Search results for: store personality
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 891

Search results for: store personality

291 Relations among Coping with Stress, Anxiety and the Achievement Motive of Athletes and Non-Athletes

Authors: Dragana Tomic

Abstract:

This research deals with relations among strategies and styles of coping with stress, social interaction anxiety and the achievement motive of young athletes and non-athletes. The research was conducted on the sample of 402 examinees (197 female and 205 male participants) of the average age of 20.76, divided into three groups: athletes, recreationists, and non-athletes. The COPE-S questionnaire, the Social Interaction Anxiety Scale (SIAS) and the Achievement Motivation Questionnaire (MOP 2002) were used for conducting this research and they had satisfactory reliability. The results of the research indicate that athletes, recreationists and non-athletes are not different when it comes to strategies and styles of coping with stress. Non- athletes have more noticeable social interaction anxiety when compared to athletes (U=5281.5, p=.000) and also when compared to recreationists (U=7573, p=.000). There was a difference among these three groups in the achievement motive (χ2(2)=23,544, p=.000) and the three components of this motive (Competing with others, χ2(2)=31,718, p=.000, Perseverance, χ2(2)=9,415, p=.009 and Planning orientation, χ2(2)=8,171, p=.017). The research also indicates a significant difference in the relation between social interaction anxiety and the achievement motive of examinee subgroups, where the most significant difference is between athletes and non- athletes (q=-.45). Moreover, women more frequently use emotion-focused coping (U=16718, p=.003), while men more frequently use avoidance (U=14895.5, p=.000). Women have a lead when it comes to expressing social anxiety (U=17750.5, p=.036) and the achievement motive (U=17395.5, p=.020). The discussion of the results includes findings of similar previous research and theoretical concepts of the variables which were examined. Future research should be oriented towards examining the background of the differences which were (not) gained as well as towards the influence of personality dimensions on the variables which were examined in order to apply the results in practice in the best way.

Keywords: achievement motivation, athletes, coping with stress, non-athletes, recreationists, social interaction anxiety

Procedia PDF Downloads 140
290 Utilising an Online Data Collection Platform for the Development of a Community Engagement Database: A Case Study on Building Inter-Institutional Partnerships at UWC

Authors: P. Daniels, T. Adonis, P. September-Brown, R. Comalie

Abstract:

The community engagement unit at the University of the Western Cape was tasked with establishing a community engagement database. The database would store information of all community engagement projects related to the university. The wealth of knowledge obtained from the various disciplines would be used to facilitate interdisciplinary collaboration within the university, as well as facilitating community university partnership opportunities. The purpose of this qualitative study was to explore electronic data collection through the development of a database. Two types of electronic data collection platforms were used, namely online questionnaire and email. The semi structured questionnaire was used to collect data related to community engagement projects from different faculties and departments at the university. There are many benefits for using an electronic data collection platform, such as reduction of costs and time, ease in reaching large numbers of potential respondents, and the possibility of providing anonymity to participants. Despite all the advantages of using the electronic platform, there were as many challenges, as depicted in our findings. The findings suggest that certain barriers existed by using an electronic platform for data collection, even though it was in an academic environment, where knowledge and resources were in abundance. One of the challenges experienced in this process was the lack of dissemination of information via email to staff within faculties. The actual online software used for the questionnaire had its own limitations, such as only being able to access the questionnaire from the same electronic device. In a few cases, academics only completed the questionnaire after a telephonic prompt or face to face meeting about "Is higher education in South Africa ready to embrace electronic platform in data collection?"

Keywords: community engagement, database, data collection, electronic platform, electronic tools, knowledge sharing, university

Procedia PDF Downloads 237
289 Reversible Information Hitting in Encrypted JPEG Bitstream by LSB Based on Inherent Algorithm

Authors: Vaibhav Barve

Abstract:

Reversible information hiding has drawn a lot of interest as of late. Being reversible, we can restore unique computerized data totally. It is a plan where mystery data is put away in digital media like image, video, audio to maintain a strategic distance from unapproved access and security reason. By and large JPEG bit stream is utilized to store this key data, first JPEG bit stream is encrypted into all around sorted out structure and then this secret information or key data is implanted into this encrypted region by marginally changing the JPEG bit stream. Valuable pixels suitable for information implanting are computed and as indicated by this key subtle elements are implanted. In our proposed framework we are utilizing RC4 algorithm for encrypting JPEG bit stream. Encryption key is acknowledged by framework user which, likewise, will be used at the time of decryption. We are executing enhanced least significant bit supplanting steganography by utilizing genetic algorithm. At first, the quantity of bits that must be installed in a guaranteed coefficient is versatile. By utilizing proper parameters, we can get high capacity while ensuring high security. We are utilizing logistic map for shuffling of bits and utilization GA (Genetic Algorithm) to find right parameters for the logistic map. Information embedding key is utilized at the time of information embedding. By utilizing precise picture encryption and information embedding key, the beneficiary can, without much of a stretch, concentrate the incorporated secure data and totally recoup the first picture and also the original secret information. At the point when the embedding key is truant, the first picture can be recouped pretty nearly with sufficient quality without getting the embedding key of interest.

Keywords: data embedding, decryption, encryption, reversible data hiding, steganography

Procedia PDF Downloads 267
288 Color-Based Emotion Regulation Model: An Affective E-Learning Environment

Authors: Sabahat Nadeem, Farman Ali Khan

Abstract:

Emotions are considered as a vital factor affecting the process of information handling, level of attention, memory capacity and decision making. Latest e-Learning systems are therefore taking into consideration the effective state of learners to make the learning process more effective and enjoyable. One such use of user’s affective information is in the systems that tend to regulate users’ emotions to a state optimally desirable for learning. So for, this objective has been tried to be achieved with the help of teaching strategies, background music, guided imagery, video clips and odors. Nevertheless, we know that colors can affect human emotions. Relationship between color and emotions has a strong influence on how we perceive our environment. Similarly, the colors of the interface can also affect the user positively as well as negatively. This affective behavior of color and its use as emotion regulation agent is not yet exploited. Therefore, this research proposes a Color-based Emotion Regulation Model (CERM), a new framework that can automatically adapt its colors according to user’s emotional state and her personality type and can help in producing a desirable emotional effect, aiming at providing an unobtrusive emotional support to the users of e-learning environment. The evaluation of CERM is carried out by comparing it with classical non-adaptive, static colored learning management system. Results indicate that colors of the interface, when carefully selected has significant positive impact on learner’s emotions.

