Search results
1 – 10 of 67Emily Bouck, Larissa Jakubow and Sarah Reiley
This chapter sought to answer the following questions: (a) what does special education means for students with intellectual disability?, (b) what is being done, and (c) how do we…
Abstract
This chapter sought to answer the following questions: (a) what does special education means for students with intellectual disability?, (b) what is being done, and (c) how do we maintain tradition? The answers, while complicated, suggest special education for students with intellectual disability historically and currently involves attention to what, how, and where, with the how being the key elements of special education for students with intellectual disability. This chapter discussed the what, how, and where for students with intellectual disability in a historical and current framework while also providing evidence-based practices for students with intellectual disability to implement to maintain the tradition of high-quality services.
Details
Keywords
Johnny Kwok Wai Wong, Mojtaba Maghrebi, Alireza Ahmadian Fard Fini, Mohammad Amin Alizadeh Golestani, Mahdi Ahmadnia and Michael Er
Images taken from construction site interiors often suffer from low illumination and poor natural colors, which restrict their application for high-level site management purposes…
Abstract
Purpose
Images taken from construction site interiors often suffer from low illumination and poor natural colors, which restrict their application for high-level site management purposes. The state-of-the-art low-light image enhancement method provides promising image enhancement results. However, they generally require a longer execution time to complete the enhancement. This study aims to develop a refined image enhancement approach to improve execution efficiency and performance accuracy.
Design/methodology/approach
To develop the refined illumination enhancement algorithm named enhanced illumination quality (EIQ), a quadratic expression was first added to the initial illumination map. Subsequently, an adjusted weight matrix was added to improve the smoothness of the illumination map. A coordinated descent optimization algorithm was then applied to minimize the processing time. Gamma correction was also applied to further enhance the illumination map. Finally, a frame comparing and averaging method was used to identify interior site progress.
Findings
The proposed refined approach took around 4.36–4.52 s to achieve the expected results while outperforming the current low-light image enhancement method. EIQ demonstrated a lower lightness-order error and provided higher object resolution in enhanced images. EIQ also has a higher structural similarity index and peak-signal-to-noise ratio, which indicated better image reconstruction performance.
Originality/value
The proposed approach provides an alternative to shorten the execution time, improve equalization of the illumination map and provide a better image reconstruction. The approach could be applied to low-light video enhancement tasks and other dark or poor jobsite images for object detection processes.
Details
Keywords
Nehemia Sugianto, Dian Tjondronegoro, Rosemary Stockdale and Elizabeth Irenne Yuwono
The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.
Abstract
Purpose
The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.
Design/methodology/approach
The paper proposes a new Responsible Artificial Intelligence Implementation Framework to guide the proposed solution's design and development. It defines responsible artificial intelligence criteria that the solution needs to meet and provides checklists to enforce the criteria throughout the process. To preserve data privacy, the proposed system incorporates a federated learning approach to allow computation performed on edge devices to limit sensitive and identifiable data movement and eliminate the dependency of cloud computing at a central server.
Findings
The proposed system is evaluated through a case study of monitoring social distancing at an airport. The results discuss how the system can fully address the case study's requirements in terms of its reliability, its usefulness when deployed to the airport's cameras, and its compliance with responsible artificial intelligence.
Originality/value
The paper makes three contributions. First, it proposes a real-time social distancing breach detection system on edge that extends from a combination of cutting-edge people detection and tracking algorithms to achieve robust performance. Second, it proposes a design approach to develop responsible artificial intelligence in video surveillance contexts. Third, it presents results and discussion from a comprehensive evaluation in the context of a case study at an airport to demonstrate the proposed system's robust performance and practical usefulness.
Details
Keywords
This study aimed to determine the expectations of students from mathematics teachers in the planning phase of lesson study (LS) in mathematics classrooms.
Abstract
Purpose
This study aimed to determine the expectations of students from mathematics teachers in the planning phase of lesson study (LS) in mathematics classrooms.
Design/methodology/approach
This study reported only a part of large-scale action research. The participants were Grade 8 students selected by the convenience sampling method. The data were obtained through open-ended questions. The content analysis method was used to analyze the data.
Findings
Four categories emerged: connection, technology-supported teaching, use of concrete materials, practice, and teacher behavior and teaching style.
Research limitations/implications
This study reveals how students in a different culture and education system, such as Türkiye, want to learn mathematics in the LS process of Japanese origin. It also gives some important clues for applying LS in a different culture.
Practical implications
This study may attract the attention of educational stakeholders who want to implement LS in mathematics classrooms by considering student perspectives.
Social implications
Due to the nature of LS, this study may emphasize teacher–student and teacher–teacher interactions. Thus, it can draw attention to the importance of social learning environments where students take responsibility and interact.
