Search results for: technology threat avoidance theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12576

Search results for: technology threat avoidance theory

12546 Multi Object Tracking for Predictive Collision Avoidance

Authors: Bruk Gebregziabher

Abstract:

The safe and efficient operation of Autonomous Mobile Robots (AMRs) in complex environments, such as manufacturing, logistics, and agriculture, necessitates accurate multiobject tracking and predictive collision avoidance. This paper presents algorithms and techniques for addressing these challenges using Lidar sensor data, emphasizing ensemble Kalman filter. The developed predictive collision avoidance algorithm employs the data provided by lidar sensors to track multiple objects and predict their velocities and future positions, enabling the AMR to navigate safely and effectively. A modification to the dynamic windowing approach is introduced to enhance the performance of the collision avoidance system. The overall system architecture encompasses object detection, multi-object tracking, and predictive collision avoidance control. The experimental results, obtained from both simulation and real-world data, demonstrate the effectiveness of the proposed methods in various scenarios, which lays the foundation for future research on global planners, other controllers, and the integration of additional sensors. This thesis contributes to the ongoing development of safe and efficient autonomous systems in complex and dynamic environments.

Keywords: autonomous mobile robots, multi-object tracking, predictive collision avoidance, ensemble Kalman filter, lidar sensors

Procedia PDF Downloads 55
12545 The Effects of Self-Efficacy on Challenge and Threat States

Authors: Nadine Sammy, Mark Wilson, Samuel Vine

Abstract:

The Theory of Challenge and Threat States in Athletes (TCTSA) states that self-efficacy is an antecedent of challenge and threat. These states result from conscious and unconscious evaluations of situational demands and personal resources and are represented by both cognitive and physiological markers. Challenge is considered a more adaptive stress response as it is associated with a more efficient cardiovascular profile, as well as better performance and attention effects compared with threat. Self-efficacy is proposed to influence challenge/threat because an individual’s belief that they have the skills necessary to execute the courses of action required to succeed contributes to a perception that they can cope with the demands of the situation. This study experimentally examined the effects of self-efficacy on cardiovascular responses (challenge and threat), demand and resource evaluations, performance and attention under pressurised conditions. Forty-five university students were randomly assigned to either a control (n=15), low self-efficacy (n=15) or high self-efficacy (n=15) group and completed baseline and pressurised golf putting tasks. Self-efficacy was manipulated using false feedback adapted from previous studies. Measures of self-efficacy, cardiovascular reactivity, demand and resource evaluations, task performance and attention were recorded. The high self-efficacy group displayed more favourable cardiovascular reactivity, indicative of a challenge state, compared with the low self-efficacy group. The former group also reported high resource evaluations, but no task performance or attention effects were detected. These findings demonstrate that levels of self-efficacy influence cardiovascular reactivity and perceptions of resources under pressurised conditions.

Keywords: cardiovascular, challenge, performance, threat

Procedia PDF Downloads 205
12544 The Instruction of Imagination: A Theory of Language as a Social Communication Technology

Authors: Daniel Dor

Abstract:

The research presents a new general theory of language as a socially-constructed communication technology, designed by cultural evolution for a very specific function: the instruction of imagination. As opposed to all the other systems of intentional communication, which provide materials for the interlocutors to experience, language allows speakers to instruct their interlocutors in the process of imagining the intended meaning-instead of experiencing it. It is thus the only system that bridges the experiential gaps between speakers. This is the key to its enormous success.

Keywords: experience, general theory of language, imagination, language as technology, social essence of language

Procedia PDF Downloads 555
12543 Real-Time Adaptive Obstacle Avoidance with DS Method and the Influence of Dynamic Environments Change on Different DS

Authors: Saeed Mahjoub Moghadas, Farhad Asadi, Shahed Torkamandi, Hassan Moradi, Mahmood Purgamshidian

Abstract:

In this paper, we present real-time obstacle avoidance approach for both autonomous and non-autonomous DS-based controllers and also based on dynamical systems (DS) method. In this approach, we can modulate the original dynamics of the controller and it allows us to determine safety margin and different types of DS to increase the robot’s reactiveness in the face of uncertainty in the localization of the obstacle and especially when robot moves very fast in changeable complex environments. The method is validated in simulation and influence of different autonomous and non-autonomous DS such as limit cycles, and unstable DS on this algorithm and also the position of different obstacles in complex environment is explained. Finally, we describe how the avoidance trajectories can be verified through different parameters such as safety factor.