Keywords: effective learning, e-learning, emotion regulation, emotional design

Procedia PDF Downloads 283
287 Assessment-Assisted and Relationship-Based Financial Advising: Using an Empirical Assessment to Understand Personal Investor Risk Tolerance in Professional Advising Relationships

Authors: Jerry Szatko, Edan L. Jorgensen, Stacia Jorgensen

Abstract:

A crucial component to the success of any financial advising relationship is for the financial professional to understand the perceptions, preferences and thought-processes carried by the financial clients they serve. Armed with this information, financial professionals are more quickly able to understand how they can tailor their approach to best match the individual preferences and needs of each personal investor. Our research explores the use of a quantitative assessment tool in the financial services industry to assist in the identification of the personal investor’s consumer behaviors, especially in terms of financial risk tolerance, as it relates to their financial decision making. Through this process, the Unitifi Consumer Insight Tool (UCIT) was created and refined to capture and categorize personal investor financial behavioral categories and the financial personality tendencies of individuals prior to the initiation of a financial advisement relationship. This paper discusses the use of this tool to place individuals in one of four behavior-based financial risk tolerance categories. Our discoveries and research were aided through administration of a web-based survey to a group of over 1,000 individuals. Our findings indicate that it is possible to use a quantitative assessment tool to assist in predicting the behavioral tendencies of personal consumers when faced with consumer financial risk and decisions.

Keywords: behavior-based advising, financial relationship building, risk capacity based on behavior, risk tolerance, systematic way to assist in financial relationship building

Procedia PDF Downloads 145
286 Alpha: A Groundbreaking Avatar Merging User Dialogue with OpenAI's GPT-3.5 for Enhanced Reflective Thinking

Authors: Jonas Colin

Abstract:

Standing at the vanguard of AI development, Alpha represents an unprecedented synthesis of logical rigor and human abstraction, meticulously crafted to mirror the user's unique persona and personality, a feat previously unattainable in AI development. Alpha, an avant-garde artefact in the realm of artificial intelligence, epitomizes a paradigmatic shift in personalized digital interaction, amalgamating user-specific dialogic patterns with the sophisticated algorithmic prowess of OpenAI's GPT-3.5 to engender a platform for enhanced metacognitive engagement and individualized user experience. Underpinned by a sophisticated algorithmic framework, Alpha integrates vast datasets through a complex interplay of neural network models and symbolic AI, facilitating a dynamic, adaptive learning process. This integration enables the system to construct a detailed user profile, encompassing linguistic preferences, emotional tendencies, and cognitive styles, tailoring interactions to align with individual characteristics and conversational contexts. Furthermore, Alpha incorporates advanced metacognitive elements, enabling real-time reflection and adaptation in communication strategies. This self-reflective capability ensures continuous refinement of its interaction model, positioning Alpha not just as a technological marvel but as a harbinger of a new era in human-computer interaction, where machines engage with us on a deeply personal and cognitive level, transforming our interaction with the digital world.

Keywords: chatbot, GPT 3.5, metacognition, symbiose

Procedia PDF Downloads 33
285 Achieving Conviviality in Terms of Collective Experience through Creative Public Spaces in Namik Kemal Square, Famagusta, North Cyprus

Authors: Shirin Shaideh, Nina Shirkhanloo

Abstract:

Creative public spaces were needed to foster conviviality in an urban form. The conviviality could be enhanced by facilitating variety of opportunities to participate in communal activities and promoting collective experiences. In this regard, The Namik Kemal Square as a major public space of Walled City of Famagusta in North Cyprus was found as the creative public space because it supports collective practices by leisure activities which enclosed the space. The square also utilized creative collaboration such as festivals and outdoor exhibition. Accordingly this paper focuses on the issue of conviviality in urban public space, in the perspective of square, as a major indicator of their success. The survey firstly provides a theoretical framework for understanding conviviality in creative public space to empower collective experience. Secondly it discusses the essential components of conviviality in form of square and finally investigating conviviality and also its determinants in Namik Kemal square. Hence, the main challenges of this study are going to focus on how convivial public spaces impact collective experience, what people expect from a kind of public space, or what they perceive as a good place to be in. Since it seems essential to respond positively, inclusively to the needs of people to socialize in public spaces by involving them in collective and common practices, this article aims to tease out what gives some places personality and conviviality so that we can learn to design, maintain and manage better quality built environment in future.

Keywords: conviviality, creative public space, collective experience, Namik Kemal square

Procedia PDF Downloads 401
284 Development of a Web-Based Application for Intelligent Fertilizer Management in Rice Cultivation

Authors: Hao-Wei Fu, Chung-Feng Kao

Abstract:

In the era of rapid technological advancement, information technology (IT) has become integral to modern life, exerting significant influence across diverse sectors and serving as a catalyst for development in various industries. Within agriculture, the integration of IT offers substantial benefits, notably enhancing operational efficiency. Real-time monitoring systems, for instance, have been widely embraced in agriculture, effectively improving crop management practices. This study specifically addresses the management of rice panicle fertilizer, presenting the development of a web application tailored to handle data associated with rice panicle fertilizer management. Leveraging the normalized difference red edge index, this application optimizes the quantity of rice panicle fertilizer used, providing recommendations to agricultural stakeholders and service providers in the agricultural information sector. The overarching objective is to minimize costs while maximizing yields. Furthermore, a robust database system has been established to store and manage relevant data for future reference in rice cultivation management. Additionally, the study utilizes the Representational State Transfer software architectural style to construct an application programming interface (API), facilitating data creation, retrieval, updating, and deletion for users via the HyperText Transfer Protocol methods. Future plans involve integrating this API with third-party services to incorporate it into larger frameworks, thus catering to the diverse requirements of various third-party services.

