Pub Date : 2023-12-21DOI: 10.53555/ephijse.v9i3.221
Afia Kwakyewaa Owusu-Agyeman, Eric Tornu, Abdulai Abdul Malik, Catherine Kyiu, Faustina Yin Yariga, Safura Seidu, Ababio-Boamah Christopher, Ofei Philemon Ashirifie, Owusu Samuel
The goal of this study was to evaluate the knowledge of family Caregivers in caring for terminally ill sufferers, to assess the practices of household Caregivers in caring for terminally ill sufferers, to examine the factors affecting household Caregivers in caring for terminally ill sufferers at the Tamale Regional Hospital. The findings show that there is the need for a caregiver to be present and ready to offer help to the patients due to their inability to move. Terminally ill patients may mostly be immobile or incapable of performing basic life functions without external support. It appears from the engagement with respondents that, the latter have appreciable knowledge of the concept of palliative care and care for terminally ill patients. They understand the challenging situation of terminally ill patients and are equally aware of what constitutes care for the sufferer. Also, family caregiver showed evidence of knowledge of health workers role in palliative care. They indicated that health workers had a crucial role to play in giving palliative care to the terminally ill patient. Doctors had the responsibility of prescribing medications while nurses also educate relatives and caregivers on palliative care. More so, health workers assisted in the caring of patients by assisting caregivers to physically move patients. Caregivers who could not move their patients due to the latters weight had to be assisted by some health workers. The result also indicates health workers played a crucial role in caring for terminally ill patients, of which caregivers were aware. The study further found that the other effect of caring for terminally ill patients was financial demands. To overcome this burden, the study recommends that caregivers had to cut their expenditures and request financial support from relatives and friends as family support was also a mechanism used in coping with the burden of caring for terminally ill patients. Also, the Tamale Regional Hospital should incorporate the services of family caregivers in the care of terminally ill patients. Their competence would immensely contribute to the improvement in the health of terminally ill patients. Further, the Ministry of Health should develop policies that will lessen burden on family caregivers of patients suffering from terminal diseases.
{"title":"KNOWLEDGE AND PRACTICES OF FAMILY CAREGIVERS OF TERMINALLY ILL PATIENTS AT THE TAMALE REGIONAL HOSPITAL","authors":"Afia Kwakyewaa Owusu-Agyeman, Eric Tornu, Abdulai Abdul Malik, Catherine Kyiu, Faustina Yin Yariga, Safura Seidu, Ababio-Boamah Christopher, Ofei Philemon Ashirifie, Owusu Samuel","doi":"10.53555/ephijse.v9i3.221","DOIUrl":"https://doi.org/10.53555/ephijse.v9i3.221","url":null,"abstract":"The goal of this study was to evaluate the knowledge of family Caregivers in caring for terminally ill sufferers, to assess the practices of household Caregivers in caring for terminally ill sufferers, to examine the factors affecting household Caregivers in caring for terminally ill sufferers at the Tamale Regional Hospital. The findings show that there is the need for a caregiver to be present and ready to offer help to the patients due to their inability to move. Terminally ill patients may mostly be immobile or incapable of performing basic life functions without external support. It appears from the engagement with respondents that, the latter have appreciable knowledge of the concept of palliative care and care for terminally ill patients. They understand the challenging situation of terminally ill patients and are equally aware of what constitutes care for the sufferer. Also, family caregiver showed evidence of knowledge of health workers role in palliative care. They indicated that health workers had a crucial role to play in giving palliative care to the terminally ill patient. Doctors had the responsibility of prescribing medications while nurses also educate relatives and caregivers on palliative care. More so, health workers assisted in the caring of patients by assisting caregivers to physically move patients. Caregivers who could not move their patients due to the latters weight had to be assisted by some health workers. The result also indicates health workers played a crucial role in caring for terminally ill patients, of which caregivers were aware. The study further found that the other effect of caring for terminally ill patients was financial demands. To overcome this burden, the study recommends that caregivers had to cut their expenditures and request financial support from relatives and friends as family support was also a mechanism used in coping with the burden of caring for terminally ill patients. Also, the Tamale Regional Hospital should incorporate the services of family caregivers in the care of terminally ill patients. Their competence would immensely contribute to the improvement in the health of terminally ill patients. Further, the Ministry of Health should develop policies that will lessen burden on family caregivers of patients suffering from terminal diseases.","PeriodicalId":354866,"journal":{"name":"EPH - International Journal of Science And Engineering","volume":"70 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138953036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-20DOI: 10.53555/ephijse.v9i3.219
Karthik Allam, Anjali Rodwal