Keywords: limit cycles, nonlinear dynamical system, real time obstacle avoidance, DS-based controllers

Procedia PDF Downloads 361
12542 An Exploratory Study to Investigate the Impact of Corporate Social Responsibility on Luxury Brand Avoidance in India

Authors: Glyn Atwal, Douglas Bryson

Abstract:

The rapid expansion of a consumer class in India has also coincided with an increasing awareness of social and environmental issues. The overall objective of this study explores to what extent Corporate Social Responsibility (CSR) can lead to luxury brand avoidance within an Indian context. In-depth interviews were conducted with luxury consumers in New Delhi. The demographic breakdown of those interviewed was 16 males and 9 females, aged between 21 and 44. Antecedents of brand avoidance could be sorted according to two main categories. The first category was consumer dissatisfaction due to poor product or service performance. Customer service, particularly within the hospitality sector, was identified as a defining source of brand avoidance. The second category was negative stereotypes of brand users. A salient finding was that no single participant explicitly identified CSR as a source of brand avoidance. However, the interviews revealed that luxury consumers are in fact concerned about CSR issues but assume that international luxury brands have a positive record on CSR performance. Interestingly, participants placed greater emphasis on the broader interpretation of ‘corporate reputation’ rather than specific social or environmental issues to determine the CSR performance of a luxury brand. The findings reported in this exploratory study suggest that Indian luxury consumers do value the overall CSR performance of luxury brands expressed as a brand responsibility or brand reputation, and this is a potential source of brand avoidance. International luxury brands need, therefore, consider developing but also communicating a positive CSR strategy in order to reduce the risk of customers forming negative opinions about the brand.

Keywords: brand avoidance, CSR, luxury

Procedia PDF Downloads 285
12541 A Preliminary Study Examining the Effect of Tourism as Perceived by Locals: From Perspective of Conservative of Research Theory

Authors: Ali Ahmad AlGassim

Abstract:

The objective of this study is to explore the local community perceptions toward the impact of tourism from the COR theory perspective. The current study used qualitative methods and purposive sampling to engage informants. Data was collected using an online survey with closed-ended and open-ended questions from 57 informants living in Al-Jufa Village, and then data was analysed using content analysis. The findings showed that COR theory help explains the residents’ perception of the threat and stress of losing resources. The findings showed the residents feel stressed about losing resources, such as lands, houses, heritage, sociocultural and Islamic values, as well as job and investment opportunities if the village is developed for tourism. Findings also present that one group of residents declared rejections and aiming to resist the development if it takes place, and they will not allowing foreigners to come and live in the village. The findings also show that this stress and strain can be alleviated by allowing residents to participate in the development. Finally, the residents of Al-Juhfa showed a high level of feeling of ownership towards their resources.

Keywords: perception of threat, effect of tourism, COR theory, local community, impact of tourism, Saudi Arabia

Procedia PDF Downloads 223
12540 Creativity and Stereotype Threat: Analysis of the Impact of Creativity on Eliminating the Stereotype Threat in the Educational Setting

Authors: Aleksandra Gajda

Abstract:

Among students between 12 and 13, the probability of activating the stereotype threat increases noticeably. Girls consider themselves weaker in science, while boys consider themselves weaker in the field of language skills. This phenomenon is disturbing because it may result in wrong choices of the further path of education, not consistent with the actual competences of the students. Meanwhile, negative effects of the stereotype threat, observable in the loss of focus on the task and transferring it to dealing with fear of failure, can be reduced by various factors. The study examined the impact of creativity on eliminating the stereotype threat. The experiment in the form of a 2 (gender: male vs. female) x 3 (traditional gender roles: neutral version vs. nontraditional gender roles) x 2 (creativity: low vs. high) factorial design was conducted. The results showed that a high level of creative abilities may reduce the negative effects of stereotype threat in educational setting.

Keywords: creativity, education, language skills, mathematical skills, stereotype threat

Procedia PDF Downloads 86
12539 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis

Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv

Abstract:

Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.