Keywords: application programming interface, HyperText Transfer Protocol, nitrogen fertilizer intelligent management, web-based application

Procedia PDF Downloads 32
283 Critical Thinking Index of College Students

Authors: Helen Frialde-Dupale

Abstract:

Critical thinking Index (CTI) of 150 third year college students from five State Colleges and Universities (SUCs) in Region I were determined. Only students with Grade Point Average (GPA) of at least 2.0 from four general classification of degree courses, namely: Education, Arts and Sciences, Engineering and Agriculture were included. Specific problem No.1 dealt with the profile variables, namely: age, sex, degree course, monthly family income, number of siblings, high school graduated from, grade point average, personality type, highest educational attainment of parents, and occupation of parents. Problem No. 2 determined the critical thinking index among the respondents. Problem No. 3 investigated whether or not there are significant differences in the critical thinking index among the respondents across the profile variables. While problem No.4 determined whether or not there are significant relationship between the critical thinking index and selected profile variables, namely: age, monthly family income, number of siblings, and grade point average of the respondents. Finally, on problem No. 5, the critical thinking instrument which obtained the lowest rates, were used as basis for outlining an intervention program for enhancing critical thinking index (CTI) of students. The following null hypotheses were tested at 0.05 level of significance: there are no significant differences in the critical thinking index of the third college students across the profile variables; there are no significant relationships between the critical thinking index of the respondents and selected variables, namely: age, monthly family income, number of siblings, and grade point average.

Keywords: attitude as critical thinker, critical thinking applied, critical thinking index, self-perception as critical thinker

Procedia PDF Downloads 492
282 Sexual Cognitive Behavioral Therapy: Psychological Performance and Openness to Experience

Authors: Alireza Monzavi Chaleshtari, Mahnaz Aliakbari Dehkordi, Amin Asadi Hieh, Majid Kazemnezhad

Abstract:

This research was conducted with the aim of determining the effectiveness of sexual cognitive behavioral therapy on psychological performance and openness to experience in women. The type of research was experimental in the form of pre-test-post-test. The statistical population of this research was made up of all working and married women with membership in the researcher's Instagram social network who had problems in marital-sexual relationships (N=900). From the statistical community, which includes working and married women who are members of the researcher's Instagram social network who have problems in marital-sexual relationships, there are 30 people including two groups (15 people in the experimental group and 15 people in the control group) as available sampling and selected randomly. They were placed in two experimental and control groups. The anxiety, stress, and depression scale (DASS) and the Costa and McCree personality questionnaire were used to collect data, and the cognitive behavioral therapy protocol of Dr. Mehrnaz Ali Akbari was used for the treatment sessions. To analyze the data, the covariance test was used in the SPSS22 software environment. The results showed that sexual cognitive behavioral therapy has a positive and significant effect on psychological performance and openness to experience in women. Conclusion: It can be concluded that interventions such as cognitive-behavioral sex can be used to treat marital problems.

Keywords: sexual cognitive behavioral therapy, psychological function, openness to experience, women

Procedia PDF Downloads 49
281 Biodiesel Fuel Properties of Mixed Culture Microalgae under Different CO₂ Concentration from Coal Fired Flue Gas

Authors: Ambreen Aslam, Tahira Aziz Mughal, Skye R. Thomas-Hall, Peer M. Schenk

Abstract:

Biodiesel is an alternative to petroleum-derived fuel mainly composed of fatty acid from oleaginous microalgae feedstock. Microalgae produced fatty acid methyl esters (FAMEs) as they can store high levels of lipids without competing for food productivity. After lipid extraction and esterification, fatty acid profile from algae feedstock possessed the abundance of fatty acids with carbon chain length specifically C16 and C18. The qualitative analysis of FAME was done by cultivating mix microalgae consortia under three different CO₂ concentrations (1%, 3%, and 5.5%) from a coal fired flue gas. FAME content (280.3 µg/mL) and productivity (18.69 µg/mL/D) was higher under 1% CO₂ (flue gas) as compare to other treatments. Whereas, Mixed C. (F) supplemented with 5.5% CO₂ (50% flue gas) had higher SFA (36.28%) and UFA (63.72%) which improve the oxidative stability of biodiesel. Subsequently, low Iodine value (136.3 gI₂/100g) and higher Cetane number (52) of Mixed C.+P (F) were found to be in accordance with European (EN 14214) standard under 5.5% CO₂ along with 50mM phosphate buffer. Experimental results revealed that sufficient phosphate reduced FAME productivity but significantly enhance biodiesel quality. This research aimed to develop an integrated approach of utilizing flue gas (as CO₂ source) for significant improvement in biodiesel quality under surplus phosphorus. CO₂ sequestration from industrial flue gas not only reduce greenhouse gases (GHG) emissions but also ensure sustainability and eco-friendliness of the biodiesel production process through microalgae.

Keywords: biodiesel analysis, carbon dioxide, coal fired flue gas, FAME productivity, fatty acid profile, fuel properties, lipid content, mixed culture microalgae

Procedia PDF Downloads 300
280 Feasibility Study of MongoDB and Radio Frequency Identification Technology in Asset Tracking System

Authors: Mohd Noah A. Rahman, Afzaal H. Seyal, Sharul T. Tajuddin, Hartiny Md Azmi

Abstract:

Taking into consideration the real time situation specifically the higher academic institutions, small, medium to large companies, public to private sectors and the remaining sectors, do experience the inventory or asset shrinkages due to theft, loss or even inventory tracking errors. This happening is due to a zero or poor security systems and measures being taken and implemented in their organizations. Henceforth, implementing the Radio Frequency Identification (RFID) technology into any manual or existing web-based system or web application can simply deter and will eventually solve certain major issues to serve better data retrieval and data access. Having said, this manual or existing system can be enhanced into a mobile-based system or application. In addition to that, the availability of internet connections can aid better services of the system. Such involvement of various technologies resulting various privileges to individuals or organizations in terms of accessibility, availability, mobility, efficiency, effectiveness, real-time information and also security. This paper will look deeper into the integration of mobile devices with RFID technologies with the purpose of asset tracking and control. Next, it is to be followed by the development and utilization of MongoDB as the main database to store data and its association with RFID technology. Finally, the development of a web based system which can be viewed in a mobile based formation with the aid of Hypertext Preprocessor (PHP), MongoDB, Hyper-Text Markup Language 5 (HTML5), Android, JavaScript and AJAX programming language.

