Search results for: soft decision fusion
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5294

Search results for: soft decision fusion

2234 Dissecting ESG: The Impact of Environmental, Social, and Governance Factors on Stock Price Risk in European Markets

Authors: Sylwia Frydrych, Jörg Prokop, Michał Buszko

Abstract:

This study investigates the complex relationship between corporate ESG (Environmental, Social, Governance) performance and stock price risk within the European market context. By analyzing a dataset of 435 companies across 19 European countries, the research assesses the impact of both combined ESG performance and its individual components on various risk measures, including volatility, idiosyncratic risk, systematic risk, and downside risk. The findings reveal that while overall ESG scores do not significantly influence stock price risk, disaggregating the ESG components uncovers significant relationships. Governance practices are shown to consistently reduce market risk, positioning them as critical in risk management. However, environmental engagement tends to increase risk, particularly in times of regulatory shifts like those introduced in the EU post-2018. This research provides valuable insights for investors and corporate managers on the nuanced roles of ESG factors in financial risk, emphasizing the need for careful consideration of each ESG pillar in decision-making processes.

Keywords: ESG performance, ESG factors, ESG pillars, ESG scores

Procedia PDF Downloads 14
2233 An Application to Predict the Best Study Path for Information Technology Students in Learning Institutes

Authors: L. S. Chathurika

Abstract:

Early prediction of student performance is an important factor to be gained academic excellence. Whatever the study stream in secondary education, students lay the foundation for higher studies during the first year of their degree or diploma program in Sri Lanka. The information technology (IT) field has certain improvements in the education domain by selecting specialization areas to show the talents and skills of students. These specializations can be software engineering, network administration, database administration, multimedia design, etc. After completing the first-year, students attempt to select the best path by considering numerous factors. The purpose of this experiment is to predict the best study path using machine learning algorithms. Five classification algorithms: decision tree, support vector machine, artificial neural network, Naïve Bayes, and logistic regression are selected and tested. The support vector machine obtained the highest accuracy, 82.4%. Then affecting features are recognized to select the best study path.

Keywords: algorithm, classification, evaluation, features, testing, training

Procedia PDF Downloads 118
2232 Analytic Hierarchy Process Method for Supplier Selection Considering Green Logistics: Case Study of Aluminum Production Sector

Authors: H. Erbiyik, A. Bal, M. Sirakaya, Ö. Yesildal, E. Yolcu

Abstract:

The emergence of many environmental issues began with the Industrial Revolution. The depletion of natural resources and emerging environmental challenges over time requires enterprises and managers to take into consideration environmental factors while managing business. If we take notice of these causes; the design and implementation of environmentally friendly green purchasing, production and waste management systems become very important at green logistics systems. Companies can adopt green supply chain with the awareness of these facts. The concept of green supply chain constitutes from green purchasing, green production, green logistics, waste management and reverse logistics. In this study, we wanted to identify the concept of green supply chain and why green supply chain should be applied. In the practice part of the study an analytic hierarchy process (AHP) study is conducted on an aluminum production company to evaluate suppliers.

Keywords: aluminum sector, analytic hierarchy process, decision making, green logistics

Procedia PDF Downloads 346
2231 Association of the Frequency of the Dairy Products Consumption by Students and Health Parameters

Authors: Radyah Ivan, Khanferyan Roman

Abstract:

Milk and dairy products are an important component of a balanced diet. Dairy products represent a heterogeneous food group of solid, semi-solid and liquid, fermented or non-fermented foods, each differing in nutrients such as fat and micronutrient content. Deficiency of milk and dairy products contributes a impact on the main health parameters of the various age groups of the population. The goal of this study was to analyze of the frequency of the consumption of milk and various groups of dairy products by students and its association with their body mass index (BMI), body composition and other physiological parameters. 388 full-time students of the Medical Institute of RUDN University (185 male and 203 female, average age was 20.4+2.2 and 21.9+1.7 y.o., respectively) took part in the cross-sectional study. Anthropometric measurements, estimation of BMI and body composition were analyzed by bioelectrical impedance analysis. The frequency of consumption of the milk and various groups of dairy products was studied using a modified questionnaire on the frequency of consumption of products. Due to the questionnaire data on the frequency of consumption of the diary products, it have been demonstrated that only 11% of respondents consume milk daily, 5% - cottage cheese, 4% and 1% - fermented natural and with fillers milk products, respectively, hard cheese -4%. The study demonstrated that about 16% of the respondents did not consume milk at all over the past month, about one third - cottage cheese, 22% - natural sour-milk products and 18% - sour-milk products with various fillers. hard cheeses and pickled cheeses didn’t consume 9% and 26% of respondents, respectively. We demonstrated the gender differences in the characteristics of consumer preferences were revealed. Thus female students are less likely to use cream, sour cream, soft cheese, milk comparing to male students. Among female students the prevalence of persons with overweight was higher (25%) than among male students (19%). A modest inverse relationship was demonstrated between daily milk intake, BMI, body composition parameters and diary products consumption (r=-0.61 and r=-0.65). The study showed daily insufficient milk and dairy products consumption by students and due to this it have been demonstrated the relationship between the low and rare consumption of diary products and main parameters of indicators of physical activity and health indicators.