In the contemporary business landscape, the proliferation of data has surged to unprecedented levels, presenting both an opportunity and a challenge for enterprises across diverse sectors. Big data analytics, powered by artificial intelligence (AI), has emerged as a transformative force, offering invaluable insights to drive strategic decision-making and foster business advancement. This paper aims to elucidate the pivotal role of AI-driven big data analytics in extracting meaningful insights from vast and complex datasets. It explores the convergence of AI technologies, machine learning algorithms, and sophisticated data analytics tools that enable organizations to harness the potential of big data. Moreover, it delves into the significance of predictive analytics, prescriptive analytics, and descriptive analytics in empowering businesses to forecast trends, optimize operations, and uncover hidden patterns. Furthermore, this paper examines the practical implications and benefits of employing AI-driven big data analytics across various industries. Case studies and real-world examples illustrate how businesses can leverage these insights to enhance customer experiences, improve operational efficiency, and gain a competitive edge in the market. Additionally, ethical considerations, data privacy concerns, and the challenges associated with implementing AI-driven big data analytics are also discussed, emphasizing the importance of responsible data usage and compliance with regulatory frameworks
{"title":"AI-DRIVEN BIG DATA ANALYTICS: UNVEILING INSIGHTS FOR BUSINESS ADVANCEMENT","authors":"Karthik Allam, Anjali Rodwal","doi":"10.53555/ephijse.v9i3.219","DOIUrl":"https://doi.org/10.53555/ephijse.v9i3.219","url":null,"abstract":"In the contemporary business landscape, the proliferation of data has surged to unprecedented levels, presenting both an opportunity and a challenge for enterprises across diverse sectors. Big data analytics, powered by artificial intelligence (AI), has emerged as a transformative force, offering invaluable insights to drive strategic decision-making and foster business advancement. This paper aims to elucidate the pivotal role of AI-driven big data analytics in extracting meaningful insights from vast and complex datasets. It explores the convergence of AI technologies, machine learning algorithms, and sophisticated data analytics tools that enable organizations to harness the potential of big data. Moreover, it delves into the significance of predictive analytics, prescriptive analytics, and descriptive analytics in empowering businesses to forecast trends, optimize operations, and uncover hidden patterns. Furthermore, this paper examines the practical implications and benefits of employing AI-driven big data analytics across various industries. Case studies and real-world examples illustrate how businesses can leverage these insights to enhance customer experiences, improve operational efficiency, and gain a competitive edge in the market. Additionally, ethical considerations, data privacy concerns, and the challenges associated with implementing AI-driven big data analytics are also discussed, emphasizing the importance of responsible data usage and compliance with regulatory frameworks","PeriodicalId":354866,"journal":{"name":"EPH - International Journal of Science And Engineering","volume":"252 22","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139170683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-19DOI: 10.53555/ephijse.v9i3.215
Guzman Erick, Fatehi Navid
The power grid stands as a critical infrastructure supporting modern society, yet it remains susceptible to cyber threatsthat could compromise its stability and functionality. Addressing the dynamic variations and evolving challenges posedby cyber threats requires robust strategies in cybersecurity. This paper investigates methods to safeguard the stability ofthe power grid against cyber intrusions and system variations. This study delves into the multifaceted nature of cyberthreats targeting the power grid and analyzes the dynamic variations within the system that could be exploited bymalicious actors. This paper presents a comprehensive framework encompassing proactive and reactive cybersecuritymeasures. Reactive measures include incident response plans, rapid recovery protocols, and the integration of machinelearning and artificial intelligence for real-time threat detection and mitigation. Moreover, considering the interconnectednature of the power grid, this study explores collaborative approaches among stakeholders, such as utility companies,government bodies, regulatory authorities, and cybersecurity experts, to foster information sharing, best practices, andstandardized protocols. Ultimately, this paper serves as a guide for policymakers, grid operators, and cybersecurityprofessionals to develop robust strategies that safeguard the stability of the power grid in the face of evolving cyberthreats and system dynamics. By implementing a holistic cybersecurity approach, the aim is to ensure resilience,reliability, and continuity in the delivery of electricity to society
