Search results for: common regulative package
3347 Pedagogical Content Knowledge for Nature of Science: In Search for a Meaning for the Construct
Authors: Elaosi Vhurumuku
Abstract:
During the past twenty years, there has been an increased interest by science educators in researching and developing teachers’ pedagogical content knowledge for teaching the nature of science (PCKNOS). While there has been this surge in interest in the idea of PCKNOS, there has not been a common understanding among NOS researchers as to how exactly the PCKNOS concept should be construed. In this paper, we analyse and evaluate published accredited journal articles on PCKNOS research. We also draw from our teaching experiences. The major points of foci are the researchers’ presentations of SMKNOS and their centres of attention regarding the elements of PCKNOS. Our content, cluster analysis, and evaluation of the studies on PCKNOS reveal that most researchers have presented SMKNOS in the form of a heuristic or a set of heuristics (targeted NOS ideas) to be mastered by teachers or learners. Furthermore, we found that most of the researchers’ attention has been on developing and recommending teacher pedagogical practices for teaching NOS. From this, we synthesize and propose a subject knowledge content structure and a pedagogical approach that we believe is relevant and appropriate for secondary school and science teacher education if the goal of science education for scientific literacy is to be achieved. The justification of our arguments is rooted in tracing and unpacking the origins and meaning of pedagogical content knowledge (PCK). From our analysis, synthesis, and evaluation, as well as teaching experiences, we distil and construct a meaning for the PCKNOS construct.Keywords: pedagogical content knowledge, teaching, nature of science, construct, subject matter knowledge
Procedia PDF Downloads 973346 Vision-Based Collision Avoidance for Unmanned Aerial Vehicles by Recurrent Neural Networks
Authors: Yao-Hong Tsai
Abstract:
Due to the sensor technology, video surveillance has become the main way for security control in every big city in the world. Surveillance is usually used by governments for intelligence gathering, the prevention of crime, the protection of a process, person, group or object, or the investigation of crime. Many surveillance systems based on computer vision technology have been developed in recent years. Moving target tracking is the most common task for Unmanned Aerial Vehicle (UAV) to find and track objects of interest in mobile aerial surveillance for civilian applications. The paper is focused on vision-based collision avoidance for UAVs by recurrent neural networks. First, images from cameras on UAV were fused based on deep convolutional neural network. Then, a recurrent neural network was constructed to obtain high-level image features for object tracking and extracting low-level image features for noise reducing. The system distributed the calculation of the whole system to local and cloud platform to efficiently perform object detection, tracking and collision avoidance based on multiple UAVs. The experiments on several challenging datasets showed that the proposed algorithm outperforms the state-of-the-art methods.Keywords: unmanned aerial vehicle, object tracking, deep learning, collision avoidance
Procedia PDF Downloads 1603345 History of Radical Politics in Sabon Birni District of Sokoto, 1950-1983
Authors: Jamilu Adamu
Abstract:
Radical political activities among the people of Northern Nigeria and Sabon Birni, in particular from the formation of the Northern Element Progressive Union (NEPU) and Northern People Congress (NPC) in the last decade of colonial rule, led to the dramatic spread of radical ideas that were expressed through party politics. The above two parties were said to be more prominent in each of the movements throughout the period covered by this study. The NEPU and NPC were said to have opposed one another in an attempt to establish their political control in the area. What is apparent about the nature of the opposition is that the earlier NEPU and People Redemption Party (PRP) emerged from the idea of liberating the common man (Talakawa) against all forms of oppression, thereby rejecting a contrary idea of supporting the native elites and their colonial collaborators as envisaged in the ideology of the later NPC and National Party of Nigeria (NPN). This laid the ground for ideological confrontation between the supporters of the two opposing wings all over the northern emirates and the Sabon Birni district in particular. The study used a qualitative method of data collection. This study examines the historical developments of radical party politics among the Gobirawa people of the Sabon Birni District of Sokoto. It also investigates the factors that inspired opposition politics among the Gobirawa people of Sabon Birni. These were analyses side-by-side with the role of the traditional leaders in the area in suppressing the activities of the opposition party.Keywords: NEPU, NPC, radical politics, Sabon-Birni District
Procedia PDF Downloads 1023344 Steel Bridge Coating Inspection Using Image Processing with Neural Network Approach
Authors: Ahmed Elbeheri, Tarek Zayed
Abstract:
Steel bridges deterioration has been one of the problems in North America for the last years. Steel bridges deterioration mainly attributed to the difficult weather conditions. Steel bridges suffer fatigue cracks and corrosion, which necessitate immediate inspection. Visual inspection is the most common technique for steel bridges inspection, but it depends on the inspector experience, conditions, and work environment. So many Non-destructive Evaluation (NDE) models have been developed use Non-destructive technologies to be more accurate, reliable and non-human dependent. Non-destructive techniques such as The Eddy Current Method, The Radiographic Method (RT), Ultra-Sonic Method (UT), Infra-red thermography and Laser technology have been used. Digital Image processing will be used for Corrosion detection as an Alternative for visual inspection. Different models had used grey-level and colored digital image for processing. However, color image proved to be better as it uses the color of the rust to distinguish it from the different backgrounds. The detection of the rust is an important process as it’s the first warning for the corrosion and a sign of coating erosion. To decide which is the steel element to be repainted and how urgent it is the percentage of rust should be calculated. In this paper, an image processing approach will be developed to detect corrosion and its severity. Two models were developed 1st to detect rust and 2nd to detect rust percentage.Keywords: steel bridge, bridge inspection, steel corrosion, image processing
