving landscape of genome extraction protocols, the existing methodologies grapple with issues ranging from sub-optimal yields and compromised quality to time-intensive procedures and reliance on hazardous reagents, often necessitating substantial tissue quantities. This predicament is particularly challenging for scientists in developing countries, where resources are limited. Our investigation presents a protocol for the efficient extraction of high-yield RNA from various tissues such as muscle, insect, and plant samples. Noteworthy for its advantages, our protocol stands out as the safest, swiftest (completed in just 38 minutes), most cost-effective (coming in at a mere US$0.017), and highly efficient method in comparison to existing protocols. Notably, our method avoids the use of hazardous or toxic chemicals such as chloroform and phenol and enzymatic agents like RNase and Proteinase K. Our RNA extraction protocol has demonstrated clear advantages over other methods, including commercial kits, in terms of yield. This nucleic acid extraction protocol is more environmentally and research-friendly, suitable for a range of tissues, even in tiny volumes, hence facilitating various genetic diagnosis and researches across the globe.

Keywords: RNA extraction, rapid protocol, universal method, diverse tissues

Procedia PDF Downloads 48
2873 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 423
2872 Identity Construction of English Language Teachers from Nepal: A Narrative Inquiry

Authors: Bharat Prasad Neupane

Abstract:

Given the widespread concentration on beliefs, values, emotions, critical incidents, and practices in exploring teachers’ professional identities, this study presents the trajectories of identity construction of three English language teachers from Nepal, analyzing their storied lives from schoolteachers to university professors. For this purpose, the article considered the three-dimensional professional development model to explore the effective mediation by the state agencies, culture and the policies, appropriate support from the organizations, and the bottom-up initiatives taken by the teachers in their professional development. Besides, the professional development journey derived from the in-depth interview of the participants is analyzed by employing communities of practice theory, particularly engagement, alignment, and imagination, as theoretical categories to discover their professional identities. The analysis revealed that passion for language, creativity, and motivation to learn English during childhood initially encouraged them to study English. In addition, inspiration from their teachers during their schooling and later a competitive working environment motivated them to experiment with innovative teaching approaches and establish themselves in the profession. Furthermore, diversification in university teaching according to university requirements and resultant divergence from the professional root ultimately transformed their identity beyond English teachers. Finally, university policy, customization of teachers as per the university requirement, and their survival strategy as English teachers in a university where technical subjects are given more priority has impacted their professional identities.

Keywords: teachers’ professional development, English language teaching, professional identity, communities of practice

Procedia PDF Downloads 49
2871 Teaching Professional Competences through Projects: Experiencing Curriculum Development through Active Learning

Authors: Flavio Campos, Patricia Masmo, Fernanda Yamamoto

Abstract:

The report presents a research about teaching professional competencies through projects, considering the student as an active learner and curriculum development. Considering project based-learning, the report articulate the result of research about curriculum development for professional competencies and teaching-learning strategies to help the development of professional competencies in learning environments in the courses of National Learning Service in São Paulo, Brazil. There so, intend to demonstrate fundamentals to elaborate curriculum to learning environment, specific about teaching methodologies to enrich student-learning process, using projects. The practice that has been taking place since 2013 indicates the needs of rethinking knowledge and practice in courses that prepared students to labor.

Keywords: curriculum design, active learning, professional competencies, project based-learning

Procedia PDF Downloads 399
2870 Wireless Sensor Networks Optimization by Using 2-Stage Algorithm Based on Imperialist Competitive Algorithm

Authors: Hamid R. Lashgarian Azad, Seyed N. Shetab Boushehri

Abstract:

Wireless sensor networks (WSN) have become progressively popular due to their wide range of applications. Wireless Sensor Network is made of numerous tiny sensor nodes that are battery-powered. It is a very significant problem to maximize the lifetime of wireless sensor networks. In this paper, we propose a two-stage protocol based on an imperialist competitive algorithm (2S-ICA) to solve a sensor network optimization problem. The energy of the sensors can be greatly reduced and the lifetime of the network reduced by long communication distances between the sensors and the sink. We can minimize the overall communication distance considerably, thereby extending the lifetime of the network lifetime through connecting sensors into a series of independent clusters using 2SICA. Comparison results of the proposed protocol and LEACH protocol, which is common to solving WSN problems, show that our protocol has a better performance in terms of improving network life and increasing the number of transmitted data.

Keywords: wireless sensor network, imperialist competitive algorithm, LEACH protocol, k-means clustering

Procedia PDF Downloads 61
2869 The Influence of Republican Culture in the Professional Education Reforms in Brazil (1892-1930)

Authors: Milene Magalhães Pinto, Irlen Antônio Gonçalves

Abstract:

This paper is within the area of History of Education in Brazil, having a descriptive and exploratory nature. It has been built on the belief that professional education is organized under political guidelines and solidifies through institutionalized discourses, allowing to know its mission concerning the society in which it operates by studying these speeches. Our purpose is to analyze how the Republican political culture yielded changes in public education through reforms to professional education in the First Republic, based on seven procedures of law that occurred in the Legislature of State of Minas Gerais. The Republican effort to reform the teaching was the result of a conception of society that aspired to advance the country by way of the national worker.