Originality/value
This study emphasizes the importance of listening to student voices in LS. Some ideas about mathematics teaching in Turkey should also be given. Finally, it can provide a good basis for understanding and comparing LS practices in different cultures and understandings.
Details
Keywords
Amruta Rout, Golak Bihari Mahanta, Bibhuti Bhusan Biswal, Renin Francy T., Sri Vardhan Raj and Deepak B.B.V.L.
The purpose of this study is to plan and develop a cost-effective health-care robot for assisting and observing the patients in an accurate and effective way during pandemic…
Abstract
Purpose
The purpose of this study is to plan and develop a cost-effective health-care robot for assisting and observing the patients in an accurate and effective way during pandemic situation like COVID-19. The purposed research work can help in better management of pandemic situations in rural areas as well as developing countries where medical facility is not easily available.
Design/methodology/approach
It becomes very difficult for the medical staff to have a continuous check on patient’s condition in terms of symptoms and critical parameters during pandemic situations. For dealing with these situations, a service mobile robot with multiple sensors for measuring patients bodily indicators has been proposed and the prototype for the same has been developed that can monitor and aid the patient using the robotic arm. The fuzzy controller has also been incorporated with the mobile robot through which decisions on patient monitoring can be taken automatically. Mamdani implication method has been utilized for formulating mathematical expression of M number of “if and then condition based rules” with defined input Xj (j = 1, 2, ………. s), and output yi. The inputs and output variables are formed by the membership functions µAij(xj) and µCi(yi) to execute the Fuzzy Inference System controller. Here, Aij and Ci are the developed fuzzy sets.
Findings
The fuzzy-based prediction model has been tested with the output of medicines for the initial 27 runs and was validated by the correlation of predicted and actual values. The correlation coefficient has been found to be 0.989 with a mean square error value of 0.000174, signifying a strong relationship between the predicted values and the actual values. The proposed research work can handle multiple tasks like online consulting, continuous patient condition monitoring in general wards and ICUs, telemedicine services, hospital waste disposal and providing service to patients at regular time intervals.
Originality/value
The novelty of the proposed research work lies in the integration of artificial intelligence techniques like fuzzy logic with the multi-sensor-based service robot for easy decision-making and continuous patient monitoring in hospitals in rural areas and to reduce the work stress on medical staff during pandemic situation.
Details
Keywords
Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…
Abstract
Purpose
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.
Design/methodology/approach
Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.
Findings
Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.
Research limitations/implications
Other optimization techniques can be applied for WSN to analyze the performance.
Practical implications
Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.
Social implications
Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.
Originality/value
Literature survey is carried out to find the methods which give better performance.
Details
Keywords
Yu Song, Bingrui Liu, Lejia Li and Jia Liu
In recent years, terrorist attacks have gradually become one of the important factors endangering social security. In this context, this research aims to propose methods and…
Abstract
Purpose
In recent years, terrorist attacks have gradually become one of the important factors endangering social security. In this context, this research aims to propose methods and principles which can be utilized to make effective evacuation plans to reduce casualties in terrorist attacks.
Design/methodology/approach
By analyzing the statistical data of terrorist attack videos, this paper proposes an extended cellular automaton (CA) model and simulates the panic evacuation of the pedestrians in the terrorist attack.
Findings
The main findings are as follows. (1) The panic movement of pedestrians leads to the dispersal of the crowd and the increase in evacuation time. (2) Most deaths occur in the early stage of crowd evacuation while pedestrians gather without perceiving the risk. (3) There is a trade-off between escaping from the room and avoidance of attackers for pedestrians. Appropriate panic contagion enables pedestrians to respond more quickly to risks. (4) Casualties are mainly concentrated in complex terrains, e.g. walls, corners, obstacles, exits, etc. (5) The initial position of the attackers has a significant effect on the crowd evacuation. The evacuation efficiency should be reduced if the attacker starts the attack from the exit or corners.
Originality/value
In this research, the concept of “focus region” is proposed to depict the different reactions of pedestrians to danger and the effects of the attacker’s motion (especially the attack strategies of attackers) are classified. Additionally, the influences on pedestrians by direct and indirect panic sources are studied.
Details
Keywords
Anil Kumar Inkulu and M.V.A. Raju Bahubalendruni
In the current era of Industry 4.0, the manufacturing industries are striving toward mass production with mass customization by considering human–robot collaboration. This study…
Abstract
Purpose
In the current era of Industry 4.0, the manufacturing industries are striving toward mass production with mass customization by considering human–robot collaboration. This study aims to propose the reconfiguration of assembly systems by incorporating multiple humans with robots using a human–robot task allocation (HRTA) to enhance productivity.