Procedia PDF Downloads 3063343 Recent Trend in Gluten-Free Bakery Products
Authors: Madhuresh Dwivedi, Navneet Singh Deora, H. N. Mishra
Abstract:
In the context of bakery products, the gluten component of wheat has a crucial role in stabilizing the gas-cell and crumb structures, appearance, mouth feel and maintaining the rheological properties, thus the acceptability of these products. However, because of coeliac disease, some individuals cannot tolerate the protein gliadin present in the gluten fraction of wheat flour. Also termed as gluten-sensitive enteropathy, it is a common chronicle disorder in populations throughout the world with average prevalence of 0.37%. The safest way for celiac sufferers is to stay away from gluten-containing foods such as wheat, rye, barley as well as durum wheat, spelt wheat, and triticale. Thus, in view of the current increasing incidence of gluten intolerant sufferers (due to improved diagnostic procedures), the development of gluten-free cereal-based bakery products suitable for celiac patients represents a challenging and serious task, but also very demanding call for food technologists as well as for the bakers. The use of alternative cereal starches (like rice, soy, maize, potato and so on), gums, hydrocolloids, dietary fibres, alternative protein sources, prebiotics and combinations of them represent the most widespread approach used as replacement to mimic gluten in the manufacture of industrial processable gluten-free bakery products due to their structure-building and water binding properties.Keywords: gluten-free, coeliac disease, alternative flour, hydrocolloid, crumb structure
Procedia PDF Downloads 2773342 Electromyography Controlled Robotic Toys for Autistic Children
Authors: Uvais Qidwai, Mohamed Shakir
Abstract:
This paper presents an initial study related to the use of robotic toys as teaching and therapeutic aid tools for teachers and care-givers as well as parents of children with various levels of autism spectrum disorder (ASD). Some of the most common features related to the behavior of a child with ASD are his/her social isolation, living in their own world, not being physically active, and not willing to learn new things. While the teachers, parents, and all other related care-givers do their best to improve the condition of these kids, it is usually quite an uphill task. However, one remarkable observation that has been reported by several teachers dealing with ASD children is the fact that the same children do get attracted to toys with lights and sounds. Hence, this project targets the development/modifications of such existing toys into appropriate behavior training tools which the care-givers can use as they would desire. Initially, the remote control is in hand of the trainer, but after some time, the child is entrusted with the control of the robotic toy to test for the level of interest. It has been found during the course of this study that children with quite low learning activity got extremely interested in the robot and even advanced to controlling the robot with the Electromyography (EMG). It has been observed that the children did show some hesitation in the beginning 5 minutes of the very first sessions of such interaction but were very comfortable afterwards which has been considered as a very strong indicator of the potential of this technique in teaching and rehabilitation of children with ASD or similar brain disorders.Keywords: Autism Spectrum Disorder (ASD), robotic toys, IR control, electromyography, LabVIEW based remote control
Procedia PDF Downloads 4443341 Tumor-Biological Characteristics of Invasive Lobular Carcinoma
Authors: Sabine Danzinger, Nora Hielscher, Miriam Izso, Johanna Metzler, Carmen Trinkl, Christian Pfeifer, Kristina Tendl-Schulz, Christian F. Singer
Abstract:
The objective of this study is to analyze the characteristics of invasive lobular carcinoma (ILC) compared with invasive ductal carcinoma (IDC) and to investigate the impact of histology on axillary lymph node (ALN) involvement in luminal A subtype tumors. Methods: We retrospectively analyzed patients diagnosed with ILC or IDC from 2012 to 2016 who underwent surgery. Patients constituted 493 primary early breast cancer cases (82 ILC; 411 IDC). Results: Compared with IDC, ILC tumors were significantly more likely to be grade 2, estrogen receptor- (ER) positive (þ), have a lower proliferation rate (Ki67 <14%), and a higher patholog- ical T stage (pT2–4). The luminal A subtype was significantly more common in ILC compared with IDC. In a multivariate regression model, grade 2, ERþ, progesterone receptor-positive, pT2, and pT3 were significantly associated with ILC. Additionally, with the luminal A subtype, ALN involvement (pathological node stage (pN)1–3) was significantly more frequent with ILC versus IDC. Conclusions: Our data suggests that grade 2, positive hormone receptor status, and higher pathological T stage are associated with ILC. With the luminal A subtype, ALN involvement was more frequent with ILC versus IDC.Keywords: breast cancer, lobular histology, tumor biology, hormone receptor, ki67
Procedia PDF Downloads 93340 Characteristics of Patients Undergoing Subclavian Artery Revascularization in Latvia: A Retrospective Analysis
Authors: Majid Shahbazi
Abstract:
Subclavian artery stenosis (SAS) is a common vascular disease that can cause a range of symptoms, from arm fatigue and weakness to ischemic stroke. Revascularization procedures, such as percutaneous transluminal angioplasty and stenting, are widely used to treat SAS and improve blood flow to the affected arm. However, the optimal management of patients with SAS is still unclear, and further research is needed to evaluate the safety and efficacy of different treatment options. This study aims to investigate the characteristics of patients with SAS who underwent revascularization procedures in Latvia (Specifically RAKUS). The research part of this paper aims to describe and analyze the demographics, comorbidities, diagnostic methods, types of revascularization procedures, and antiaggregant therapy used. The goal of this study is to provide insights into the current clinical practice in Latvia and help future treatment decision-makers. To achieve this aim, a retrospective study of 76 patients with SAS who underwent revascularization procedures was performed. After statistical analysis of the data, the study provided insights into the characteristics and management of patients with SAS in Latvia, highlighting the most observed comorbidities in these patients, the preferred diagnostic methods, and the most performed procedures. These findings can inform clinical decision-making and may have implications for the management of patients with subclavian artery stenosis in Latvia.Keywords: subclavian artery stenosis, revascularization, characteristics of patients, comorbidities, retrospective analysis
Procedia PDF Downloads 953339 Efficient Principal Components Estimation of Large Factor Models
Authors: Rachida Ouysse
Abstract:
This paper proposes a constrained principal components (CnPC) estimator for efficient estimation of large-dimensional factor models when errors are cross sectionally correlated and the number of cross-sections (N) may be larger than the number of observations (T). Although principal components (PC) method is consistent for any path of the panel dimensions, it is inefficient as the errors are treated to be homoskedastic and uncorrelated. The new CnPC exploits the assumption of bounded cross-sectional dependence, which defines Chamberlain and Rothschild’s (1983) approximate factor structure, as an explicit constraint and solves a constrained PC problem. The CnPC method is computationally equivalent to the PC method applied to a regularized form of the data covariance matrix. Unlike maximum likelihood type methods, the CnPC method does not require inverting a large covariance matrix and thus is valid for panels with N ≥ T. The paper derives a convergence rate and an asymptotic normality result for the CnPC estimators of the common factors. We provide feasible estimators and show in a simulation study that they are more accurate than the PC estimator, especially for panels with N larger than T, and the generalized PC type estimators, especially for panels with N almost as large as T.Keywords: high dimensionality, unknown factors, principal components, cross-sectional correlation, shrinkage regression, regularization, pseudo-out-of-sample forecasting
Procedia PDF Downloads 1503338 Ridership Study for the Proposed Installation of Automatic Guide-way Transit (AGT) System along Sapphire Street in Balanga City, Bataan
Authors: Nelson Andres, Meeko C. Masangcap, John Denver D. Catapang
Abstract:
Balanga City as, the heart of Bataan, is a growing City and is now at its fast pace of development. The growth of commerce in the city results to an increase in commuters who travel back and forth through the city, leading to congestions. Consequently, queuing of vehicles along national roads and even in the highways of the city have become a regular occurrence. This common scenario of commuters flocking the city, private and public vehicles going bumper to bumper, especially during the rush hours, greatly affect the flow of traffic vehicles and is now a burden not only to the commuters but also to the government who is trying to address this dilemma. Seeing these terrible events, the implementation of an elevated Automated Guide-way transit is seen as a possible solution to help in the decongestion of the affected parts of Balanga City.In response to the problem, the researchers identify if it is feasible to have an elevated guide-way transit in the vicinity of Sapphire Street in Balanga City, Bataan. Specifically, the study aims to determine who will be the riders based on the demographic profile, where the trip can be generated and distributed, the time when volume of people usually peaks and the estimated volume of passengers. Statistical analysis is applied to the data gathered to find out if there is an important relationship between the demographic profile of the respondents and their preference of having an elevated railway transit in the City of Balanga.Keywords: ridership, AGT, railway, elevated track
Procedia PDF Downloads 823337 Ethics in the Production of Chinese Reality TV
Authors: Tianyu Zhang
Abstract:
China has become one of the markets with the biggest potential for UK exporters, but it remains difficult for outsiders to explore Chinese media’s inner workings due to a lack of access. Having worked in Chinese media, the author conducted six month’s participant-observation in China Central Television (CCTV) and three independent production companies. This paper mainly explores how TV production ethics were implemented in the casting process of three Chinese reality shows that are well-known within the country. The three production teams had issues in common: unorganised management, subjective casting standards and lack of production ethics. Casting directors, who were multitasking, could only rely on their professional experience and ad-hoc demands from the management. More concerning phenomena such as borderline corruption, passive-aggressiveness, and blame cultures were prevalent during the entire production, especially during casting. The casting process also often involved the celebrity status of the many ‘ordinary’ participants who were not that ‘ordinary’ as they claimed. Many of these participants were professional talents who were not famous enough but worked as many other well-known celebrities who had their own employees. On the other hand, as comprehensive production and ethics guidelines were missing, junior television practitioners struggled between their ideal professional standards and real-life events that fell into grey areas – telling white lies, bribery, shifting blame, and lack of employee training. Although facing challenges, many practitioners came up with self-management solutions and worked with positivity.Keywords: production studies, ethics, television production, ethnography, reality TV, Chinese TV