Keywords: frequency of consumption, milk, dairy products, physical development, nutrition, body mass index.

Procedia PDF Downloads 26
2230 Microbial Pathogens Associated with Banded Sugar Ants (Camponotus consobrinus) in Calabar, Nigeria

Authors: Ofonime Ogba, Augustine Akpan

Abstract:

Objectives and Goals: The study was aimed at determining pathogenic microbial carriage on the external body parts of Camponotus consobrinus which is also known as the banded sugar ant because of its liking for sugar and sweet food. The level of pathogenic microbial carriage of Camponotus consobrinus in association to the environment in which they have been collected is not known. Methods: The ants were purposively collected from four locations including the kitchens, bedroom of various homes, food shops, and bakeries. The sample collection took place within the hours of 6:30 pm to 11:00 pm. The ants were trapped in transparent plastic containers of which sugar, pineapple peels, sugar cane and soft drinks were used as bait. The ants were removed with a sterile spatula and put in 10mls of peptone water in sterile universal bottles. The containers were vigorously shaken to wash the external surface of the ant. It was left overnight and transported to the Microbiology Laboratory, University of Calabar Teaching Hospital for analysis. The overnight peptone broths were inoculated on Chocolate agar, Blood agar, Cystine Lactose Electrolyte-Deficient agar (CLED) and Sabouraud dextrose agar. Incubation was done aerobically and in a carbon dioxide jar for 24 to 48 hours at 37°C. Isolates were identified based on colonial characteristics, Gram staining, and biochemical tests. Results: Out of the 250 Camponotus consobrinus caught for the study, 90(36.0%) were caught in the kitchen, 75(30.0%) in the bedrooms 40(16.0%) in the bakery while 45(18.0%) were caught in the shops. A total of 82.0% prevalence of different microbial isolates was associated with the ants. The kitchen had the highest number of isolates 75(36.6%) followed by the bedroom 55(26.8%) while the bakery recorded the lowest number of isolates 35(17.1%). The profile of micro-organisms associated with Camponotus consobrinus was Escherichia coli 73(30.0%), Morganella morganii 45(18.0%), Candida species 25(10.0%), Serratia marcescens 10(4.0%) and Citrobacter freundii 10(4.0%). Conclusion: Most of the Camponotus consobrinus examined in the four locations harboured potential pathogens. The presence of ants in homes and shops can facilitate the propagation and spread of pathogenic microorganisms. Therefore, the development of basic preventive measures and the control of ants must be taken seriously.

Keywords: Camponotus consobrinus, potential pathogens, microbial isolates, spread

Procedia PDF Downloads 162
2229 Escaping Domestic Violence in Time of Conflict: The Ways Female Refugees Decide to Flee

Authors: Zofia Wlodarczyk

Abstract:

I study the experiences of domestic violence survivors who flee their countries of origin in times of political conflict using insight and evidence from forty-five biographical interviews with female Chechen refugees and twelve refugee resettlement professionals in Poland. Both refugees and women are often described as having less agency—that is, they lack the power to decide to migrate – refugees less than economic migrants and women less than men. In this paper, I focus on how female refugees who have been victims of domestic violence make decisions about leaving their countries of origin during times of political conflict. I use several existing migration theories to trace how the migration experience of these women is shaped by dynamics at different levels of society: the macro level, the meso level and the micro level. At the macro level of analysis, I find that political conflict can be both a source of and an escape from domestic violence. Ongoing conflict can strengthen the patriarchal cultural norms, increase violence and constrain women’s choices when it comes to marriage. However, political conflict can also destabilize families and make pathways for women to escape. At the meso level I demonstrate that other political migrants and institutions that emerge due to politically triggered migration can guide those fleeing domestic violence. Finally, at the micro level, I show that family dynamics often force domestic abuse survivors to make their decision to escape alone or with the support of only the most trusted female relatives. Taken together, my analyses show that we cannot look solely at one level of society when describing decision-making processes of women fleeing domestic violence. Conflict-related micro, meso and macro forces interact with and influence each other: on the one hand, strengthening an abusive trap, and on the other hand, opening a door to escape. This study builds upon several theoretical and empirical debates. First, it expands theories of migration by incorporating both refugee and gender perspectives. Few social scientists have used the migration theory framework to discuss the unique circumstances of refugee flows. Those who have mainly focus on “political” migrants, a designation that frequently fails to account for gender, does not incorporate individuals fleeing gender-based violence, including domestic-violence victims. The study also enriches migration scholarship, typically focused on the US and Western-European context, with research from Eastern Europe and Caucasus. Moreover, it contributes to the literature on the changing roles of gender in the context of migration. I argue that understanding how gender roles and hierarchies influence the pre-migration stage of female refugees is crucial, as it may have implications for policy-making efforts in host countries that recognize the asylum claims of those fleeing domestic violence. This study also engages in debates about asylum and refugee law. Domestic violence is normatively and often legally considered an individual-level problem whereas political persecution is recognized as a structural or societal level issue. My study challenges these notions by showing how the migration triggered by domestic violence is closely intertwined with politically motivated refuge.

Keywords: AGENCY, DOMESTIC VIOLENCE, FEMALE REFUGEES, POLITICAL REFUGE, SOCIAL NETWORKS

Procedia PDF Downloads 165
2228 Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network

Authors: Hilya Mudrika Arini, Nur Aini Masruroh, Budi Hartono

Abstract:

There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%.

Keywords: Bayesian network, decision analysis, national security system, text mining

Procedia PDF Downloads 386
2227 Integrated Environmental Management System and Environmental Impact Assessment in Evaluation of Environmental Protective Action

Authors: Moustafa Osman

Abstract:

The paper describes and analyses different good practice examples of protective levels, and initiatives actions (“framework conditions”) and encourages the uptake of environmental management systems (EMSs) to small and medium-sized enterprises (SMEs). Most of industries tend to take EMS as tools leading towards sustainability planning. The application of these tools has numerous environmental obligations that neither suggests decision nor recommends what a company should achieve ultimately. These set up clearly defined criteria to evaluate environmental protective action (EEPA) into sustainability indicators. The physical integration will evaluate how to incorporate traditional knowledge into baseline information, preparing impact prediction, and planning mitigation measures in monitoring conditions. Thereby efforts between the government, industry and community led protective action to concern with present needs for future generations, meeting the goal of sustainable development. The paper discusses how to set out distinct aspects of sustainable indicators and reflects inputs, outputs, and modes of impact on the environment.

Keywords: environmental management, sustainability, indicators, protective action

Procedia PDF Downloads 431
2226 Analysis of Critical Success Factors for Implementing Industry 4.0 and Circular Economy to Enhance Food Traceability

Authors: Mahsa Pishdar

Abstract:

Food traceability through the supply chain is facing increased demand. IoT and blockchain are among the tools under consideration in the Industry 4.0 era that could be integrated to help implementation of the Circular Economy (CE) principles while enhancing food traceability solutions. However, such tools need intellectual system, and infrastructureto be settled as guidance through the way, helping overcoming obstacles. That is why the critical success factors for implementing Industry 4.0 and circular economy principles in food traceability concept are analyzed in this paper by combination of interval type 2 fuzzy Worst Best Method and Measurement Alternatives and Ranking according to Compromise Solution (Interval Type 2 fuzzy WBM-MARCOS). Results indicate that “Knowledge of Industry 4.0 obligations and CE principle” is the most important factor that is the basis of success following by “Management commitment and support”. This will assist decision makers to seize success in gaining a competitive advantage while reducing costs through the supply chain.