Design/methodology/approach
A human–robot task scheduling approach has been developed by considering task suitability, resource availability and resource selection through multicriteria optimization using the Linear Regression with Optimal Point and Minimum Distance Calculation algorithm. Using line-balancing techniques, the approach estimates the optimum number of resources required for assembly tasks operating by minimum idle time.
Findings
The task allocation schedule for a case study involving a punching press was solved using human–robot collaboration, and the approach incorporated the optimum number of appropriate resources to handle different types of proportion of resources.
Originality/value
This proposed work integrates the task allocation by human–robot collaboration and decrease the idle time of resource by integrating optimum number of resources.
Details
Keywords
The purpose of this paper is to explore the marketing opportunities for after-school educational services in the Chinese context by examining children’s perceptions of…
Abstract
Purpose
The purpose of this paper is to explore the marketing opportunities for after-school educational services in the Chinese context by examining children’s perceptions of intelligence using visual methodology.
Design/methodology/approach
Altogether 30 Chinese children aged 9–12 studying in grades four to six were asked to draw what comes to mind for two statements: “This is an intelligent child” and “This is a child of average intelligence.” After doing the drawings, the children were interviewed face-to-face to answer questions about the personalities and social relationships of the children depicted in the two drawings that they had produced.
Findings
A child described as intelligent was imagined wearing glasses, studying hard and obtaining excellent academic results. A child described as of average intelligence was imagined as having many friends, playing a lot and experiencing tension with parents over studies. Participants had a restrictive view of intelligence and associated intelligence with academic success. They endorsed both a growth mindset and a fixed mindset of intelligence. On the one hand, they endorsed a growth mindset of intelligence as they associated intelligence with personal efforts and practices. On the other hand, participants endorsed a fixed mindset of intelligence as they tended to avoid challenges and appeared to be threatened by the success of others. Participants imagined that an intelligent child would experience poor relationships with friends.
Research limitations/implications
The findings were based on a nonprobability small sample. The study did not investigate the socialization process of such perceptions.
Practical implications
Educational services and nonschool activity service providers can position themselves as agents to help students develop meta-analytical skills in embracing challenging tasks. Marketers can develop courses and learning materials that teach children different learning strategies. They can use incentives to encourage persistence and resilience in meeting challenges. This study uncovered the emotional and social needs of intelligent children. A new market segment was identified that targets children with high intelligence. Educational service providers can design curricula and activities to support high-performing children in developing empathy and good communication skills. Educators can assist those who perform well academically to nurture genuine friendships and improve social relations with peers.
Social implications
The prevalence of the private tutoring industry in the Chinese context may introduce educational disparity, as families with low resources will not be able to afford these services. Nonprofit organizations can provide similar educational services at a low cost to bridge the gap. The narrow view of intelligence expressed by participants, and their lack of awareness of the wide range of types of intelligence, indicates that education service providers can develop the confidence of a child with average intelligence through appreciation of his or her unique talents beyond academic achievements.
Originality/value
This study explores attributes associated with intelligence among Chinese children using an innovative visual method. The marketing implications can apply to other societies where the after-school tuition market is prevalent.
Details
Keywords
Riktesh Srivastava, Jitendra Singh Rathore, Samiksha Vyas and Rajita Srivastava
The purpose of this study is to look at the factors that drive people to participate in the sharing economy (SE). Based on the Technology Acceptance Model (TAM) and the Theory of…
Abstract
The purpose of this study is to look at the factors that drive people to participate in the sharing economy (SE). Based on the Technology Acceptance Model (TAM) and the Theory of Planned Behavior (TPB), the study proposes a mathematical model. The study’s ultimate objective is to help businesses attract more involved customers and promote collaborative consumption as a sustainable alternative to typical consumption patterns. The study offers a conceptual framework established via a thorough literature review to examine Indian customers’ use behavior toward SE platforms. A one-sample two-tailed t-test is used to assess the framework’s efficacy. The research fills gap in the literature on the SE by investigating the factors that determine subjective norms (SN), attitudes (A), and perceived behavioral control (PBC). A framework is provided that takes behavioral intention (BI) contemplated as a mediating variable. The research improves TAM and TPB by including new factors such as technical characteristics. This research adds to the body of knowledge on the digital SE by underlining the relevance of usage behavior in comprehending Indian customers, where A, SN, and PBC are important aspects. The research presents a paradigm for better understanding customers’ attitudes and behaviors toward various SE platforms, which might help academics, practitioners, and policy makers situate their initiatives within the larger field of sharing. The study’s categorizations of Indian consumers’ A, SN, PBC, and BI toward the SE might potentially advise on future research and government policies.
Details