Keywords: RFID, asset tracking system, MongoDB, NoSQL

Procedia PDF Downloads 279
279 Developmental Differences of Elementary School Children in Knowledge Acquisition Following a Sexual Abuse Prevention Program

Authors: Chrysanthi Nega, Fotini-Sonia Apergi

Abstract:

Child sexual abuse (CSA) in Greece is a highly prevalent phenomenon and yet remains largely underreported. CSA can negatively impact cognitive, emotional and psychosocial development, as well as personality formation and capacity for initiation and maintenance of healthy interpersonal relationships. It is particularly important for school-based prevention programs to be implemented early in elementary school, as they are reportedly effective in lowering abuse incidences and providing knowledge for coping in threatening environments. The purpose of the current study was to test the effectiveness of a school-based CSA prevention program (Safe-Touches) on Greek elementary school students (grades 1-3, N=272) and explore the effect of age and time of testing (academic term). There was a significant effect of age in the knowledge of Inappropriate Touch, when comparing pre and post-intervention assessments, with third graders showing greatest gains in knowledge, followed by second and first graders. Time of testing during the academic year also had a significant effect, as first graders tested later in the school year, scored higher on knowledge of Inappropriate Touch. The findings of the current study provide insight into the optimal timing to implement CSA prevention programs. Exposure to such programs and incorporation in the school curricula could largely benefit children of the Greek community in terms of safety and awareness.

Keywords: child sexual abuse, Safe-Touches, school-based prevention, schooling

Procedia PDF Downloads 298
278 Mobile Number Portability

Authors: R. Geetha, J. Arunkumar, P. Gopal, D. Loganathan, K. Pavithra, C. Vikashini

Abstract:

Mobile Number Portability is an attempt to switch over from one network to another network facility for mobile based on applications. This facility is currently not available for mobile handsets. This application is intended to assist the mobile network and its service customers in understanding the criteria; this will serve as a universal set of requirements which must be met by the customers. This application helps the user's network portability. Accessing permission from the network provider to enable services to the user and utilizing the available network signals. It is enabling the user to make a temporary switch over to other network. The main aim of this research work is to adapt multiple networks at the time of no network coverage. It can be accessed at rural and geographical areas. This can be achieved by this mobile application. The application is capable of temporary switch over between various networks. With this application both the service provider and the network user are benefited. The service provider is benefited by charging a minimum cost for utilizing other network. It provides security in terms of password that is unique to avoid unauthorized users and to prevent loss of balance. The goal intended to be attained is a complete utilization of available network at significant situations and to provide feature that satisfy the customer needs. The temporary switch over is done to manage emergency calls when user is in rural or geographical area, where there will be a very low network coverage. Since people find it trend in using Android mobile, this application is designed as an Android applications, which can be freely downloaded and installed from Play store. In the current scenario, the service provider enables the user to change their network without shifting their mobile network. This application affords a clarification for users while they are jammed in a critical situation. This application is designed by using Android 4.2 and SQLite Version3.

Keywords: mobile number, random number, alarm, imei number, call

Procedia PDF Downloads 329
277 Exploring Data Stewardship in Fog Networking Using Blockchain Algorithm

Authors: Ruvaitha Banu, Amaladhithyan Krishnamoorthy

Abstract:

IoT networks today solve various consumer problems, from home automation systems to aiding in driving autonomous vehicles with the exploration of multiple devices. For example, in an autonomous vehicle environment, multiple sensors are available on roads to monitor weather and road conditions and interact with each other to aid the vehicle in reaching its destination safely and timely. IoT systems are predominantly dependent on the cloud environment for data storage, and computing needs that result in latency problems. With the advent of Fog networks, some of this storage and computing is pushed to the edge/fog nodes, saving the network bandwidth and reducing the latency proportionally. Managing the data stored in these fog nodes becomes crucial as it might also store sensitive information required for a certain application. Data management in fog nodes is strenuous because Fog networks are dynamic in terms of their availability and hardware capability. It becomes more challenging when the nodes in the network also live a short span, detaching and joining frequently. When an end-user or Fog Node wants to access, read, or write data stored in another Fog Node, then a new protocol becomes necessary to access/manage the data stored in the fog devices as a conventional static way of managing the data doesn’t work in Fog Networks. The proposed solution discusses a protocol that acts by defining sensitivity levels for the data being written and read. Additionally, a distinct data distribution and replication model among the Fog nodes is established to decentralize the access mechanism. In this paper, the proposed model implements stewardship towards the data stored in the Fog node using the application of Reinforcement Learning so that access to the data is determined dynamically based on the requests.