Keywords: correlation analysis, hierarchical filtering, multisource data, network security

Procedia PDF Downloads 176
12538 Supervised Learning for Cyber Threat Intelligence

Authors: Jihen Bennaceur, Wissem Zouaghi, Ali Mabrouk

Abstract:

The major aim of cyber threat intelligence (CTI) is to provide sophisticated knowledge about cybersecurity threats to ensure internal and external safeguards against modern cyberattacks. Inaccurate, incomplete, outdated, and invaluable threat intelligence is the main problem. Therefore, data analysis based on AI algorithms is one of the emergent solutions to overcome the threat of information-sharing issues. In this paper, we propose a supervised machine learning-based algorithm to improve threat information sharing by providing a sophisticated classification of cyber threats and data. Extensive simulations investigate the accuracy, precision, recall, f1-score, and support overall to validate the designed algorithm and to compare it with several supervised machine learning algorithms.

Keywords: threat information sharing, supervised learning, data classification, performance evaluation

Procedia PDF Downloads 114
12537 A Performance Comparison between Conventional and Flexible Box Erecting Machines Using Dispatching Rules

Authors: Min Kyu Kim, Eun Young Lee, Dong Woo Son, Yoon Seok Chang

Abstract:

In this paper, we introduce a flexible box erecting machine (BEM) that swiftly and automatically transforms cardboard into a three dimensional box. Recently, the parcel service and home-shopping industries have grown rapidly, and there is an increasing need for various box types to ship various products. However, workers cannot fold thousands of boxes manually in a day. As such, automatic BEMs are garnering greater attention. This study takes equipment operation into consideration as well as mechanical improvements in order to design a BEM that is able to outperform its conventional counterparts. We analyzed six dispatching rules – First In First Out (FIFO), Shortest Processing Time (SPT), Earliest Due Date (EDD), Setup Avoidance, EDD + SPT, and EDD + Setup Avoidance – to determine which one was most suitable for BEM operation. Consequently, SPT and Setup Avoidance were found to be the most critical rules, followed by EDD + Setup Avoidance, EDD + SPT, EDD, and FIFO. This hierarchy was valid for both our conventional BEM and our new flexible BEM from the viewpoint of processing time. We believe that this research can contribute to flexible BEM management, which has the potential to increase productivity and convenience.

Keywords: automation, box erecting machine, dispatching rule, setup time

Procedia PDF Downloads 334
12536 Policy Compliance in Information Security

Authors: R. Manjula, Kaustav Bagchi, Sushant Ramesh, Anush Baskaran

Abstract:

In the past century, the emergence of information technology has had a significant positive impact on human life. While companies tend to be more involved in the completion of projects, the turn of the century has seen importance being given to investment in information security policies. These policies are essential to protect important data from adversaries, and thus following these policies has become one of the most important attributes revolving around information security models. In this research, we have focussed on the factors affecting information security policy compliance in two models : The theory of planned behaviour and the integration of the social bond theory and the involvement theory into a single model. Finally, we have given a proposal of where these theories would be successful.

Keywords: information technology, information security, involvement theory, policies, social bond theory

Procedia PDF Downloads 344
12535 Forecasting Future Society to Explore Promising Security Technologies

Authors: Jeonghwan Jeon, Mintak Han, Youngjun Kim

Abstract:

Due to the rapid development of information and communication technology (ICT), a substantial transformation is currently happening in the society. As the range of intelligent technologies and services is continuously expanding, ‘things’ are becoming capable of communicating one another and even with people. However, such “Internet of Things” has the technical weakness so that a great amount of such information transferred in real-time may be widely exposed to the threat of security. User’s personal data are a typical example which is faced with a serious security threat. The threats of security will be diversified and arose more frequently because next generation of unfamiliar technology develops. Moreover, as the society is becoming increasingly complex, security vulnerability will be increased as well. In the existing literature, a considerable number of private and public reports that forecast future society have been published as a precedent step of the selection of future technology and the establishment of strategies for competitiveness. Although there are previous studies that forecast security technology, they have focused only on technical issues and overlooked the interrelationships between security technology and social factors are. Therefore, investigations of security threats in the future and security technology that is able to protect people from various threats are required. In response, this study aims to derive potential security threats associated with the development of technology and to explore the security technology that can protect against them. To do this, first of all, private and public reports that forecast future and online documents from technology-related communities are collected. By analyzing the data, future issues are extracted and categorized in terms of STEEP (Society, Technology, Economy, Environment, and Politics), as well as security. Second, the components of potential security threats are developed based on classified future issues. Then, points that the security threats may occur –for example, mobile payment system based on a finger scan technology– are identified. Lastly, alternatives that prevent potential security threats are proposed by matching security threats with points and investigating related security technologies from patent data. Proposed approach can identify the ICT-related latent security menaces and provide the guidelines in the ‘problem – alternative’ form by linking the threat point with security technologies.