Keywords: professional education, republican political culture, education reforms, Brazil

Procedia PDF Downloads 462
2868 Assessing the Pre-Service and In-Service Teachers’ Continuation of Use of Technology After Participation in Professional Development

Authors: Ayoub Kafyulilo, Petra Fisser, Joke Voogt

Abstract:

This study was conducted to assess the continuation of the use of technology in science and mathematics teaching of the pre-service and in-service teachers who attended the professional development programme. It also assessed professional development, personal, institutional, and technological factors contributing to the continuous use of technology in teaching. The study involved 42 teachers, thirteen pre-service teachers, and twenty-nine in-service teachers. A mixed-method research approach was used to collect data for this study. Findings showed that the continuous use of technology in teaching after the termination of the professional development arrangement was high among the pre-service teachers, and differed for the in-service teachers. The regression model showed that knowledge and skills, access to technology and ease of use were strong predictors (R2 = 55.3%) of the teachers’ continuous use of technology after the professional development arrangement. The professional development factor did not have a direct effect on the continuous use of technology, rather had an influence on personal factors (knowledge and skills). In turn, the personal factors had influence on the institutional factors (access to technology) and technological factors (ease of use), which together had an effect on the teachers’ continuous use of technology in teaching.

Keywords: technology, professional development, teachers, science and mathematics

Procedia PDF Downloads 129
2867 Performance Analysis of Deterministic Stable Election Protocol Using Fuzzy Logic in Wireless Sensor Network

Authors: Sumanpreet Kaur, Harjit Pal Singh, Vikas Khullar

Abstract:

In Wireless Sensor Network (WSN), the sensor containing motes (nodes) incorporate batteries that can lament at some extent. To upgrade the energy utilization, clustering is one of the prototypical approaches for split sensor motes into a number of clusters where one mote (also called as node) proceeds as a Cluster Head (CH). CH selection is one of the optimization techniques for enlarging stability and network lifespan. Deterministic Stable Election Protocol (DSEP) is an effectual clustering protocol that makes use of three kinds of nodes with dissimilar residual energy for CH election. Fuzzy Logic technology is used to expand energy level of DSEP protocol by using fuzzy inference system. This paper presents protocol DSEP using Fuzzy Logic (DSEP-FL) CH by taking into account four linguistic variables such as energy, concentration, centrality and distance to base station. Simulation results show that our proposed method gives more effective results in term of a lifespan of network and stability as compared to the performance of other clustering protocols.

Keywords: DSEP, fuzzy logic, energy model, WSN

Procedia PDF Downloads 173
2866 Exploration of Professional Skepticism among Entry-level Auditors in China from Psychological and Cultural Perspectives

Authors: Sammy Xiaoyan Ying

Abstract:

Professional skepticism remains one of the most important and controversial topics in auditing. This study examines the influence of client cooperativeness and fraud risk on judgments of professional skepticism among Chinese entry-level auditors in the context of evaluation of client-provided audit evidence. Given that the essence of auditors’ PS rests on distrust of clients, this study invokes trust-related theories from psychological and cultural perspectives. Specifically, invoking psychology theories of trust concerning positive relationship between risk and distrust, this study hypothesizes that professional skepticism is likely to be positively associated with client fraud risk. The results support the hypothesis and show that lower (higher) levels of client fraud risk lead to lower (higher) levels of professional skepticism. Furthermore, drawing on analysis of relationship between cooperation and trust, with particular reference to guanxi dynamics in the Chinese culture, this study hypothesizes that professional skepticism is likely to be negatively associated with client cooperativeness. The results support the hypothesis and show that higher (lower) levels of client cooperativeness lead to lower (higher) levels of professional skepticism. The findings may assist audit firms and auditing educators in improving training and education programs and enhancing entry-level auditors’ abilities to maintain professional skepticism. Also, practitioners and regulators may benefit from increasing awareness of psychological factors in influencing professional skepticism.

Keywords: audit judgment, Chinese culture, entry-level auditor, professional skepticism

Procedia PDF Downloads 268
2865 Development of a Nurse Led Tranexamic Acid Administration Protocol for Trauma Patients in Rural South Africa

Authors: Christopher Wearmouth, Jacob Smith

Abstract:

Administration of tranexamic acid (TXA) reduces all-cause mortality in trauma patients when given within 3 hours of injury. Due to geographical distance and lack of emergency medical services patients often present late, following trauma, to our emergency department. Additionally, we found patients that may have benefited from TXA did not receive it, often due to lack of staff awareness, staff shortages out of hours and lack of equipment for delivering infusions. Our objective was to develop a protocol for nurse-led administration of TXA in the emergency department. We developed a protocol using physiological observations along with criteria from the South African Triage Scale to allow nursing staff to identify patients with, or at risk of, significant haemorrhage. We will monitor the use of the protocol to ensure appropriate compliance and for any adverse events reported.

Keywords: emergency department, emergency nursing, rural healthcare, tranexamic acid, trauma, triage

Procedia PDF Downloads 204
2864 Lecturers’ Need to Alter Their Identity in Remote Learning Environments: Case Study of Experiences from Uk and USA Universities

Authors: Richard Nelson

Abstract:

The knowledge, skills, and identity of the Higher Education professional are constantly challenged with a demanding environment of teaching, research, administration, and pastoral care. It is more important than ever for professors and lecturers to maintain their professional development in a constantly changing environment. The importance of professional development has become more focused as new skills are needed to meet the demands of remote teaching and learning during a pandemic. Uncertainty and performance pressures influence teachers to try to return to physical spaces or recreate lecture and seminar rooms despite more effective online spaces being available. This case study uses the Boys’ spatial triad as a framework for qualitative interviews to capture the Lecturers’ experiences in Universities in the UK and the USA of moving to online learning spaces. The study finds that without effective professional development and time to reflect critically on remote learning innovation in their teaching practices, lecturers attempt to defer to lecture theatres and seminar rooms, or similes of, as their preferred space for teaching and learning. Professional Development is needed to encourage teachers to reflect on their professional identity and relationship to the teaching space.

Keywords: professional identity, learning, online, remote

Procedia PDF Downloads 126