{"title":"SAFEGUARDING STABILITY: STRATEGIES FOR ADDRESSING DYNAMIC SYSTEM VARIATIONS IN POWER GRID CYBERSECURITY","authors":"Guzman Erick, Fatehi Navid","doi":"10.53555/ephijse.v9i3.215","DOIUrl":"https://doi.org/10.53555/ephijse.v9i3.215","url":null,"abstract":"The power grid stands as a critical infrastructure supporting modern society, yet it remains susceptible to cyber threatsthat could compromise its stability and functionality. Addressing the dynamic variations and evolving challenges posedby cyber threats requires robust strategies in cybersecurity. This paper investigates methods to safeguard the stability ofthe power grid against cyber intrusions and system variations. This study delves into the multifaceted nature of cyberthreats targeting the power grid and analyzes the dynamic variations within the system that could be exploited bymalicious actors. This paper presents a comprehensive framework encompassing proactive and reactive cybersecuritymeasures. Reactive measures include incident response plans, rapid recovery protocols, and the integration of machinelearning and artificial intelligence for real-time threat detection and mitigation. Moreover, considering the interconnectednature of the power grid, this study explores collaborative approaches among stakeholders, such as utility companies,government bodies, regulatory authorities, and cybersecurity experts, to foster information sharing, best practices, andstandardized protocols. Ultimately, this paper serves as a guide for policymakers, grid operators, and cybersecurityprofessionals to develop robust strategies that safeguard the stability of the power grid in the face of evolving cyberthreats and system dynamics. By implementing a holistic cybersecurity approach, the aim is to ensure resilience,reliability, and continuity in the delivery of electricity to society","PeriodicalId":354866,"journal":{"name":"EPH - International Journal of Science And Engineering","volume":" 999","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138960385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-11DOI: 10.53555/ephijse.v9i3.201
Faisal Ramzan, Muawaz Ayyaz
Data Mining is a developing interdisciplinary control managing Data Reclamation and Data Stream Mining techniques, whose subject is gathering, overseeing, processing, breaking down, and visualizing the huge volume of organized or unstructured data. Data stream mining indicates how to look at Unknown patterns from a massive amount of data over algorithms. It has experienced quick improvement with significant progress in math, statistics, data science, and computer science domains. Data streams are commonly generated by various sources such as sensor networks, social media feeds, financial transactions, online retail, network traffic, and many other applications. The gathered data could be additionally utilized for various purposes, for example, execution assessment, irregularity discovery, change identification, or issue finding of the operating systems. This data stream analysis is done using different data stream mining techniques. This paper provides a broad overview of the distinct approaches used for data stream mining. Initially, we studied the different techniques of data stream mining. Next, we discuss the different clustering and classification techniques and their benefits. Then we examine the evaluation of different data stream mining techniques results that some techniques are feasible for real-time data streams and some of not. This study provides a complete understanding of techniques and their benefits. The studies done so far need to be sufficiently exhaustive for data mining techniques, so future work is needed to assess which technique is feasible for real-time data streams.
{"title":"A COMPREHENSIVE REVIEW ON DATA STREAM MINING TECHNIQUES FOR DATA CLASSIFICATION; AND FUTURE TRENDS","authors":"Faisal Ramzan, Muawaz Ayyaz","doi":"10.53555/ephijse.v9i3.201","DOIUrl":"https://doi.org/10.53555/ephijse.v9i3.201","url":null,"abstract":"Data Mining is a developing interdisciplinary control managing Data Reclamation and Data Stream Mining techniques, whose subject is gathering, overseeing, processing, breaking down, and visualizing the huge volume of organized or unstructured data. Data stream mining indicates how to look at Unknown patterns from a massive amount of data over algorithms. It has experienced quick improvement with significant progress in math, statistics, data science, and computer science domains. Data streams are commonly generated by various sources such as sensor networks, social media feeds, financial transactions, online retail, network traffic, and many other applications. The gathered data could be additionally utilized for various purposes, for example, execution assessment, irregularity discovery, change identification, or issue finding of the operating systems. This data stream analysis is done using different data stream mining techniques. This paper provides a broad overview of the distinct approaches used for data stream mining. Initially, we studied the different techniques of data stream mining. Next, we discuss the different clustering and classification techniques and their benefits. Then we examine the evaluation of different data stream mining techniques results that some techniques are feasible for real-time data streams and some of not. This study provides a complete understanding of techniques and their benefits. The studies done so far need to be sufficiently exhaustive for data mining techniques, so future work is needed to assess which technique is feasible for real-time data streams.","PeriodicalId":354866,"journal":{"name":"EPH - International Journal of Science And Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134550297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-22DOI: 10.53555/ephijse.v9i1.196
William A. Mendoza Ware, M. Ware, Prof. Dr. Shahid A. Shaheen
We report here our observance of superconductivity in compounds derived from the quaternary intermetallic superconductor YNi2B2C by partial substitutions for Ni. Other 3d transition metals T Î {Ti, V, Cr, Mn, Fe, Co, Cu, Zn} were used in replacement fractions x = 0.05 and x = 0.10. AC magnetic susceptibility cAC showed all except T = Zn had the characteristic diamagnetic response seen in superconductors. DC SQUID magnetometry on several samples confirmed type II superconducting behavior. X-ray diffraction showed a crystal structure similar to the parent compound for all but Zn. Some of the x = 0.10 compounds appeared to have minor secondary phases present despite annealing.
