109 research outputs found

    Skill Development and Motivational Enhancement to Change Drinking Behavior in Sabah Borneo

    Get PDF
    Alcohol is the third highest risk factor for disease prevalence in the world and threatens the quality of life of people and societies Consumption of alcohol is a challenge in a few of the native communities of Sabah and Sarawak with the highest prevalence of risky drinking in Malaysia This study aimed to compare drinking refusal self-efficacy DRSE and quality of life QOL between the experimental group and the control group before and after the Motivational Enhancement Intervention MEI and to compare DRSE and QOL of the experimental group before and after the MEI A quasiexperimental design was used to assess the effectiveness of MEI at baseline and three months follow-up by using pretest and posttest design A total of 56 villagers in the West Coast Division of Sabah participated in this study Purposive sampling by using Alcohol Use Identification Test AUDIT was applied to select hazardous and harmful drinkers between age 18 to 56 years old Data was analyzed by using IBM SPSS version 26 0 The result found a significant difference in DRSE and QOL in the intervention group before and after MEI A significant difference in these measures was also found between the intervention and control groups after MEI The study results are significant to provide direction for the next action plan for intervention purposes aimed to increase the ability to resist drinking alcohol in various situations and to improve the QOL among the indigenous communities of Saba

    Optimization of NOE Flights Sensors and Their Integration

    Get PDF
    This chapter unveils an enhancement strategy for nap-of-the-earth. The nap-of-the-earth (NOE) mode is the most energizing, most unsafe, and is generally the slowest. Military aircraft to maintain a strategic distance from opponent detection and assault in a high-thread circumstance use it. NOE used to limit discovery by the ground-based radar, targets and the control system. The radar altimeter (RA) or terrain following radar (TFR), terrain awareness and warning system (TAWS) used to identify the curbs during flying in NOE flights. Here, while the plane is at the nap of the earth activity, the speed and the height must be moderate as effectively decided. The terrain following radar (TFR) keeps up the altitude from the beginning. Therefore, we analyze the issue to expand the performance of the airplane by extending the terrain by a few modes of the TAWS, which given by various aviation authorities1. Further to this, different TAWS modes of action, explanation of mode selection and progression in TAWS clarified in detail. This chapter displays the MATLAB programme for a few patterns of TAWS mission, and simulation of the flight path for the excessive terrain closure rate from mode two operation of the flight

    A Visual Programming Paradigm for Abstract Deep Learning Model Development

    Full text link
    Deep learning is one of the fastest growing technologies in computer science with a plethora of applications. But this unprecedented growth has so far been limited to the consumption of deep learning experts. The primary challenge being a steep learning curve for learning the programming libraries and the lack of intuitive systems enabling non-experts to consume deep learning. Towards this goal, we study the effectiveness of a no-code paradigm for designing deep learning models. Particularly, a visual drag-and-drop interface is found more efficient when compared with the traditional programming and alternative visual programming paradigms. We conduct user studies of different expertise levels to measure the entry level barrier and the developer load across different programming paradigms. We obtain a System Usability Scale (SUS) of 90 and a NASA Task Load index (TLX) score of 21 for the proposed visual programming compared to 68 and 52, respectively, for the traditional programming methods

    Handling Communication via APIs for Microservices

    Full text link
    Enterprises in their journey to the cloud, want to decompose their monolith applications into microservices to maximize cloud benefits. Current research focuses a lot on how to partition the monolith into smaller clusters that perform well across standard metrics like coupling, cohesion, etc. However, there is little research done on taking the partitions, identifying their dependencies between the microservices, exploring ways to further reduce the dependencies, and making appropriate code changes to enable robust communication without modifying the application behaviour. In this work, we discuss the challenges with the conventional techniques of communication using JSON and propose an alternative way of ID-passing via APIs. We also devise an algorithm to reduce the number of APIs. For this, we construct subgraphs of methods and their associated variables in each class and relocate them to their more functionally aligned microservices. Our quantitative and qualitative studies on five public Java applications clearly demonstrate that our refactored microservices using ID have decidedly better time and memory complexities than JSON. Our automation reduces 40-60\% of the manual refactoring efforts.Comment: 15 page

    Whose data is it: A Study on Privacy Issues Concerning Targeted Advertising in the Cable and Satellite TV Industries

    Get PDF
    ABSTRACT Data and Identity theft have become very prominent and common, making breaches of privacy a sensitive issue in todays fast-paced information age. The advent of the internet and innovative technologies is posing a serious challenge in protecting the consumer and his/her privacy. In the cable and satellite TV industry, new technologies are dynamically changing traditional marketing techniques. Many organisations are now moving away from the conventional mass marketing methods to targeted advertising models, which involves gathering personal information related to consumers. This information is worth a lot of advertising dollars to the organisations involved in collecting and using this information, but what the consumer gains, or loses, as the case may be, by divulging his or her personal information to marketers has not been studied enough. It still remains an under-explored territory. Traditionally, marketers have believed that any information collected on the consumer belongs to them (Cespedes & Smith, 1993; Patterson, Malley and Evans, 1997). This dissertation throws some light on this common assumption, while trying to understand who actually owns the collected data, primarily from a consumer perspective. This study is done in the U.S. context where, by law, the consumers do not own the data but only have rights to prevent use that is out of scope under the applicable law. This is particularly interesting as it is a stark contrast to the European privacy laws which empowers consumers by giving them the power over their data (Scheer, 2003)
    • …
    corecore