Keywords: future society, information and communication technology, security technology, technology forecasting

Procedia PDF Downloads 440
12534 Q-Learning of Bee-Like Robots Through Obstacle Avoidance

Authors: Jawairia Rasheed

Abstract:

Modern robots are often used for search and rescue purpose. One of the key areas of interest in such cases is learning complex environments. One of the key methodologies for robots in such cases is reinforcement learning. In reinforcement learning robots learn to move the path to reach the goal while avoiding obstacles. Q-learning, one of the most advancement of reinforcement learning is used for making the robots to learn the path. Robots learn by interacting with the environment to reach the goal. In this paper simulation model of bee-like robots is implemented in NETLOGO. In the start the learning rate was less and it increased with the passage of time. The bees successfully learned to reach the goal while avoiding obstacles through Q-learning technique.

Keywords: reinforlearning of bee like robots for reaching the goalcement learning for randomly placed obstacles, obstacle avoidance through q-learning, q-learning for obstacle avoidance,

Procedia PDF Downloads 66
12533 An Online Priority-Configuration Algorithm for Obstacle Avoidance of the Unmanned Air Vehicles Swarm

Authors: Lihua Zhu, Jianfeng Du, Yu Wang, Zhiqiang Wu

Abstract:

Collision avoidance problems of a swarm of unmanned air vehicles (UAVs) flying in an obstacle-laden environment are investigated in this paper. Given that the UAV swarm needs to adapt to the obstacle distribution in dynamic operation, a priority configuration is designed to guide the UAVs to pass through the obstacles in turn. Based on the collision cone approach and the prediction of the collision time, a collision evaluation model is established to judge the urgency of the imminent collision of each UAV, and the evaluation result is used to assign the priority of each UAV to further instruct them going through the obstacles in descending order. At last, the simulation results provide the promising validation in terms of the efficiency and scalability of the proposed approach.

Keywords: UAV swarm, collision avoidance, complex environment, online priority design

Procedia PDF Downloads 187
12532 Optimization Based Obstacle Avoidance

Authors: R. Dariani, S. Schmidt, R. Kasper

Abstract:

Based on a non-linear single track model which describes the dynamics of vehicle, an optimal path planning strategy is developed. Real time optimization is used to generate reference control values to allow leading the vehicle alongside a calculated lane which is optimal for different objectives such as energy consumption, run time, safety or comfort characteristics. Strict mathematic formulation of the autonomous driving allows taking decision on undefined situation such as lane change or obstacle avoidance. Based on position of the vehicle, lane situation and obstacle position, the optimization problem is reformulated in real-time to avoid the obstacle and any car crash.

Keywords: autonomous driving, obstacle avoidance, optimal control, path planning

Procedia PDF Downloads 342
12531 Support of Syrian Refugees: The Roles of Descriptive and Injunctive Norms, Perception of Threat, and Negative Emotions

Authors: Senay Yitmen

Abstract:

This research investigated individual’s support and helping intentions towards Syrian refugees in Turkey. This is examined in relation to perceived threat and negative emotions, and also to the perceptions of whether one’s intimate social network (family and friends) considers Syrians a threat (descriptive network norm) and whether this network morally supports Syrian refugees (injunctive norms). A questionnaire study was conducted among Turkish participants (n= 565) and the results showed that perception of threat was associated with negative emotions which, in turn, were related to less support of Syrian refugees. Additionally, descriptive norms moderated the relationship between perceived threat and negative emotions towards Syrian refugees. Furthermore, injunctive norms moderated the relationship between negative emotions and support to Syrian refugees. Specifically, the findings indicate that perceived threat is associated with less support of Syrian refugees through negative emotions when descriptive norms are weak and injunctive norms are strong. Injunctive norms appear to trigger a dilemma over the decision to conform or not to conform: when one has negative emotions as a result of perceived threat, it becomes more difficult to conform to the moral obligation of injunctive norms which is associated with less support of Syrian refugees. Hence, these findings demonstrate that both descriptive and injunctive norms are important and play different roles in individual’s support of Syrian refugees.