Keywords: food traceability, industry 4.0, internet of things, block chain, best worst method, marcos

Procedia PDF Downloads 198
2225 A Resilience-Based Approach for Assessing Social Vulnerability in New Zealand's Coastal Areas

Authors: Javad Jozaei, Rob G. Bell, Paula Blackett, Scott A. Stephens

Abstract:

In the last few decades, Social Vulnerability Assessment (SVA) has been a favoured means in evaluating the susceptibility of social systems to drivers of change, including climate change and natural disasters. However, the application of SVA to inform responsive and practical strategies to deal with uncertain climate change impacts has always been challenging, and typically agencies resort back to conventional risk/vulnerability assessment. These challenges include complex nature of social vulnerability concepts which influence its applicability, complications in identifying and measuring social vulnerability determinants, the transitory social dynamics in a changing environment, and unpredictability of the scenarios of change that impacts the regime of vulnerability (including contention of when these impacts might emerge). Research suggests that the conventional quantitative approaches in SVA could not appropriately address these problems; hence, the outcomes could potentially be misleading and not fit for addressing the ongoing uncertain rise in risk. The second phase of New Zealand’s Resilience to Nature’s Challenges (RNC2) is developing a forward-looking vulnerability assessment framework and methodology that informs the decision-making and policy development in dealing with the changing coastal systems and accounts for complex dynamics of New Zealand’s coastal systems (including socio-economic, environmental and cultural). Also, RNC2 requires the new methodology to consider plausible drivers of incremental and unknowable changes, create mechanisms to enhance social and community resilience; and fits the New Zealand’s multi-layer governance system. This paper aims to analyse the conventional approaches and methodologies in SVA and offer recommendations for more responsive approaches that inform adaptive decision-making and policy development in practice. The research adopts a qualitative research design to examine different aspects of the conventional SVA processes, and the methods to achieve the research objectives include a systematic review of the literature and case study methods. We found that the conventional quantitative, reductionist and deterministic mindset in the SVA processes -with a focus the impacts of rapid stressors (i.e. tsunamis, floods)- show some deficiencies to account for complex dynamics of social-ecological systems (SES), and the uncertain, long-term impacts of incremental drivers. The paper will focus on addressing the links between resilience and vulnerability; and suggests how resilience theory and its underpinning notions such as the adaptive cycle, panarchy, and system transformability could address these issues, therefore, influence the perception of vulnerability regime and its assessment processes. In this regard, it will be argued that how a shift of paradigm from ‘specific resilience’, which focuses on adaptive capacity associated with the notion of ‘bouncing back’, to ‘general resilience’, which accounts for system transformability, regime shift, ‘bouncing forward’, can deliver more effective strategies in an era characterised by ongoing change and deep uncertainty.

Keywords: complexity, social vulnerability, resilience, transformation, uncertain risks

Procedia PDF Downloads 92
2224 Criteria Analysis of Residential Location Preferences: An Urban Dwellers’ Perspective

Authors: Arati Siddharth Petkar, Joel E. M. Macwan

Abstract:

Preferences for residential location are of a diverse nature. Primarily they are based on the socio-economic, socio-cultural, socio-demographic characteristics of the household. It also depends on character, and the growth potential of different areas in a city. In the present study, various criteria affecting residential location preferences from the Urban Dwellers’ perspective have been analyzed. The household survey has been conducted in two parts: Existing Buyers’ survey and Future Buyers’ survey. The analysis reveals that workplace location is the most governing criterion in deciding residential location from the majority of the urban dwellers perspective. For analyzing the importance of varied criteria, Analytical Hierarchy Process approach has been explored. The suggested approach will be helpful for urban planners, decision makers and developers, while designating a new residential area or redeveloping an existing one.

Keywords: analytical hierarchy process (AHP), household, preferences, residential location preferences, residential land use, urban dwellers

Procedia PDF Downloads 203
2223 A Predictive Machine Learning Model of the Survival of Female-led and Co-Led Small and Medium Enterprises in the UK

Authors: Mais Khader, Xingjie Wei

Abstract:

This research sheds light on female entrepreneurs by providing new insights on the survival predictions of companies led by females in the UK. This study aims to build a predictive machine learning model of the survival of female-led & co-led small & medium enterprises (SMEs) in the UK over the period 2000-2020. The predictive model built utilised a combination of financial and non-financial features related to both companies and their directors to predict SMEs' survival. These features were studied in terms of their contribution to the resultant predictive model. Five machine learning models are used in the modelling: Decision tree, AdaBoost, Naïve Bayes, Logistic regression and SVM. The AdaBoost model had the highest performance of the five models, with an accuracy of 73% and an AUC of 80%. The results show high feature importance in predicting companies' survival for company size, management experience, financial performance, industry, region, and females' percentage in management.