Keywords: IoT, fog networks, data stewardship, dynamic access policy

Procedia PDF Downloads 31
276 Geophysical Approach in the Geological Characterization of a Dam Site: Case of the Chebabta-Dam, Meskiana, Oum El-Bouaghi

Authors: Benhammadi Hocine, Djamel Boubaya, Chaffai Hicham

Abstract:

Meskiana Area is characterized by a semi-arid climate where the water supply for irrigation and industry is not sufficient as the priority goes for domestic use. To meet the increasing population growth and development, the authorities have considered building a new water retaining structure on some major temporary water streams. For this purpose Chebabta site on Oued Meskiana was chosen as the future dam site. It is large enough to store the desired volume of water. This study comes to investigate the conditions of the site and the adequacy of the ground as a foundation for the projected dam. The conditions of the site include the geological structure and mainly the presence of discontinuities in the formation on which the dam will be built, the nature of the lithologies under the foundation and the future lake, and the presence of any hazard. This site characterization is usually carried out using different methods in order to highlight any underground buried problematic structure. In this context, the different geophysical technics remain the most used ones. Three geophysical methods were used in the case of the Chebabta dam site, namely, electric survey, seismic refraction, and tomography. The choice of the technics and the location of the scan line was made on the basis of the available geological data. In this sense, profiles have been established on both banks of Oued Meskiana. The obtained results have allowed a better characterization of the geological structure, defining the limit between the surface cover and the bedrock, which is, in other words, the limit between the weathered zone and the bedrock. Their respective thicknesses were also determined by seismic refraction and electrical resistivity sounding. However, the tomography imaging technic has succeeded in positioning a fault structure passing through the right bank of the wadi.

Keywords: dam site, fault, geophysic, investigation, Meskiana

Procedia PDF Downloads 59
275 Tolerance of Ambiguity in Relation to Listening Performance across Learners of Various Linguistic Backgrounds

Authors: Amin Kaveh Boukani

Abstract:

Foreign language learning is not straightforward and can be affected by numerous factors, among which personality features like tolerance of ambiguity (TA) are so well-known and important. Such characteristics yet can be affected by other factors like learning additional languages. The current investigation, thus, opted to explore the possible effect of linguistic background (being bilingual or trilingual) on the tolerance of ambiguity (TA) of Iranian EFL learners. Furthermore, the possible mediating effect of TA on multilingual learners' language performance (listening comprehension in this study) was expounded. This research involved 68 EFL learners (32 bilinguals, 29 trilinguals) with the age range of 19-29 doing their degrees in the Department of English Language and Literature of Urmia University. A set of questionnaires, including tolerance of ambiguity (Herman et. al., 2010) and linguistic background information (Modirkhameneh, 2005), as well as the IELTS listening comprehension test, were used for data collection purposes. The results of a set of independent samples t-test and mediation analysis (Hayes, 2022) showed that (1) linguistic background (being bilingual or trilingual) had a significant direct effect on EFL learners' TA, (2) Linguistic background had a significant direct influence on listening comprehension, (3) TA had a substantial direct influence on listening comprehension, and (4) TA moderated the influence of linguistic background on listening comprehension considerably. These results suggest that multilingualism may be considered as an advantageous asset for EFL learners and should be a prioritized characteristic in EFL instruction in multilingual contexts. Further pedagogical implications and suggestions for research are proposed in light of effective EFL instruction in multilingual contexts.

Keywords: tolerance of ambiguity, listening comprehension, multilingualism, bilingual, trilingual

Procedia PDF Downloads 34
274 Design and Integration of a Renewable Energy Based Polygeneration System with Desalination for an Industrial Plant

Authors: Lucero Luciano, Cesar Celis, Jose Ramos

Abstract:

Polygeneration improves energy efficiency and reduce both energy consumption and pollutant emissions compared to conventional generation technologies. A polygeneration system is a variation of a cogeneration one, in which more than two outputs, i.e., heat, power, cooling, water, energy or fuels, are accounted for. In particular, polygeneration systems integrating solar energy and water desalination represent promising technologies for energy production and water supply. They are therefore interesting options for coastal regions with a high solar potential, such as those located in southern Peru and northern Chile. Notice that most of the Peruvian and Chilean mining industry operations intensive in electricity and water consumption are located in these particular regions. Accordingly, this work focus on the design and integration of a polygeneration system producing industrial heating, cooling, electrical power and water for an industrial plant. The design procedure followed in this work involves integer linear programming modeling (MILP), operational planning and dynamic operating conditions. The technical and economic feasibility of integrating renewable energy technologies (photovoltaic and solar thermal, PV+CPS), thermal energy store, power and thermal exchange, absorption chillers, cogeneration heat engines and desalination technologies is particularly assessed. The polygeneration system integration carried out seek to minimize the system total annual cost subject to CO2 emissions restrictions. Particular economic aspects accounted for include investment, maintenance and operating costs.

Keywords: desalination, design and integration, polygeneration systems, renewable energy

Procedia PDF Downloads 99
273 A Study and Design Scarf Collection Applied Vietnamese Traditional Patterns by Using Printing Method on Fabric

Authors: Mai Anh Pham Ho

Abstract:

Scarf products today is a symbol of fashion to decorate, to make our life more beautiful and bring new features to our living space. It also shows the cultural identity by using the traditional patterns that make easily to introduce the image of Vietnam to other nations all over the world. Therefore, the purpose of this research is to classify Vietnamese traditional patterns according to the era and dynasties. Vietnamese traditional patterns through the dynasties of Vietnamese history are done and classified by five groups of patterns including the geometric patterns, the natural patterns, the animal patterns, the floral patterns, and the character patterns in the Prehistoric times, the Bronze and Iron age, the Chinese domination, the Ngo-Dinh-TienLe-Ly-Tran-Ho dynasty, and the LeSo-Mac-LeTrinh-TaySon-Nguyen dynasty. Besides, there are some special kinds of Vietnamese traditional patterns like buffalo, lotus, bronze-drum, Phuc Loc Tho character, and so on. Extensive research was conducted for modernizing scarf collection applied Vietnamese traditional patterns which the fashion trend is used on creating works. The concept, target, image map, lifestyle map, motif, colours, arrangement and completion of patterns on scarf were set up. The scarf collection is designed and developed by the Adobe Illustrator program with three colour ways for each scarf. Upon completion of the research, digital printing technology is chosen for using on scarf collection which Vietnamese traditional patterns were researched deeply and widely with the purpose of establishment the basic background for Vietnamese culture in order to identify Vietnamese national personality as well as establish and preserve the cultural heritage.