Procedia PDF Downloads 803336 Analysis of Influence of Geometrical Set of Nozzles on Aerodynamic Drag Level of a Hero’s Based Steam Turbine
Authors: Mateusz Paszko, Miroslaw Wendeker, Adam Majczak
Abstract:
High temperature waste energy offers a number of management options. The most common energy recuperation systems, that are actually used to utilize energy from the high temperature sources are steam turbines working in a high pressure and temperature closed cycles. Due to the high costs of production of energy recuperation systems, especially rotary turbine discs equipped with blades, currently used solutions are limited in use with waste energy sources of temperature below 100 °C. This study presents the results of simulating the flow of the water vapor in various configurations of flow ducts in a reaction steam turbine based on Hero’s steam turbine. The simulation was performed using a numerical model and the ANSYS Fluent software. Simulation computations were conducted with use of the water vapor as an internal agent powering the turbine, which is fully safe for an environment in case of a device failure. The conclusions resulting from the conducted numerical computations should allow for optimization of the flow ducts geometries, in order to achieve the greatest possible efficiency of the turbine. It is expected that the obtained results should be useful for further works related to the development of the final version of a low drag steam turbine dedicated for low cost energy recuperation systems.Keywords: energy recuperation, CFD analysis, waste energy, steam turbine
Procedia PDF Downloads 2103335 Parameter Measurement Systems to Evaluate Performance of Archers
Authors: Muhammad Zikril Hakim Md. Azizi, Norhafizan Ahmad, Raja Ariffin Raja Ghazilla
Abstract:
Postural stability, attention level of the archer and particularly the vibrations of the bow itself plays a prominent role in determining the athletes performance. Many techniques and systems had been developing to monitor the parameters of the archers during training. In Malaysia, archery coaches tend to use non-scientific ways that they are familiar with, to evaluate archer performance. An approach that provides more affordable yet accurate systems to the masses and relatively easy system deployment procedure need to be proposed. Hence, this project will address to fulfil the needs. Three area of the archer parameter were included for data monitoring sensors. Attention level can be measured using EEG sensor, centre of mass linked to the postural stability can be measured by foot pressure sensor, and the bow vibrations in three axis will be relayed by the vibrations sensors placed directly on the bow using wireless sensors. Arduino based microcontroller used to relay all the data back to the interfacing systems. Interface systems will be using Python language and C++ framework for user interface and hardware interfacing systems. All sensor data can be observed in real time using the in-house applications, and each sessions can be saved to common files so that coach and the team can have a further discussion and comparisons.Keywords: archery, graphical user interface, microcontroller, wireless sensor, monitoring system
Procedia PDF Downloads 2993334 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang
Abstract:
One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.Keywords: malware detection, network security, targeted attack, computational intelligence
Procedia PDF Downloads 2633333 Seismic Behavior of Pile-Supported Bridges Considering Soil-Structure Interaction and Structural Non-Linearity
Authors: Muhammad Tariq A. Chaudhary
Abstract:
Soil-structure interaction (SSI) in bridges under seismic excitation is a complex phenomenon which involves coupling between the non-linear behavior of bridge pier columns and SSI in the soil-foundation part. It is a common practice in the study of SSI to model the bridge piers as linear elastic while treating the soil and foundation with a non-linear or an equivalent linear modeling approach. Consequently, the contribution of soil and foundation to the SSI phenomenon is disproportionately highlighted. The present study considered non-linear behavior of bridge piers in FEM model of a 4-span, pile-supported bridge that was designed for five different soil conditions in a moderate seismic zone. The FEM model of the bridge system was subjected to a suite of 21 actual ground motions representative of three levels of earthquake hazard (i.e. Design Basis Earthquake, Functional Evaluation Earthquake and Maximum Considered Earthquake). Results of the FEM analysis were used to delineate the influence of pier column non-linearity and SSI on critical design parameters of the bridge system. It was found that pier column non-linearity influenced the bridge lateral displacement and base shear more than SSI for majority of the analysis cases for the class of bridge investigated in the study.Keywords: bridge, FEM model, reinforced concrete pier, pile foundation, seismic loading, soil-structure interaction
Procedia PDF Downloads 2323332 Investigation of the Effects of Processing Parameters on Pla Based 3D Printed Tensile Samples
Authors: Saifullah Karimullah
Abstract:
Additive manufacturing techniques are becoming more common with the latest technological advancements. It is composed to bring a revolution in the way products are designed, planned, manufactured, and distributed to end users. Fused deposition modeling (FDM) based 3D printing is one of those promising aspects that have revolutionized the prototyping processes. The purpose of this design and study project is to design a customized laboratory-scale FDM-based 3D printer from locally available sources. The primary goal is to design and fabricate the FDM-based 3D printer. After the fabrication, a tensile test specimen would be designed in Solid Works or [Creo computer-aided design (CAD)] software. A .stl file is generated of the tensile test specimen through slicing software and the G-codes are inserted via a computer for the test specimen to be printed. Different parameters were under studies like printing speed, layer thickness and infill density of the printed object. Some parameters were kept constant such as temperature, extrusion rate, raster orientation etc. Different tensile test specimens were printed for a different sets of parameters of the FDM-based 3d printer. The tensile test specimen were subjected to tensile tests using a universal testing machine (UTM). Design Expert software has been used for analyses, So Different results were obtained from the different tensile test specimens. The best, average and worst specimen were also observed under a compound microscope to investigate the layer bonding in between.Keywords: additive manufacturing techniques, 3D printing, CAD software, UTM machine
Procedia PDF Downloads 1033331 Disaster Mitigation from an Analysis of a Condemned Building Erected over Collapsible Clay Soil in Brazil
Authors: Marcelo Jesus Kato Avila, Joao Da Costa Pantoja
Abstract:
Differential settlement of foundations is a serious pathology in buildings that put at risk lives and property. A common reason for the occurrence of this specific pathology in central Brazil is the presence of collapsible clay, a typical soil in the region. In this study, the foundation of a condemned building erected above this soil is analyzed. The aim is to prevent problems in new constructions, to predict which buildings may be subjected to damages, and to make possible a more precise treatment in less advanced differential settlements observed in the buildings of the vicinity, which includes a hospital, a Military School, an indoor sporting arena, the Police Academy, and the Military Police Headquarters. The methodology consists of visual inspection, photographic report of the main pathologies, analysis of the existing foundations, determination of the soil properties, the study of the cracking level and assessment of structural failure risk of the building. The findings show that the presence of water weaken the soil structure on which the foundation rest, being the main cause of the pathologic settlement, indicating that even in a one store building it was necessary to consider deeper digging, other categories of foundations, and more elaborated and detailed foundation plans when the soil presents this behavior.Keywords: building cracks, collapsible clay, differential settlement, structural failure risk
Procedia PDF Downloads 2553330 The impact of Breast Cancer Polymorphism on Breast Cancer
Authors: Roudabeh Vakil Monfared, Farhad Mashayekhi
Abstract:
Breast cancer is the most common malignancy type among women with about 1 million new cases each year. The immune system plays an important role in the breast cancer development. OX40L (also known as TNFSF4), a membrane protein, which is a member of the tumor necrosis factor super family binds to its receptor OX40 and this co-stimulation has a crucial role in T-cell proliferation, survival and cytokine release. Due to the importance of the T-cells in anti-tumor activities of OX40L we studied the association of rs3850641 (T→C) polymorphism of OX40L gene with breast cancer. The study included 123 women with breast cancer and 126 healthy volunteers with no signs of cancer. Genomic DNA was extracted from blood leucocytes. Genotype and allele frequencies were determined in patients and control cases with the method of polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) and the analysis was performed by Med Calc. The prevalence of genotype frequencies of TT, CT and CC were 60.9%, 30.08% and 8.9 % in patients with breast cancer and 74.6 %, 18.25 % and 7.14 % in healthy volunteers while the T and C allelic frequency was 76.01% and 23.98 % in patients and 83.73% and 16.26% in healthy controls. Respectively Statistical analysis has shown no significant difference from the comparison of either genotype (P=0.06). According to these results, the rs3850641 SNP has no association with the susceptibility of breast cancer in a population in northern Iran. However, further studies in larger populations including other genetic and environmental factors are required to achieve conclusion.Keywords: OX40L, gene, polymorphism, breast cancer
Procedia PDF Downloads 5353329 Isolation and Antifungal Susceptibility Pattern of Candida albicans from Endocervical and High Vaginal Swabs of Pregnant Women Attending State Specialist Hospital Gombe, Nigeria
Authors: Isa Shu’aibu, A. A. Mu’inat, F. U. Maigari, M. A. Mani
Abstract:
Candida albicans is the common cause of both oral and vaginal candidiasis in humans. This candidiasis leads to a wide range of physical, psychological and even physiological problems in humans particularly pregnant women. Samples of endocervical and high vaginal swab were collected from 200 women attending Gombe Specialist Hospital and inoculated on Saboraud Dextrose Agar (SDA) incorporated with chloramphenicol to get rid of the unwanted bacterial contaminants. Gram staining technique and germ tube test were employed for the identification, as Candida albicans is positive for both. Gram positive samples were 70% (n=140) and were further subjected to germ tube test. The remaining 30% (n=60) were found to be Gram negative. 90% (n=126) of the Gram positive ones isolated were also found to be positive for germ tube test; confirming the presence of Candida albicans. Antifungal susceptibility testing revealed that members of Imidazole (Ketoconazole, Miconazole) and those of Triazoles (Fluconazole and Itraconazole) were found to be more effective at concentrations of 20, 50 and 100 µg/disc compared to Griseofulvin (Fulcin) with only 26.00 mm zone of inhibition at 100 µg/disc concentration.Keywords: Candida albicans, candidiasis, endocervical, vaginal swab, antifungal susceptibility, imidazole, triazoles