Keywords: company survival, entrepreneurship, females, machine learning, SMEs

Procedia PDF Downloads 94
2222 An Auxiliary Technique for Coronary Heart Disease Prediction by Analyzing Electrocardiogram Based on ResNet and Bi-Long Short-Term Memory

Authors: Yang Zhang, Jian He

Abstract:

Heart disease is one of the leading causes of death in the world, and coronary heart disease (CHD) is one of the major heart diseases. Electrocardiogram (ECG) is widely used in the detection of heart diseases, but the traditional manual method for CHD prediction by analyzing ECG requires lots of professional knowledge for doctors. This paper introduces sliding window and continuous wavelet transform (CWT) to transform ECG signals into images, and then ResNet and Bi-LSTM are introduced to build the ECG feature extraction network (namely ECGNet). At last, an auxiliary system for coronary heart disease prediction was developed based on modified ResNet18 and Bi-LSTM, and the public ECG dataset of CHD from MIMIC-3 was used to train and test the system. The experimental results show that the accuracy of the method is 83%, and the F1-score is 83%. Compared with the available methods for CHD prediction based on ECG, such as kNN, decision tree, VGGNet, etc., this method not only improves the prediction accuracy but also could avoid the degradation phenomenon of the deep learning network.

Keywords: Bi-LSTM, CHD, ECG, ResNet, sliding window

Procedia PDF Downloads 82
2221 Migrant and Population Health, Two Sides of a Coin: A Descriptive Study

Authors: A. Sottomayor, M. Perez Duque, M. C. Henriques

Abstract:

Introduction: Migration is not a new phenomenon; nomads often traveled, seeking better living conditions, including food and water. The increase of migrations affects all countries, rising health-related challenges. In Portugal, we have had migrant movements in the last decades, pairing with economic behavior. Irregular immigrants are detained in Santo António detention center from Portuguese Immigration and Borders Service (USHA-SEF) in Porto until court decision for a maximum of 60 days. It is the only long stay officially designated detention center for immigrants in Portugal. Immigrant health is important for public health (PH). It affects and is affected by the community. The XXVII Portuguese Government considered immigrant integration, including access to health, health promotion, protection and reduction of inequities a political priority. Many curative, psychological and legal services are provided for detainees, but until 2015, no structured health promotion or prevention actions were being held at USHA-SEF. That year, Porto Occidental PH Local Unit started to provide vaccination and health literacy on this theme for detainees and SEF workers. Our activities include a vaccine lecture, a medical consultation with vaccine prescription and administration, along with documented proof of vaccination. All vaccines are volunteer and free of charge. This action reduces the risk of importation and transmission of diseases, contributing to world eradication and elimination programs. We aimed to characterize the demography of irregular immigrant detained at UHSA-SEF and describe our activity. Methods: All data was provided by Porto Occidental Public Health Unit. All paper registers of vaccination were uploaded to MicrosoftExcel®. We included all registers and collected demographic variables, nationality, vaccination date, category, and administered vaccines. Descriptive analysis was performed using MicrosoftExcel®. Results: From 2015 to 2018, we delivered care to 256 individuals (179 immigrants; 77 workers). Considering immigrants, 72% were male, and 8 (16%) women were pregnant. 85% were between 20-54 years (ᵡ=30,8y; 2-71y), and 11 didn’t report any age. Migrants came from 48 countries, and India had the highest number (9%). MMR and Tetanus vaccines had > 90% vaccination rate and Poliomyelitis, hepatitis B and flu vaccines had around 85% vaccination rates. We had a consistent number of refusals. Conclusion: Our irregular migrant population comes from many different countries, which increases the risk of disease importation. Pregnant women are present as a particular subset of irregular migrants, and vaccination protects them and the baby. Vaccination of migrant is valuable for them and for the countries in which they pass. It contributes to universal health coverage, for eradication programmes and accomplishment of the Sustainable Development Goals. Peer influence may present as a determinant of refusals so we must consistently educate migrants before vaccination. More studies would be valuable, particularly on the migrant trajectory, duration of stay, destiny after court decision and health impact.