Keywords: descriptive norms, emotions, injunctive norms, the perception of threat

Procedia PDF Downloads 160
12530 Cognitive and Environmental Factors Affecting Graduate Student Perception of Mathematics

Authors: Juanita Morris

Abstract:

The purpose of this study will examine the mediating relationships between the theories of intelligence, mathematics anxiety, gender stereotype threat, meta-cognition and math performance through the use of eye tracking technology, affecting student perception and problem-solving abilities. The participants will consist of (N=80) female graduate students. Test administered were the Abbreviated Math Anxiety Scale, Tobii Eye Tracking software, gender stereotype threat through Google images, and they will be asked to describe their problem-solving approach allowed to measure metacognition. Participants will be administered mathematics problems while having gender stereotype threat shown to them through online images while being directed to look at the eye tracking software Tobii. We will explore this by asking ‘Is mathematics anxiety associated with the theories of intelligence and gender stereotype threat and how does metacognition and math performance place a role in mediating those perspectives?’. It is hypothesized that math-anxious students are more likely affected by the gender stereotype threat and that may play a role in their performance? Furthermore, we also want to explore whether math anxious students are more likely to be an entity theorist than incremental theorist and whether those who are math anxious will be more likely to be fixated on variables associated with coefficients? Path analysis and independent samples t-test will be used to generate results for this study. We hope to conclude that both the theories of intelligence and metacognition mediate the relationship between mathematics anxiety and gender stereotype threat.

Keywords: math anxiety, emotions, affective domains fo learning, cognitive underlinings

Procedia PDF Downloads 242
12529 Psychological Compatibility of Football Players According to Success Achievement and Failure Avoidance Motivation

Authors: Konstantin A. Bochaver, Alexandra O. Savinkina

Abstract:

The study analyzed the relationship between the homogeneity-heterogeneity of players in a football team and their efficiency. Compatible players were examined in terms of level of socio-psychological development of the team for which they act. It was shown that in teams of high level of socio-psychological development more compatible were athletes with different levels of failure avoidance motivation. But in low-level teams – bucking the trend. The homogeneity of success achievement motivation was not a factor in the effectiveness of the football team.

Keywords: compatibility, failure avoidance motivation, football, heterogeneity, homogeneity, soccer, sport team, success achievement motivation

Procedia PDF Downloads 334
12528 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures

Authors: Mastoor Qubra

Abstract:

Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.

Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation

Procedia PDF Downloads 242
12527 Collision Avoidance Maneuvers for Vessels Navigating through Traffic Separation Scheme

Authors: Aswin V. J., Sreeja S., R. Harikumar

Abstract:

Ship collision is one of the major concerns while navigating in the ocean. In congested sea routes where there are hectic offshore operations, ships are often forced to take close encounter maneuvers. Maritime rules for preventing collision at sea are defined in the International Regulations for Preventing Collision at Sea. Traffic Separation Schemes (TSS) are traffic management route systems ruled by International Maritime Organization (IMO), where the traffic lanes indicate the general direction of traffic flow. The Rule 10 of International Regulations for Preventing Collision at Sea prescribes the conduct of vessels while navigating through TSS. But no quantitative criteria regarding the procedures to detect and evaluate collision risk is specified in International Regulations for Preventing Collision at Sea. Most of the accidents that occur are due to operational errors affected by human factors such as lack of experience and loss of situational awareness. In open waters, the traffic density is less when compared to that in TSS, and hence the vessels can be operated in autopilot mode. A collision avoidance method that uses the possible obstacle trajectories in advance to predict “collision occurrence” and can generate suitable maneuvers for collision avoidance is presented in this paper. The suitable course and propulsion changes that can be used in a TSS considering International Regulations for Preventing Collision at Sea are found out for various obstacle scenarios.

Keywords: collision avoidance, maneuvers, obstacle trajectories, traffic separation scheme

Procedia PDF Downloads 47
12526 Influences Driving the Teachers’ Adoption of Mobile Learning

Authors: L. A. Alfarani, M. McPherson, N. Morris

Abstract:

The growth of mobile learning depends primarily on the participation of teachers and their belief in the possibilities that this technology has for enhancing learning. The need to integrate technology into education seems clear-cut, however, its acceptance in Saudi higher education remains low. Thus, determining the particular factors that affect faculty acceptance of technology is vital. This paper focuses on TAM which depends on two factors: perceived usefulness and perceived ease of use, this theory are used to predict faculty members’ behavioural intentions towards using mobile learning technology. 279 faculty members in one Saudi university have responded to the online questionnaire. The findings have revealed that there is a statistically significant difference in both usefulness and ease of using m-learning factors.