Keywords: scarf collection, Vietnamese traditional patterns, printing methods, fabric design

Procedia PDF Downloads 317
272 Anti-Forensic Countermeasure: An Examination and Analysis Extended Procedure for Information Hiding of Android SMS Encryption Applications

Authors: Ariq Bani Hardi

Abstract:

Empowerment of smartphone technology is growing very rapidly in various fields of science. One of the mobile operating systems that dominate the smartphone market today is Android by Google. Unfortunately, the expansion of mobile technology is misused by criminals to hide the information that they store or exchange with each other. It makes law enforcement more difficult to prove crimes committed in the judicial process (anti-forensic). One of technique that used to hide the information is encryption, such as the usages of SMS encryption applications. A Mobile Forensic Examiner or an investigator should prepare a countermeasure technique if he finds such things during the investigation process. This paper will discuss an extension procedure if the investigator found unreadable SMS in android evidence because of encryption. To define the extended procedure, we create and analyzing a dataset of android SMS encryption application. The dataset was grouped by application characteristics related to communication permissions, as well as the availability of source code and the documentation of encryption scheme. Permissions indicate the possibility of how applications exchange the data and keys. Availability of the source code and the encryption scheme documentation can show what the cryptographic algorithm specification is used, how long the key length, how the process of key generation, key exchanges, encryption/decryption is done, and other related information. The output of this paper is an extended or alternative procedure for examination and analysis process of android digital forensic. It can be used to help the investigators while they got a confused cause of SMS encryption during examining and analyzing. What steps should the investigator take, so they still have a chance to discover the encrypted SMS in android evidence?

Keywords: anti-forensic countermeasure, SMS encryption android, examination and analysis, digital forensic

Procedia PDF Downloads 112
271 Environmental Degradation and Globalization with Special Reference to Developing Economics

Authors: Indira Sinha

Abstract:

According to the Oxford Advanced Learner's English Dictionary of Current English, environment is the complex of physical, chemical and biotic factors that act upon an organism or an ecological community and ultimately determines its form and survival. It is defined as conditions and circumstances which are affecting people's lives. The meaning of environmental degradation is the degradation of the environment through depletion of resources such as air, water and soil and the destruction of ecosystems and extinction of wildlife. Globalization is a significant feature of recent world history. The aim of this phenomenon is to integrate societies, economies and cultures through a common link of trading policies, technology and communication. Undoubtedly it has opened up the world economy at a very high speed but at the same time it has an adverse impact on the environment. The purpose of the present study is to investigate the impact of globalization on the environmental conditions. An overview of what the forces of globalization have in store for the environment with constructing large number of industries and destroying large forests lands will be given in this paper. The forces of globalization have created many serious environmental problems like high temperature, extinction of many species of plant and animal and outlet of poisonous chemicals from industries. The revelation of this study is that in case of developing economics these problems are more critical. In developing countries like India many factories are built with less environmental regulations, while developed economies maintain positive environmental practices. The present study is a micro level study which aims to employ a combination of theoretical, descriptive, empirical and analytical approach in addition to the time tested case method.

Keywords: globalization, trade policies, environmental degradation, developing economies, large industries

Procedia PDF Downloads 214
270 Development of a CFD Model for PCM Based Energy Storage in a Vertical Triplex Tube Heat Exchanger

Authors: Pratibha Biswal, Suyash Morchhale, Anshuman Singh Yadav, Shubham Sanjay Chobe

Abstract:

Energy demands are increasing whereas energy sources, especially non-renewable sources are limited. Due to the intermittent nature of renewable energy sources, it has become the need of the hour to find new ways to store energy. Out of various energy storage methods, latent heat thermal storage devices are becoming popular due to their high energy density per unit mass and volume at nearly constant temperature. This work presents a computational fluid dynamics (CFD) model using ANSYS FLUENT 19.0 for energy storage characteristics of a phase change material (PCM) filled in a vertical triplex tube thermal energy storage system. A vertical triplex tube heat exchanger, just like its name consists of three concentric tubes (pipe sections) for parting the device into three fluid domains. The PCM is filled in the middle domain with heat transfer fluids flowing in the outer and innermost domains. To enhance the heat transfer inside the PCM, eight fins have been incorporated between the internal and external tubes. These fins run radially outwards from the outer-wall of innermost tube to the inner-wall of the middle tube dividing the middle domain (between innermost and middle tube) into eight sections. These eight sections are then filled with a PCM. The validation is carried with earlier work and a grid independence test is also presented. Further studies on freezing and melting process were carried out. The results are presented in terms of pictorial representation of isotherms and liquid fraction

Keywords: heat exchanger, thermal energy storage, phase change material, CFD, latent heat

Procedia PDF Downloads 128
269 A Neuropsychological Investigation of the Relationship between Anxiety Levels and Loss of Inhibitory Cognitive Control in Ageing and Dementia

Authors: Nasreen Basoudan, Andrea Tales, Frederic Boy

Abstract:

Non-clinical anxiety may be comprised of state anxiety - temporarily experienced anxiety related to a specific situation, and trait anxiety - a longer lasting response or a general disposition to anxiety. While temporary and occasional anxiety whether as a mood state or personality dimension is normal, nonclinical anxiety may influence many more components of information processing than previously recognized. In ageing and dementia-related research, disease characterization now involves attempts to understand a much wider range of brain function such as loss of inhibitory control, as against the more common focus on memory and cognition. However, in many studies, the tendency has been to include individuals with clinical anxiety disorders while excluding persons with lower levels of state or trait anxiety. Loss of inhibitory cognitive control can lead to behaviors such as aggression, reduced sensitivity to others, sociopathic thoughts and actions. Anxiety has also been linked to inhibitory control, with research suggesting that people with anxiety are less capable of inhibiting their emotions than the average person. This study investigates the relationship between anxiety and loss of inhibitory control in younger and older adults, using a variety of questionnaires and computers-based tests. Based on the premise that irrespective of classification, anxiety is associated with a wide range of physical, affective, and cognitive responses, this study explores evidence indicative of the potential influence anxiety per se on loss of inhibitory control, in order to contribute to discussion and appropriate consideration of anxiety-related factors in methodological practice.