Keywords: migrants, public health, universal health coverage, vaccination

Procedia PDF Downloads 120
2220 Assessment of Memetic and Genetic Algorithm for a Flexible Integrated Logistics Network

Authors: E. Behmanesh, J. Pannek

Abstract:

The distribution-allocation problem is known as one of the most comprehensive strategic decision. In real-world cases, it is impossible to solve a distribution-allocation problem in traditional ways with acceptable time. Hence researchers develop efficient non-traditional techniques for the large-term operation of the whole supply chain. These techniques provide near-optimal solutions particularly for large scales test problems. This paper, presents an integrated supply chain model which is flexible in the delivery path. As the solution methodology, we apply a memetic algorithm with a novelty in population presentation. To illustrate the performance of the proposed memetic algorithm, LINGO optimization software serves as a comparison basis for small size problems. In large size cases that we are dealing with in the real world, the Genetic algorithm as the second metaheuristic algorithm is considered to compare the results and show the efficiency of the memetic algorithm.

Keywords: integrated logistics network, flexible path, memetic algorithm, genetic algorithm

Procedia PDF Downloads 372
2219 Optimal Placement of the Unified Power Controller to Improve the Power System Restoration

Authors: Mohammad Reza Esmaili

Abstract:

One of the most important parts of the restoration process of a power network is the synchronizing of its subsystems. In this situation, the biggest concern of the system operators will be the reduction of the standing phase angle (SPA) between the endpoints of the two islands. In this regard, the system operators perform various actions and maneuvers so that the synchronization operation of the subsystems is successfully carried out and the system finally reaches acceptable stability. The most common of these actions include load control, generation control and, in some cases, changing the network topology. Although these maneuvers are simple and common, due to the weak network and extreme load changes, the restoration will be associated with low speed. One of the best ways to control the SPA is to use FACTS devices. By applying a soft control signal, these tools can reduce the SPA between two subsystems with more speed and accuracy, and the synchronization process can be done in less time. Meanwhile, the unified power controller (UPFC), a series-parallel compensator device with the change of transmission line power and proper adjustment of the phase angle, will be the proposed option in order to realize the subject of this research. Therefore, with the optimal placement of UPFC in a power system, in addition to improving the normal conditions of the system, it is expected to be effective in reducing the SPA during power system restoration. Therefore, the presented paper provides an optimal structure to coordinate the three problems of improving the division of subsystems, reducing the SPA and optimal power flow with the aim of determining the optimal location of UPFC and optimal subsystems. The proposed objective functions in this paper include maximizing the quality of the subsystems, reducing the SPA at the endpoints of the subsystems, and reducing the losses of the power system. Since there will be a possibility of creating contradictions in the simultaneous optimization of the proposed objective functions, the structure of the proposed optimization problem is introduced as a non-linear multi-objective problem, and the Pareto optimization method is used to solve it. The innovative technique proposed to implement the optimization process of the mentioned problem is an optimization algorithm called the water cycle (WCA). To evaluate the proposed method, the IEEE 39 bus power system will be used.

Keywords: UPFC, SPA, water cycle algorithm, multi-objective problem, pareto

Procedia PDF Downloads 61
2218 WILCKO-PERIO, Periodontally Accelerated Orthodontics

Authors: Kruttika Bhuse

Abstract:

Aim: Synergism between periodontists and orthodontists (periodontal accelerated osteogenic orthodontics- PAOO) creates crucial opportunities to enhance clinical outcomes of combined therapies regarding both disciplines and has made adult orthodontics a reality. Thus, understanding the biomechanics of bone remodelling may increase the clinical applications of corticotomy facilitated orthodontics with or without alveolar augmentation. Wilckodontics can be an attractive treatment option and be a “win-win” situation for both the dental surgeon and patient by reducing the orthodontic treatment time in adults. Materials and methods: In this review, data related to the clinical aspects, steps of procedure, biomechanics of bone, indications and contraindications and final outcome of wilckodontic shall be discussed. 50 supporting articles from various international journals and 70 clinical cases were reviewed to get a better understanding to design this wilckodontic - meta analysis. Various journals like the Journal Of Clinical And Diagnostic Research, Journal Of Indian Society Of Periodontology, Journal Of Periodontology, Pubmed, Boston Orthodontic University Journal, Good Practice Orthodontics Volume 2, have been referred to attain valuable information on wilckodontics which was then compiled in this single review study. Result: As a promising adjuvant technique based on the transient nature of demineralization-remineralisation process in healthy tissues, wilckodontics consists of regional acceleratory phenomenon by alveolar corticotomy and bone grafting of labial and palatal/lingual surfaces, followed by orthodontic force. The surgical wounding of alveolar bone potentiates tissue reorganization and healing by a way of transient burst of localized hard and soft tissue remodelling.This phenomenon causes bone healing to occur 10-50 times faster than normal bone turnover. Conclusion: This meta analysis helps understanding that the biomechanics of bone remodelling may increase the clinical applications of corticotomy facilitated orthodontics with or without alveolar augmentation. The main benefits being reduced orthodontic treatment time, increased bone volume and post-orthodontic stability.

Keywords: periodontal osteogenic accelerated orthodontics, alveolar corticotomy, bone augmentation, win-win situation

Procedia PDF Downloads 383
2217 A Taxonomy of Behavior for a Medical Coordinator by Utlizing Leadership Styles

Authors: Aryana Collins Jackson, Elisabetta Bevacqua, Pierre De Loor, Ronan Querrec

Abstract:

This paper presents a taxonomy of non-technical skills, communicative intentions, and behavior for an individual acting as a medical coordinator. In medical emergency situations, a leader among the group is imperative to both patient health and team emotional and mental health. Situational Leadership is used to make clear and easy-to-follow guidelines for behavior depending on circumstantial factors. Low-level leadership behaviors belonging to two different styles, directive and supporting, are identified from literature and are included in the proposed taxonomy. The high-level information in the taxonomy consists of the necessary non-technical skills belonging to a medical coordinator: situation awareness, decision making, task management, and teamwork. Finally, communicative intentions, dimensions, and functions are included. Thus this work brings high-level and low-level information - medical non-technical skills, communication capabilities, and leadership behavior - into a single versatile taxonomy of behavior.

Keywords: human behavior, leadership styles, medical, taxonomy

Procedia PDF Downloads 151
2216 RASPE: Risk Advisory Smart System for Pipeline Projects in Egypt

Authors: Nael Y. Zabel, Maged E. Georgy, Moheeb E. Ibrahim

Abstract:

A knowledge-based expert system with the acronym RASPE is developed as an application tool to help decision makers in construction companies make informed decisions about managing risks in pipeline construction projects. Choosing to use expert systems from all available artificial intelligence techniques is due to the fact that an expert system is more suited to representing a domain’s knowledge and the reasoning behind domain-specific decisions. The knowledge-based expert system can capture the knowledge in the form of conditional rules which represent various project scenarios and potential risk mitigation/response actions. The built knowledge in RASPE is utilized through the underlying inference engine that allows the firing of rules relevant to a project scenario into consideration. This paper provides an overview of the knowledge acquisition process and goes about describing the knowledge structure which is divided up into four major modules. The paper shows one module in full detail for illustration purposes and concludes with insightful remarks.

Keywords: expert system, knowledge management, pipeline projects, risk mismanagement

Procedia PDF Downloads 308
2215 Treadmill Negotiation: The Stagnation of the Israeli – Palestinian Peace Process

Authors: Itai Kohavi, Wojciech Nowiak

Abstract:

This article explores the stagnation of the Israeli -Palestinian peace negotiation process, and the reasons behind the failure of more than 12 international initiatives to resolve the conflict. Twenty-seven top members of the Israeli national security elite (INSE) were interviewed, including heads of the negotiation teams, the National Security Council, the Mossad, and other intelligence and planning arms. The interviewees provided their insights on the Israeli challenges in reaching a sustainable and stable peace agreement and in dealing with the international pressure on Israel to negotiate a peace agreement while preventing anti-Israeli UN decisions and sanctions. The findings revealed a decision tree, with red herring deception strategies implemented to postpone the negotiation process and to delay major decisions during the negotiation process. Beyond the possible applications for the Israeli – Palestinian conflict, the findings shed more light on the phenomenon of rational deception of allies in a negotiation process, a subject less frequently researched as compared with deception of rivals.