Keywords: TAM theory, mobile learning technology acceptance, usefulness, ease of use

Procedia PDF Downloads 489
12525 Cognitive Theory and the Design of Integrate Curriculum

Authors: Bijan Gillani, Roya Gillani

Abstract:

The purpose of this paper is to propose a pedagogical model where engineering provides the interconnection to integrate the other topics of science, technology, engineering, and mathematics. The author(s) will first present a brief discussion of cognitive theory and then derive an integrated pedagogy to use engineering and technology, such as drones, sensors, camera, iPhone, radio waves as the nexus to an integrated curriculum development for the other topics of STEM. Based on this pedagogy, one example developed by the author(s) called “Drones and Environmental Science,” will be presented that uses a drone and related technology as an appropriate instructional delivery medium to apply Piaget’s cognitive theory to create environments that promote the integration of different STEM subjects that relate to environmental science.

Keywords: cogntive theories, drone, environmental science, pedagogy

Procedia PDF Downloads 546
12524 Educating the Education Student: Technology as the Link between Theory and Praxis

Authors: Rochelle Botha-Marais

Abstract:

When lecturing future educators in South Africa, praxis is an indispensable aspect that is often neglected. Without properly understanding how the theory taught in lecture halls relates to their future position as educators, we can not expect these students to be fully equipped future teachers. To enable education students at the Vaal Campus of the North West University - who have the Afrikaans language as major - to discover the link between theory and practice, the author created an assignment on phonetics in which the use of technology was incorporated. In the past, students had to submit an assignment or worksheet and they did not get the opportunity to apply their newly found knowledge in a practical manner. For potential future teachers, this application is essential. This paper will demonstrate how technology is used in the second year Afrikaans education module to promote student engagement and self-directed learning. Students were introduced to innovative new technologies alongside more familiar applications to shape a 21st century learning environment where students can think, communicate, solve problems, collaborate and take responsibility for their own teaching and learning. The paper will also reflect on student feedback pertaining the use and efficiency of technology in the Afrikaans module and the possible impact thereof on their own teaching and learning landscape. The aim of this paper is to showcase how technology can be used to maximize the students learning experience and equip future education students with the tools and knowledge to introduce technology-enhanced learning in their own teaching practice.

Keywords: education students, theory and practice, self-directed learning, student engagement, technology

Procedia PDF Downloads 259
12523 Cybercrime Stage Based Intervention: Through the Eyes of a Cyber Threat Actor

Authors: Jonathan W. Z. Lim, Vrizlynn L. L. Thing

Abstract:

Cybercrimes are on the rise, in part due to technological advancements, as well as increased avenues of exploitation. Sophisticated threat actors are leveraging on such advancements to execute their malicious intentions. The increase in cybercrimes is prevalent, and it seems unlikely that they can be easily eradicated. A more serious concern is that the community may come to accept the notion that this will become the trend. As such, the key question revolves around how we can reduce cybercrime in this evolving landscape. In our paper, we propose to build a systematic framework through the lens of a cyber threat actor. We explore the motivation factors behind the crimes and the crime stages of the threat actors. We then formulate intervention plans so as to discourage the act of committing malicious cyber activities and also aim to integrate ex-cyber offenders back into society.

Keywords: crime motivations, crime prevention, cybercrime, ex-cyber criminals

Procedia PDF Downloads 109
12522 Performance Analysis of Vision-Based Transparent Obstacle Avoidance for Construction Robots

Authors: Siwei Chang, Heng Li, Haitao Wu, Xin Fang

Abstract:

Construction robots are receiving more and more attention as a promising solution to the manpower shortage issue in the construction industry. The development of intelligent control techniques that assist in controlling the robots to avoid transparency and reflected building obstacles is crucial for guaranteeing the adaptability and flexibility of mobile construction robots in complex construction environments. With the boom of computer vision techniques, a number of studies have proposed vision-based methods for transparent obstacle avoidance to improve operation accuracy. However, vision-based methods are also associated with disadvantages such as high computational costs. To provide better perception and value evaluation, this study aims to analyze the performance of vision-based techniques for avoiding transparent building obstacles. To achieve this, commonly used sensors, including a lidar, an ultrasonic sensor, and a USB camera, are equipped on the robotic platform to detect obstacles. A Raspberry Pi 3 computer board is employed to compute data collecting and control algorithms. The turtlebot3 burger is employed to test the programs. On-site experiments are carried out to observe the performance in terms of success rate and detection distance. Control variables include obstacle shapes and environmental conditions. The findings contribute to demonstrating how effectively vision-based obstacle avoidance strategies for transparent building obstacle avoidance and provide insights and informed knowledge when introducing computer vision techniques in the aforementioned domain.