{"title":"SUPERCONDUCTIVITY IN THE QUATERNARY INTERMETALLIC COMPOUND YNI2-XTXB2C","authors":"William A. Mendoza Ware, M. Ware, Prof. Dr. Shahid A. Shaheen","doi":"10.53555/ephijse.v9i1.196","DOIUrl":"https://doi.org/10.53555/ephijse.v9i1.196","url":null,"abstract":"We report here our observance of superconductivity in compounds derived from the quaternary intermetallic superconductor YNi2B2C by partial substitutions for Ni. Other 3d transition metals T Î {Ti, V, Cr, Mn, Fe, Co, Cu, Zn} were used in replacement fractions x = 0.05 and x = 0.10. AC magnetic susceptibility cAC showed all except T = Zn had the characteristic diamagnetic response seen in superconductors. DC SQUID magnetometry on several samples confirmed type II superconducting behavior. X-ray diffraction showed a crystal structure similar to the parent compound for all but Zn. Some of the x = 0.10 compounds appeared to have minor secondary phases present despite annealing.","PeriodicalId":354866,"journal":{"name":"EPH - International Journal of Science And Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127947843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-18DOI: 10.53555/ephijse.v9i1.194
Mohammed Faisal Alrashdi
The principle proposed in this paper is to give some solutions of Lcm(u, n) = 0 mod m and de- termine the number of ring homomorphisms from Zn to Zm as additive groups and as rings by using elementary results of number theory. We also introduce and investigate some properties of the class of ring homomorphisms from Zn to Zm.
{"title":"ON RING HOMOMORPHISMS AND SOME PROPERTIES AMONG INTEGER RINGS","authors":"Mohammed Faisal Alrashdi","doi":"10.53555/ephijse.v9i1.194","DOIUrl":"https://doi.org/10.53555/ephijse.v9i1.194","url":null,"abstract":"The principle proposed in this paper is to give some solutions of Lcm(u, n) = 0 mod m and de- termine the number of ring homomorphisms from Zn to Zm as additive groups and as rings by using elementary results of number theory. We also introduce and investigate some properties of the class of ring homomorphisms from Zn to Zm.","PeriodicalId":354866,"journal":{"name":"EPH - International Journal of Science And Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123018744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-18DOI: 10.53555/ephse.v9i2.1877
Dr. Md. Tarek Hossain, Md. Merajul Islam, Md Imranul Islam, N. Yeasmin
This paper is prepared to present on practical survey on the economic impact of rural electrification in offshore area. This survey was performed in “Titarchwar” under Alfadanga subzonal office, Faridpur PBS. This work is based on comparative studies of primary data and information’s of the socio-economic conditions of pre and post rural electrification in these backward rural areas. The information used in this report has collected from various sources such as REB annual report, PBS annual report, questionnaires survey and the practical information during the survey. These paper focus on presentation of inhabitant of offshore areas aspect, illustration of findings and our sole recommendation based on the outcomes and concluding remarks of our survey. From our practical experience, observation, and discussion with core inhabitants of these remote areas, we found out the actual scenario of socio-economic impact on rural electrification such like of backward population in our country.