Procedia PDF Downloads 3323328 Supply Chain Resilience Triangle: The Study and Development of a Framework
Authors: M. Bevilacqua, F. E. Ciarapica, G. Marcucci
Abstract:
Supply Chain Resilience has been broadly studied during the last decade, focusing the research on many aspects of Supply Chain performance. Consequently, different definitions of Supply Chain Resilience have been developed by the research community, drawing inspiration also from other fields of study such as ecology, sociology, psychology, economy et al. This way, the definitions so far developed in the extant literature are therefore very heterogeneous, and many authors have pointed out a lack of consensus in this field of analysis. The aim of this research is to find common points between these definitions, through the development of a framework of study: the Resilience Triangle. The Resilience Triangle is a tool developed in the field of civil engineering, with the objective of modeling the loss of resilience of a given structure during and after the occurrence of a disruption such as an earthquake. The Resilience Triangle is a simple yet powerful tool: in our opinion, it can summarize all the features that authors have captured in the Supply Chain Resilience definitions over the years. This research intends to recapitulate within this framework all these heterogeneities in Supply Chain Resilience research. After collecting a various number of Supply Chain Resilience definitions present in the extant literature, the methodology approach provides a taxonomy step with the scope of collecting and analyzing all the data gathered. The next step provides the comparison of the data obtained with the plotting of a disruption profile, in order to contextualize the Resilience Triangle in the Supply Chain context. The tool and the results developed in this research will allow to lay the foundation for future Supply Chain Resilience modeling and measurement work.Keywords: supply chain resilience, resilience definition, supply chain resilience triangle
Procedia PDF Downloads 3183327 Field Production Data Collection, Analysis and Reporting Using Automated System
Authors: Amir AlAmeeri, Mohamed Ibrahim
Abstract:
Various data points are constantly being measured in the production system, and due to the nature of the wells, these data points, such as pressure, temperature, water cut, etc.., fluctuations are constant, which requires high frequency monitoring and collection. It is a very difficult task to analyze these parameters manually using spreadsheets and email. An automated system greatly enhances efficiency, reduce errors, the need for constant emails which take up disk space, and frees up time for the operator to perform other critical tasks. Various production data is being recorded in an oil field, and this huge volume of data can be seen as irrelevant to some, especially when viewed on its own with no context. In order to fully utilize all this information, it needs to be properly collected, verified and stored in one common place and analyzed for surveillance and monitoring purposes. This paper describes how data is recorded by different parties and departments in the field, and verified numerous times as it is being loaded into a repository. Once it is loaded, a final check is done before being entered into a production monitoring system. Once all this is collected, various calculations are performed to report allocated production. Calculated production data is used to report field production automatically. It is also used to monitor well and surface facility performance. Engineers can use this for their studies and analyses to ensure field is performing as it should be, predict and forecast production, and monitor any changes in wells that could affect field performance.Keywords: automation, oil production, Cheleken, exploration and production (E&P), Caspian Sea, allocation, forecast
Procedia PDF Downloads 1563326 Analysis of Spatial Disparities of Population for Delicate Configuration of Public Service Facilities:Case of Gongshu District, Hangzhou, China
Authors: Ruan Yi-Chen, Li Wang-Ming, Fang Yuan
Abstract:
With the rapid growth of urbanization in China in recent years, public services are in short supply because of expanding population and limitation of financial support, which makes delicate configuration of public service facilities to become a trend in urban planning. Besides, the facility configuration standard implemented in China is equal to the whole the urban area without considering internal differences in it. Therefore, this article focuses on population Spatial disparities analysis in order to optimize facility configuration in communities of main city district. The used data, including population of 93 communities during 2010 to 2015, comes from GongShu district, Hangzhou city, PRC. Through the analysis of population data, especially the age structure of those communities, the communities finally divided into 3 types. Obviously, urban public service facilities allocation situation directly affect the quality of residents common lives, which turns out that deferent kinds of communities with deferent groups of citizens will have divergences in facility demanding. So in the end of the article, strategies of facility configuration will be proposed based on the population analysis in order to optimize the quantity and location of facilities with delicacy.Keywords: delicacy, facility configuration, population spatial disparities, urban area
Procedia PDF Downloads 3883325 Secured Cancer Care and Cloud Services in Internet of Things /Wireless Sensor Network Based Medical Systems
Authors: Adeniyi Onasanya, Maher Elshakankiri
Abstract:
In recent years, the Internet of Things (IoT) has constituted a driving force of modern technological advancement, and it has become increasingly common as its impacts are seen in a variety of application domains, including healthcare. IoT is characterized by the interconnectivity of smart sensors, objects, devices, data, and applications. With the unprecedented use of IoT in industrial, commercial and domestic, it becomes very imperative to harness the benefits and functionalities associated with the IoT technology in (re)assessing the provision and positioning of healthcare to ensure efficient and improved healthcare delivery. In this research, we are focusing on two important services in healthcare systems, which are cancer care services and business analytics/cloud services. These services incorporate the implementation of an IoT that provides solution and framework for analyzing health data gathered from IoT through various sensor networks and other smart devices in order to improve healthcare delivery and to help health care providers in their decision-making process for enhanced and efficient cancer treatment. In addition, we discuss the wireless sensor network (WSN), WSN routing and data transmission in the healthcare environment. Finally, some operational challenges and security issues with IoT-based healthcare system are discussed.Keywords: IoT, smart health care system, business analytics, (wireless) sensor network, cancer care services, cloud services
Procedia PDF Downloads 1773324 Formulation of a Stress Management Program for Human Error Prevention in Nuclear Power Plants
Authors: Hyeon-Kyo Lim, Tong-il Jang, Yong-Hee Lee
Abstract:
As for any nuclear power plant, human error is one of the most dreaded factors that may result in unexpected accidents. Thus, for accident prevention, it is quite indispensable to analyze and to manage the influence of any factor which may raise the possibility of human errors. Among lots factors, stress has been reported to have significant influence on human performance. Stress level of a person may fluctuate over time. To handle the possibility over time, robust stress management program is required, especially in nuclear power plants. Therefore, to overcome the possibility of human errors, this study aimed to develop a stress management program as a part of Fitness-for-Duty (FFD) Program for the workers in nuclear power plants. The meaning of FFD might be somewhat different by research objectives, appropriate definition of FFD was accomplished in this study with special reference to human error prevention, and diverse stress factors were elicited for management of human error susceptibility. In addition, with consideration of conventional FFD management programs, appropriate tests and interventions were introduced over the whole employment cycle including selection and screening of workers, job allocation, job rotation, and disemployment as well as Employee-Assistance-Program (EAP). The results showed that most tools mainly concentrated their weights on common organizational factors such as Demands, Supports, and Relationships in sequence, which were referred as major stress factors.Keywords: human error, accident prevention, work performance, stress, fatigue
Procedia PDF Downloads 3263323 Armed Groups and Intra State Conflict: A Study on the Egyptian Case
Authors: Ghzlan Mahmoud Abdel Aziz
Abstract:
This case study aims to identify the intrastate conflicts between the nation state and armed groups. Nowadays, most wars weaken states against armed groups. Thus, it is very important to negotiate with such groups in order to reinforce the law for the protection of victims. These armed groups are the cause of conflicts and they are related with many of humanitarian issues that result out of conflicts. In this age of rivalry; terrorists, insurgents, or transnational criminal parties have surfaced to the top as a reaction to these armed groups in an effort to set up a new world order. Moreover, the intra state conflicts became increasingly treacherous than the interstate conflicts, particularly when nation state systems deal with armed groups which try to influence the state. The unexpected upraising of the Arab Spring during 2011 in parts of the Middle East and North Africa formed various patterns of conflicts. The events of the Arab Spring resulted in current and long term change across the region. Significant modifications in the level, strength and period of armed conflict around the world have been made. Egypt was in the center of these events. It has fought back the armed groups under the name of terrorism and spread common disorder and violence among civilians. On this note, this study focuses on the problem of the transformation in the methods of organized violence within one state rather than between two state or more and analyzes the objectives, strategies, and internal composition of armed groups and the environments that foster them, with a focus on the Egyptian case.Keywords: armed groups, conflicts, Egyptian armed forces, intrastate conflicts
Procedia PDF Downloads 4593322 Allergy to Animal Hair in the Algerian Population
Authors: Meriche Hacene, Gadiri Sabiha
Abstract:
Introduction: Allergy to animal hair is hypersensitivity to animal appendages to look for in front of any rhinoconjunctivitis or asthma. An anamnesis associated with the prick-tests makes it possible to guide the diagnosis, which will be supplemented in case of doubt by specific immunoglobulin E (IgE) assays. The objective of our study is to study the characteristics of patients sensitized to animal hair. Patients and methods: Retrospective study conducted on 105 adult patients and 69 children over a period of 3 years, including patients who received a specific IgE assay (respiratory panel and pediatric panel) by immunodot method. Result: 105 adult patients, including 74 women and 31 men, with an average age of 41 years, of which 8.5% had sensitization to animal hair (5 men and 4 women), namely: cat (5%), horse (4.7%) and dog (3.8%). For the 69 children, a slight female predominance was noted (56%), with an average age of 7.5 years, of which (13%) are sensitized to animal hair (5 girls and 4 boys): cat (10%), while awareness of dog and horse hair was less frequent with an identical prevalence of (4.34%). The dominant symptoms are rhinorrhea and sneezing for both categories, respectively (40% and 26.6% in adults and 23% for both symptoms in children). Cross-sensitization was observed in the 2 series: 1 single cat-dog and cat-horse case and 2 dog-horse cases in adults. In children 100% of patients with sensitization to dog hair had cross-sensitization to cat hair, only 1 case was observed for cat-horse cross-reactivity. Conclusion: This work shows that allergy to animal hair is common. Studies on more representative samples are recommended.Keywords: children, allegy to animals, specific Ig E, hypersensitivity