Keywords: construction robot, obstacle avoidance, computer vision, transparent obstacle

Procedia PDF Downloads 48
12521 Mediated and Moderated Effects of Insecure Attachment Style and Depressions

Authors: Li-Ting Chen, Chih-Tao Cheng, I-Ping Huang, Jen-Ho Chang, Nien-Tzu Chang, Fei-Hsiu Hsiao

Abstract:

Background: Insecurity adult attachment style may be triggered by cancer threat, which in turn influences depression symptoms. Dispositional mindfulness may have benefits of insecure attachment on depression for colorectal patient transfer to survivor. Objective: This study examined the mediating and moderating effects of quality of life (QOL) and dispositional mindfulness on the relationship between insecure attachment style and depression symptoms. Methods: A cross-sectional study design was used. Data were collected using the QOL functional and symptoms (EORTC-C30 and EORTC CR29), dispositional mindfulness (FFMQ), Short form of Experience in Close Relationships Revised Questionnaire (SF-ECRRQ), and depressive symptoms (BDI-II scale). Results: Of the 90 CRC survivors who participated, the indirect effect of both ECR anxiety (β=0.23, CI=0.05-0.44) and ECR avoidance (β=0.12, CI=0.02-0.24) on depression were significantly mediated through EORTC-C29 colorectal symptoms. Three components of dispositional mindfulness (i.e., acting of awareness, non-judging, non-reactivity) as the moderator in the relationship between ECR anxiety and depressive symptoms. Acting of awareness was a moderator in the relationship between ECR avoidance and depressive symptoms. Conclusions: There are two pathways from insecure attachment to depression: through the mediator of colorectal symptoms and the moderator of dispositional mindfulness. Cancer symptom management and mindfulness practices could improve the impact of insecure attachment on depression among CRC patients in a post-treatment transition period.

Keywords: acting of awareness, attachment style, colorectal cancer, disposisitonal mindfulness, depression

Procedia PDF Downloads 24
12520 Avoidance and Selectivity in the Acquisition of Arabic as a Second/Foreign Language

Authors: Abeer Heider

Abstract:

This paper explores and classifies the different kinds of avoidances that students commonly make in the acquisition of Arabic as a second/foreign language, and suggests specific strategies to help students lessen their avoidance trends in hopes of streamlining the learning process. Students most commonly use avoidance strategies in grammar, and word choice. These different types of strategies have different implications and naturally require different approaches. Thus the question remains as to the most effective way to help students improve their Arabic, and how teachers can efficiently utilize these techniques. It is hoped that this research will contribute to understand the role of avoidance in the field of the second language acquisition in general, and as a type of input. Yet some researchers also note that similarity between L1 and L2 may be problematic as well since the learner may doubt that such similarity indeed exists and consequently avoid the identical constructions or elements (Jordens, 1977; Kellermann, 1977, 1978, 1986). In an effort to resolve this issue, a case study is being conducted. The present case study attempts to provide a broader analysis of what is acquired than is usually the case, analyzing the learners ‘accomplishments in terms of three –part framework of the components of communicative competence suggested by Michele Canale: grammatical competence, sociolinguistic competence and discourse competence. The subjects of this study are 15 students’ 22th year who came to study Arabic at Qatar University of Cairo. The 15 students are in the advanced level. They were complete intermediate level in Arabic when they arrive in Qatar for the first time. The study used discourse analytic method to examine how the first language affects students’ production and output in the second language, and how and when students use avoidance methods in their learning. The study will be conducted through Fall 2015 through analyzing audio recordings that are recorded throughout the entire semester. The recordings will be around 30 clips. The students are using supplementary listening and speaking materials. The group will be tested at the end of the term to assess any measurable difference between the techniques. Questionnaires will be administered to teachers and students before and after the semester to assess any change in attitude toward avoidance and selectivity methods. Responses to these questionnaires are analyzed and discussed to assess the relative merits of the aforementioned strategies to avoidance and selectivity to further support on. Implications and recommendations for teacher training are proposed.