{"title":"SOCIO-ECONOMIC IMPACT OF RURAL ELECTRIFICATION IN OFFSHORE AREAS IN BANGLADESH: A CASE STUDY OF “TITARCHWAR” IN ALFADANGA UPAZILLA UNDER FARIDPUR PBS","authors":"Dr. Md. Tarek Hossain, Md. Merajul Islam, Md Imranul Islam, N. Yeasmin","doi":"10.53555/ephse.v9i2.1877","DOIUrl":"https://doi.org/10.53555/ephse.v9i2.1877","url":null,"abstract":"This paper is prepared to present on practical survey on the economic impact of rural electrification in offshore area. This survey was performed in “Titarchwar” under Alfadanga subzonal office, Faridpur PBS. This work is based on comparative studies of primary data and information’s of the socio-economic conditions of pre and post rural electrification in these backward rural areas. The information used in this report has collected from various sources such as REB annual report, PBS annual report, questionnaires survey and the practical information during the survey. These paper focus on presentation of inhabitant of offshore areas aspect, illustration of findings and our sole recommendation based on the outcomes and concluding remarks of our survey. From our practical experience, observation, and discussion with core inhabitants of these remote areas, we found out the actual scenario of socio-economic impact on rural electrification such like of backward population in our country.","PeriodicalId":354866,"journal":{"name":"EPH - International Journal of Science And Engineering","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129230937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-18DOI: 10.53555/ephse.v8i8.1903
Hajah T. Sueno, Brenda M Balala
This tracer study determined the employment status of Bachelor of Computer Science (BSCS) Graduates of Notre Dame of Marbel University (NDMU) from 1994 - 2019. It also assessed the relevance of BSCS curricula, knowledge, skills, and work values acquired by the graduates relevant to their employment; identify the personal and professional characteristics and job placement of Computer Science graduates and the school-related factors associated with their employment. The findings of the study served as the basis for the researcher to improve, update or enhance the curricula of the BSCS program to make this more responsive to the needs of fast-changing technology. 111 survey participants were gainfully employed; the majority held professional, technical, or supervisory positions; they obtained their first jobs in less than a year; they stayed in their first jobs for more than a year; the main reasons they changed jobs were career challenges, salaries, and benefits. The respondents found that the critical thinking, interpersonal communication, and problem-solving abilities acquired by BSCS graduates were extremely helpful in their current jobs. The respondents considered the work-related values they learned in the university's value formations to be extremely helpful to their current employment. It is strongly recommended that the graduating students before graduation must be given ample time to experience pre-employment examinations and interviews. Faculty development training must be given to the faculty members teaching core subjects.
{"title":"GRADUATES’ EMPLOYABILITY AND SKILLS ACQUISITION: TRACER STUDY OF BSCS GRADUATES OF NOTRE DAME OF MARBEL UNIVERSITY FROM 1994 – 2019 FOR CURRICULUM ENHANCEMENT","authors":"Hajah T. Sueno, Brenda M Balala","doi":"10.53555/ephse.v8i8.1903","DOIUrl":"https://doi.org/10.53555/ephse.v8i8.1903","url":null,"abstract":"This tracer study determined the employment status of Bachelor of Computer Science (BSCS) Graduates of Notre Dame of Marbel University (NDMU) from 1994 - 2019. It also assessed the relevance of BSCS curricula, knowledge, skills, and work values acquired by the graduates relevant to their employment; identify the personal and professional characteristics and job placement of Computer Science graduates and the school-related factors associated with their employment. The findings of the study served as the basis for the researcher to improve, update or enhance the curricula of the BSCS program to make this more responsive to the needs of fast-changing technology. 111 survey participants were gainfully employed; the majority held professional, technical, or supervisory positions; they obtained their first jobs in less than a year; they stayed in their first jobs for more than a year; the main reasons they changed jobs were career challenges, salaries, and benefits. The respondents found that the critical thinking, interpersonal communication, and problem-solving abilities acquired by BSCS graduates were extremely helpful in their current jobs. The respondents considered the work-related values they learned in the university's value formations to be extremely helpful to their current employment. It is strongly recommended that the graduating students before graduation must be given ample time to experience pre-employment examinations and interviews. Faculty development training must be given to the faculty members teaching core subjects.","PeriodicalId":354866,"journal":{"name":"EPH - International Journal of Science And Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126469747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-18DOI: 10.53555/ephse.v8i8.1902
Hajah T. Sueno, Christian Lloyd Amar, John Ronelo Menasalvas, Aaron Jake Candido, Cuburt Balanon
To prevent the coronavirus from spreading, the government adopted measures such as wearing a face mask in public locations. The researchers aimed to create a face detection system using the MobilenetV2 architecture that would identify a person’s faces and determine whether they were wearing a face mask. The built model will help to reduce the danger of viral transmission. In this study, face mask detection is achieved using a machine learning algorithm and the classification method using MobileNetV2. The steps for building the model are data gathering, data pre-processing, splitting the data, testing the model, and implementing the model. The built model can distinguish between those who are wearing a face mask (with no design patterns) and those who are not wearing it with a 96% accuracy. In terms of classification accuracy, the proposed model using MobileNetV2 outperformed the other models LeNet-5, AlexNet, and ResNet-50. If the detected person is labeled with “no mask”, the system generates an alarm sound. This research will be useful in combating virus spread and avoiding virus contact.