Keywords: anxiety, ageing, dementia, inhibitory control

Procedia PDF Downloads 218
268 Saadi: The Matter of Reality and Imagination

Authors: Mozhde Shafie, Nahid Naderi, Mandana Mangeli

Abstract:

Is it true to say that Saadi was an idealized embodiment of his moral teachings in Gulistan and Boustan? The body of criticism on Saadi’s works suggests that his biography provides no clear and valid information to judge about the extent to which Saadi acted what he preached. His moral teachings depict a sort of individual and social morality which is defined in relation to power and falls in the category of political ethics. Political ethics appear as for the noble and the subordinate in Gulistan and Boustan. Ethics for the noble include all his teachings for governors and rulers in eulogies. On the other hand, ethics for the subordinate include all his suggestions for the public in relation to power position. Here, Saadi puts forward some conservative recommendations that trigger some contemporary critical commentaries. However, there are some cases where he takes up a third person narrative position to narrate the story of a king and a mendicant. In these stories, the mendicant is a witty man with bitter criticism on society, implying that one should relinquish earthly pleasures and advantages if he wants his criticism to be acceptable. First person narratives fall in two categories determinate and indeterminate narratives. Indirect speeches reflecting biographical facts are indeterminate narratives which give no information about the poet’s personality. Other narratives are more of an autobiography that report probable observations. These latter narratives demonstrate Saadi as a man quick at repartee that feels free to disclose his poverty and some cases of impiety. Therefore, they provide no idealized picture of the poet in terms of ethical principles.

Keywords: Saadi, ethics, Boustan, Gulistan, first-person narrative

Procedia PDF Downloads 380
267 An Introduction to the Current Epistemology of Ethical Philosophy of Islamic Banking

Authors: Mohd Iqbal Malik

Abstract:

Ethical philosophy of Quran pinnacled virtue and economics as the part and parcel of human life. Human beings are to be imagined by the sign of morals. Soul and morality are both among the essences of human personality. Islam lays the foundation of ethics by installation of making a momentous variance between virtue and vice. It suggests for the distribution of wealth in-order to terminate accumulation of economic resources. Quran claims for the ambiguous pavement to attain virtue by saying, ‘Never will you attain the good (reward) until you spend (in the way of Allah) from that which you love. And whatever you spend indeed, Allah knows of it.’ The essence of Quran is to eliminate all the deep-seated approaches through which the wealth of nations is being accumulated within few hands. The paper will study the Quranic Philosophy Of Islamic Economic System. In recent times, to get out of the human resource development mystery of Muslims, Ismail Al-Raji Faruqi led the way in the so-called ‘Islamization’ of knowledge. Rahman and Faruqi formed opposite opinions on this project. Al-Faruqi thought of the Islamization of knowledge in terms of introducing Western learning into received Islamic values and vice versa. This proved to be a mere peripheral treatment of Islamic values in relation to Western knowledge. It is true that out of the programme of Islamization of knowledge arose Islamic universities in many Muslim countries. Yet the academic programmes of these universities were not founded upon a substantive understanding and application of the tawhidi epistemology.

Keywords: ethical philosophy, modern Islamic finance, knowledge of finance, Islamic banking

Procedia PDF Downloads 280
266 Application of Exhaust Gas-Air Brake System in Petrol and Diesel Engine

Authors: Gurlal Singh, Rupinder Singh

Abstract:

The possible role of the engine brake is to convert a power-producing engine into a power-absorbing retarding mechanism. In this braking system, exhaust gas (EG) from the internal combustion (IC) engines is used to operate air brake in the automobiles. Airbrake is most used braking system in vehicles. In the proposed model, instead of air brake, EG is used to operate the brake lever and stored in a specially designed tank. This pressure of EG is used to operate the pneumatic cylinder and brake lever. Filters used to remove the impurities from the EG, then it is allowed to store in the tank. Pressure relief valve is used to achieve a specific pressure in the tank and helps to avoid further damage to the tank as well as in an engine. The petrol engine is used in the proposed EG braking system. The petrol engine is chosen initially because it produces less impurity in the exhaust than diesel engines. Moreover, exhaust brake system (EBS) for the Diesel engines is composed of gate valve, pneumatic cylinder and exhaust brake valve with the on-off solenoid. Exhaust brake valve which is core component of EBS should have characteristics such as high reliability and long life. In a diesel engine, there is butterfly valve in exhaust manifold connected with solenoid switch which is used to on and off the butterfly valve. When butterfly valve closed partially, then the pressure starts built up inside the exhaust manifold and cylinder that actually resist the movement of piston leads to crankshaft getting stops resulting stopping of the flywheel. It creates breaking effect in a diesel engine. The exhaust brake is a supplementary breaking system to the service brake. It is noted that exhaust brake increased 2-3 fold the life of service brake may be due to the creation of negative torque which retards the speed of the engine. More study may also be warranted for the best suitable design of exhaust brake in a diesel engine.