Keywords: the second language acquisition, learning languages, selectivity, avoidance

Procedia PDF Downloads 260
12519 Group Boundaries against and Due to Identity Threat

Authors: Anna Siegler, Sara Bigazzi, Sara Serdult, Ildiko Bokretas

Abstract:

Social identity emerging from group membership defines the representational processes of our social reality. Based on our theoretical assumption the subjective perception of identity threat leads to an instable identity structure. The need to re-establish the positive identity will lead us to strengthen group boundaries. Prejudice in our perspective offer psychological security those who thinking in exclusive barriers, and we suggest that those who identify highly with their ingroup/national identity and less with superordinate identities take distance from others and this is related to their perception of threat. In our study we used a newly developed questionnaire, the Multiple Threat and Prejudice Questionnaire (MTPQ) which measure identity threat at different dimensions of identification (national, existential, gender, religious) and the distancing of different outgroups, over and above we worked with Social Dominance Orientation (SDO) and Identification with All Humanity Scale (IWAH). We conduct one data collection (N=1482) in a Hungarian sample to examine the connection between national threat and distance-taking, and this survey includes the investigation (N=218) of identification with different group categories. Our findings confirmed that those who feel themselves threatened in their national identity aspects are less likely to identify themselves with superordinate groups and this correlation is much stronger when they think about the nation as a bio-cultural unit, while if nation defined as a social-economy entity this connection is less powerful and has just the opposite direction.

Keywords: group boundaries, identity threat, prejudice, superordinate groups

Procedia PDF Downloads 376
12518 Three-Dimensional Optimal Path Planning of a Flying Robot for Terrain Following/Terrain Avoidance

Authors: Amirreza Kosari, Hossein Maghsoudi, Malahat Givar

Abstract:

In this study, the three-dimensional optimal path planning of a flying robot for Terrain Following / Terrain Avoidance (TF/TA) purposes using Direct Collocation has been investigated. To this purpose, firstly, the appropriate equations of motion representing the flying robot translational movement have been described. The three-dimensional optimal path planning of the flying vehicle in terrain following/terrain avoidance maneuver is formulated as an optimal control problem. The terrain profile, as the main allowable height constraint has been modeled using Fractal Generation Method. The resulting optimal control problem is discretized by applying Direct Collocation numerical technique, and then transformed into a Nonlinear Programming Problem (NLP). The efficacy of the proposed method is demonstrated by extensive simulations, and in particular, it is verified that this approach could produce a solution satisfying almost all performance and environmental constraints encountering a low-level flying maneuver

Keywords: path planning, terrain following, optimal control, nonlinear programming

Procedia PDF Downloads 162
12517 Using Econometric Methods to Explore Obesity Stigma and Avoidance of Breast and Cervical Cancer Screening

Authors: Stephanie A. Schauder, Gosia Sylwestrzak

Abstract:

Overweight and obese women report avoiding preventive care due to fear of weight-related bias from medical professionals. Gynecological exams, due to their sensitive and personally invasive nature, are especially susceptible to avoidance. This research investigates the association between body mass index (BMI) and screening rates for breast and cervical cancer using claims data from 1.3 million members of a large health insurance company. Because obesity is associated with increased cancer risk, screenings for these cancers should increase as BMI increases. However, this paper finds that the distribution of cancer screening rates by BMI take an inverted U-shape with underweight and obese members having the lowest screening rates. For cervical cancer screening, those in the target population with a BMI of 23 have the highest screening rate at 68%, while Obese Class III members have a screening rate of 50%. Those in the underweight category have a screening rate of 58%. This relationship persists even after controlling for health and demographic covariates in regression analysis. Interestingly, there is no association between BMI and BRCA (BReast CAncer gene) genetic testing. This is consistent with the narrative that stigma causes avoidance because genetic testing does not involve any assessment of a person’s body. More work must be done to determine how to increase cancer screening rates in those who may feel stigmatized due to their weight.

Keywords: cancer screening, cervical cancer, breast cancer, weight stigma, avoidance of care

Procedia PDF Downloads 166