Procedia PDF Downloads 693321 Association Between Hip Internal and External Rotation Range of Motion and Low Back Pain in Table Tennis Players
Authors: Kaili Wang, Botao Zhang, Enming Zhang
Abstract:
Background: Low back pain (LBP) is a common problem affecting athletes' training and competition. Although the association between a limited hip range of motion and prevalence of low back pain has been studied extensively, it has not been studied in table tennis. Aim: The main purposes of this study in table tennis players were (1) to investigate if there is a difference in hip internal rotation (HIR) and external rotation (HER) range of motion (ROM) between players with LBP and players without LBP and (2) to analyze the association between HIR and HER ROM and LBP. Methods: Forty-six table tennis players from the Chinese table tennis team were evaluated for passive maximum HIR and HER ROM. LBP was retrospectively recorded for the last 12 months before the date of ROM assessment by a physical therapist. The data were analyzed the difference in HIR and HER ROM between players with LBP and players without LBP by Mann-Whitney U test, and the association between the difference in HIR and HER ROM and LBP was analyzed via a binary logistic regression. Results: The 54% of players had developed LBP during the retrospective study period. Significant difference between LBP group and the asymptomatic group for HIR ROM (z=4.007, p<0.001) was observed. Difference between LBP group and asymptomatic group for HER ROM (z=1.117, p=0.264) was not significant. Players who had HIR ROM deficit had an increased risk of LBP compared with players without HIR ROM deficit (OR=5.344, 95%CI: 1.006-28.395, P=0.049). Conclusion: HIR ROM of a table tennis player with LBP was less than a table tennis player without LBP. Compared with player whose HIR ROM was normal, player who had HIR ROM deficit appeared to have a higher risk for LBP.Keywords: assessment, injury prevention, low back pain, table tennis players
Procedia PDF Downloads 1113320 The Underground Ecosystem of Credit Card Frauds
Authors: Abhinav Singh
Abstract:
Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem
Procedia PDF Downloads 4393319 Influence of Pulverized Granite on the Mechanical and Durability Properties of Concrete
Authors: Kwabena A. Boakye, Eugene Atiemo, Trinity A. Tagbor, Delali Adjei
Abstract:
The use of mineral admixtures such as metakaolin, GGBS, fly ash, etc., in concrete is a common practice in the world. However, the only admixture available for use in the Ghanaian construction industry is calcined clay pozzolan. This research, therefore, studies the alternate use of granite dust, a by-product from stone quarrying, as a mineral admixture in concrete. Granite dust, which is usually damped as waste or as an erosion control material, was collected and pulverized to about 75µm. Some physical, chemical, and mineralogical tests were conducted on the granite dust. 5%-25% ordinary Portland cement of Class 42.5N was replaced with granite dust which was used as the main binder in the preparation of 150mm×150mm×150mm concrete cubes according to methods prescribed by BS EN 12390-2:2000. Properties such as workability, compressive strength, flexural strength, water absorption, and durability were determined. Compressive and flexural strength results indicate that granite dust could be used to replace ordinary Portland cement up to an optimum of 15% to achieve C25. Water permeability increased as the granite dust admixture content increased from 5% - 25%. Durability studies after 90 days proved that even though strength decreased as granite dust content increased, the concrete containing granite dust had better resistance to sulphate attack comparable to the reference cement. Pulverized granite can be used to partially replace ordinary Portland cement in concrete.Keywords: admixture, granite dust, permeability, pozzolans
Procedia PDF Downloads 1593318 The Cytomegalovirus Infection among Iranian Kidney Graft Recipients
Authors: Zakieh Rostamzadeh , Nariman Sepehrvand-Zahra Shirmohamadi
Abstract:
Background: Cytomegalovirus (CMV) infection is one of the most common infectious problems following kidney transplantation. In this study, we are aimed to investigate the CMV infection in the setting of renal transplant recipients in Urmia-Iran, using both ELISA and polymerase chain reaction (PCR) methods. Methods: Ninety-six renal transplant recipients were selected randomly and enrolled in a cross-sectional study. Blood sampling was done via venipuncture, and all sera were investigated for anti-CMV IgM, and the seropositive cases in association with 14 randomly selected seronegative cases were investigated with PCR assay. Results: Thirty-three patients (34.3%) were seropositive for anti-CMV IgM, 3 patients (3.1%) were in borderline range, and 60 patients (62.5%) were seronegative. By considering the patients with borderline anti-CMV IgM levels as seropositive, 37.5% were seropositive for anti-CMV IgM. Among 36 seropositive cases, the CMV infection was confirmed in 19 (52.7%) of them using PCR. Age (P = 0.40), educational status (P = 0.77), history of pre-transplantation dialysis (0.52), history of blood transfusion (P = 0.52), and immunosuppressive regimen were not statistically different among recipients with positive versus negative CMV PCR study results. Conclusion: The seroprevalence of CMV infection was demonstrated to be high in renal transplant recipients of Urmia-Iran. The rate was higher compared to several previous reports in the literature. ELISA method has an appropriate sensitivity to screen the recipients for CMV infection but considering its relatively low specificity, the seropositive cases are better to be confirmed by further PCR study.Keywords: cytomegalovirus, renal transplantation, ELISA, IgM, PCR
Procedia PDF Downloads 303