{"title":"ENHANCED REAL-TIME DETECTION OF FACE MASK WITH ALARM SYSTEM USING MOBILENETV2","authors":"Hajah T. Sueno, Christian Lloyd Amar, John Ronelo Menasalvas, Aaron Jake Candido, Cuburt Balanon","doi":"10.53555/ephse.v8i8.1902","DOIUrl":"https://doi.org/10.53555/ephse.v8i8.1902","url":null,"abstract":"To prevent the coronavirus from spreading, the government adopted measures such as wearing a face mask in public locations. The researchers aimed to create a face detection system using the MobilenetV2 architecture that would identify a person’s faces and determine whether they were wearing a face mask. The built model will help to reduce the danger of viral transmission. In this study, face mask detection is achieved using a machine learning algorithm and the classification method using MobileNetV2. The steps for building the model are data gathering, data pre-processing, splitting the data, testing the model, and implementing the model. The built model can distinguish between those who are wearing a face mask (with no design patterns) and those who are not wearing it with a 96% accuracy. In terms of classification accuracy, the proposed model using MobileNetV2 outperformed the other models LeNet-5, AlexNet, and ResNet-50. If the detected person is labeled with “no mask”, the system generates an alarm sound. This research will be useful in combating virus spread and avoiding virus contact.","PeriodicalId":354866,"journal":{"name":"EPH - International Journal of Science And Engineering","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127205056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-27DOI: 10.53555/ephijse.v7i4.185
R. Galstyan Sargsyan
MOOC, “Massive Open Online Course” is a term coined in 2008 by George Siemens and Stephen Downes after carrying out the online course CCK08 (Fini, 2009) that succeeded a number of previously successful OOCs (Fini et al., 2008). They have emerged, challenging existing methods and approaches and were developed from the traditions of distance and self-access learning. Their structure was inspired by the philosophy of connectivism, and the implementation requires conceptual changes in perspective from both “facilitators” (tutors) and learners.
MOOC,即“大规模在线开放课程”,是George Siemens和Stephen Downes在2008年推出CCK08在线课程(Fini, 2009)后创造的一个术语,该课程继承了之前许多成功的开放式课程(Fini et al., 2008)。它们的出现挑战了现有的方法和途径,并从远程和自主学习的传统中发展而来。它们的结构受到联结主义哲学的启发,实施需要“促进者”(导师)和学习者双方的观念转变。
{"title":"MASSIVE ONLINE COURSES (MOOCS) AND THEIR ROLE IN THE DIGITALIZED ERA","authors":"R. Galstyan Sargsyan","doi":"10.53555/ephijse.v7i4.185","DOIUrl":"https://doi.org/10.53555/ephijse.v7i4.185","url":null,"abstract":"MOOC, “Massive Open Online Course” is a term coined in 2008 by George Siemens and Stephen Downes after carrying out the online course CCK08 (Fini, 2009) that succeeded a number of previously successful OOCs (Fini et al., 2008). They have emerged, challenging existing methods and approaches and were developed from the traditions of distance and self-access learning. Their structure was inspired by the philosophy of connectivism, and the implementation requires conceptual changes in perspective from both “facilitators” (tutors) and learners.","PeriodicalId":354866,"journal":{"name":"EPH - International Journal of Science And Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114591845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}