Keywords: exhaust gas, automobiles, solenoid, airbrake

Procedia PDF Downloads 230
265 Academic Achievement Differences in Grandiose and Vulnerable Narcissists and the Mediating Effects of Self-Esteem and Self-Efficacy

Authors: Amber Dummett, Efstathia Tzemou

Abstract:

Narcissism is a personality trait characterized by selfishness, entitlement, and superiority. Narcissism is split into two subtypes, grandiose narcissism (GN) and vulnerable narcissism (VN). Grandiose narcissists are extraverted and arrogant, while vulnerable narcissists are introverted and insecure. This study investigates the psychological mechanisms that lead to differences in academic achievement (AA) between grandiose and vulnerable narcissists, specifically the mediating effects of self-esteem and self-efficacy. While narcissism is considered to be a negative trait, one of the Dark Triads, GN, has been found to have some benefits; therefore, this study considers if better AA is one of them. Moreover, further research into VN is essential to fully compare and contrast it with GN. We hypothesize that grandiose narcissists achieve higher marks due to having high self-esteem and self-efficacy. In comparison, we hypothesize that vulnerable narcissists underperform and achieve lower marks due to having low self-esteem and self-efficacy. Two online surveys were distributed to undergraduate university students. The first was a collection of scales measuring the mentioned dimensions and semester one AA, and the second investigated end of year AA. Sequential mediation analyses were conducted using the gathered data. Our analysis shows that neither self-esteem nor self-efficacy mediates the relationship between GN and AA. GN positively predicts self-esteem but has no relationship with self-efficacy. Self-esteem does not mediate the relationship between VN and AA. VN has a negative indirect effect on AA via self-efficacy, and VN negatively predicts self-esteem. Self-efficacy positively predicts AA. GN does not affect AA through the mediation of self-esteem and then self-efficacy, and neither does VN in this way. Overall, having grandiose or vulnerable narcissistic traits does not affect students’ AA. However, being highly efficacious does lead to academic success; therefore, universities should employ methods to improve the self-efficacy of their students.

Keywords: academic achievement, grandiose narcissism, self-efficacy, self-esteem, vulnerable narcissism

Procedia PDF Downloads 152
264 Using Visualization Techniques to Support Common Clinical Tasks in Clinical Documentation

Authors: Jonah Kenei, Elisha Opiyo

Abstract:

Electronic health records, as a repository of patient information, is nowadays the most commonly used technology to record, store and review patient clinical records and perform other clinical tasks. However, the accurate identification and retrieval of relevant information from clinical records is a difficult task due to the unstructured nature of clinical documents, characterized in particular by a lack of clear structure. Therefore, medical practice is facing a challenge thanks to the rapid growth of health information in electronic health records (EHRs), mostly in narrative text form. As a result, it's becoming important to effectively manage the growing amount of data for a single patient. As a result, there is currently a requirement to visualize electronic health records (EHRs) in a way that aids physicians in clinical tasks and medical decision-making. Leveraging text visualization techniques to unstructured clinical narrative texts is a new area of research that aims to provide better information extraction and retrieval to support clinical decision support in scenarios where data generated continues to grow. Clinical datasets in electronic health records (EHR) offer a lot of potential for training accurate statistical models to classify facets of information which can then be used to improve patient care and outcomes. However, in many clinical note datasets, the unstructured nature of clinical texts is a common problem. This paper examines the very issue of getting raw clinical texts and mapping them into meaningful structures that can support healthcare professionals utilizing narrative texts. Our work is the result of a collaborative design process that was aided by empirical data collected through formal usability testing.

Keywords: classification, electronic health records, narrative texts, visualization

Procedia PDF Downloads 93
263 Receptiveness of Market Segmentation Towards Online Shopping Attitude: A Quality Management Strategy for Online Passenger Car Market

Authors: Noor Hasmini Abdghani, Nik Kamariah Nikmat, Nor Hayati Ahmad

Abstract:

Rapid growth of the internet technology led to changes in the consumer lifestyles. This involved customer buying behaviour-based internet that create new kind of buying strategy. Hence, it has summoned many of world firms including Malaysia to generate new quality strategy in preparation to face new customer buying lifestyles. Particularly, this study focused on identifying online customer segment of automobile passenger car customers. Secondly, the objective is to understand online customer’s receptiveness towards internet technologies. This study distributed 700 questionnaires whereby 582 were returned representing 83% response rate. The data were analysed using factor and regression analyses. The result from the factor analysis precipitates four online passenger car segmentations in Malaysia, which are: Segment (1)- Automobile Online shopping Preferences, Segment (2)- Automobile Online Brand Comparison, Segment (3)- Automobile Online Information Seeking and Segment (4)- Automobile Offline Shopping Preferences. In understanding the online customer’s receptiveness towards internet, the regression result shows that there is significant relationship between each of four segments of online passenger car customer with attitude towards automobile online shopping. This implies that, for online customers to have receptiveness toward internet technologies, he or she must have preferences toward online shopping or at least prefer to browse any related information online even if the actual purchase is made at the traditional store. With this proposed segmentation strategy, the firms especially the automobile firms will be able to understand their online customer behavior. At least, the proposed segmentation strategy will help the firms to strategize quality management approach for their online customers’ buying decision making.

Keywords: Automobile, Market Segmentation, Online Shopping Attitude, Quality Management Strategy

Procedia PDF Downloads 517
262 An Experimental Study of Self-Regulated Learning with High School Gifted Pupils

Authors: Prakash Singh

Abstract:

Research studies affirm the view that gifted pupils are endowed with unique personality traits, enabling them to study at higher levels of thinking, at a faster pace, and with a greater degree of autonomy than their average counterparts. The focus of this study was whether high school gifted pupils are capable of studying an advanced level curriculum on their own by employing self-regulated learning (SRL) strategies. To be self-regulated, pupils are required to be metacognitively, motivationally, and behaviourally active participants in their own learning processes so that they are able to initiate and direct their personal curriculum efforts to acquire cognitive skills and knowledge, instead of being solely reliant on their teachers. Researchers working with gifted populations concede that limited studies have been conducted thus far to examine gifted pupils’ expertise in using SRL strategies to assume ownership of their learning. In order to conduct this investigation, an enriched module in Accounting for specifically gifted grade eleven pupils was developed, incorporating advanced level content, and use was made of the Post-test-Only Control Group Design to accomplish this research objective. The results emanating from this empirical study strongly suggest that SRL strategies can be employed to overcome a narrow, rigid approach that limits the education of gifted pupils in the regular classroom of the high school. SRL can meaningfully offer an alternative way to implement an advanced level curriculum for the gifted in the mainstream of education. This can be achieved despite the limitations of differentiation in the regular classroom.

Keywords: advanced level curriculum, high school gifted pupils, self-regulated learning, teachers’ professional competencies

Procedia PDF Downloads 380