Keywords: deception, Israeli-Palestinian conflict, negotiation, red herring, terrorist state, treadmill negotiation

Procedia PDF Downloads 298
2214 Crossroads of Care: Ethical Navigation in Faith-Based Counseling

Authors: Alexander Dolin

Abstract:

In the practice of Faith-based counseling, the clinician frequently faces multifaceted issues that come together when theological directives meet professional ethics to create a special set of dilemmas. The study narrates one working through the professional dilemmas of these Faith-based counselors, thereby looking into the tensions between the necessity of fidelity to faith and the requirements to follow the American Counseling Association Code of Ethics. Through a qualitative analysis of interviews with practitioners from various denominational backgrounds, the study has identified common ethical challenges and best practices that enable the integration of faith and ethics in practice. The findings provide insight into how faith-based counselors would reconcile a situation of conflict between religious belief and professional obligations but are striving to provide care that honors both their spiritual convictions and ethical responsibilities. This will add to existing discussions related to ethical decision-making in faith-based counseling by providing practical ways of dealing with these dilemmas in support of the counselor's professional integrity and spiritual mission.

Keywords: ethics, faith, common challenges, practical tools, counseling

Procedia PDF Downloads 13
2213 The Neuropsychology of Obsessive Compulsion Disorder

Authors: Mia Bahar, Özlem Bozkurt

Abstract:

Obsessive-compulsive disorder (OCD) is a typical, persistent, and long-lasting mental health condition in which a person experiences uncontrollable, recurrent thoughts (or "obsessions") and/or activities (or "compulsions") that they feel compelled to engage in repeatedly. Obsessive-compulsive disorder is both underdiagnosed and undertreated. It frequently manifests in a variety of medical settings and is persistent, expensive, and burdensome. Obsessive-compulsive neurosis was long believed to be a condition that offered valuable insight into the inner workings of the unconscious mind. Obsessive-compulsive disorder is now recognized as a prime example of a neuropsychiatric condition susceptible to particular pharmacotherapeutic and psychotherapy therapies and mediated by pathology in particular neural circuits. An obsessive-compulsive disorder which is called OCD, usually has two components, one cognitive and the other behavioral, although either can occur alone. Obsessions are often repetitive and intrusive thoughts that invade consciousness. These obsessions are incredibly hard to control or dismiss. People who have OCD often engage in rituals to reduce anxiety associated with intrusive thoughts. Once the ritual is formed, the person may feel extreme relief and be free from anxiety until the thoughts of contamination intrude once again. These thoughts are strengthened through a manifestation of negative reinforcement because they allow the person to avoid anxiety and obscurity. These thoughts are described as autogenous, meaning they most likely come from nowhere. These unwelcome thoughts are related to actions which we can describe as Thought Action Fusion. The thought becomes equated with an action, such as if they refuse to perform the ritual, something bad might happen, and so people perform the ritual to escape the intrusive thought. In almost all cases of OCD, the person's life gets extremely disturbed by compulsions and obsessions. Studies show OCD is an estimated 1.1% prevalence, making it a challenging issue with high co-morbidities with other issues like depressive episodes, panic disorders, and specific phobias. The first to reveal brain anomalies in OCD were numerous CT investigations, although the results were inconsistent. A few studies have focused on the orbitofrontal cortex (OFC), anterior cingulate gyrus (AC), and thalamus, structures also implicated in the pathophysiology of OCD by functional neuroimaging studies, but few have found consistent results. However, some studies have found abnormalities in the basal ganglion. There have also been some discussions that OCD might be genetic. OCD has been linked to families in studies of family aggregation, and findings from twin studies show that this relationship is somewhat influenced by genetic variables. Some Research has shown that OCD is a heritable, polygenic condition that can result from de novo harmful mutations as well as common and unusual variants. Numerous studies have also presented solid evidence in favor of a significant additive genetic component to OCD risk, with distinct OCD symptom dimensions showing both common and individual genetic risks.

Keywords: compulsions, obsessions, neuropsychiatric, genetic

Procedia PDF Downloads 63
2212 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.

Keywords: attacker, defender, game theory, information

Procedia PDF Downloads 462
2211 Improving the Analytical Power of Dynamic DEA Models, by the Consideration of the Shape of the Distribution of Inputs/Outputs Data: A Linear Piecewise Decomposition Approach

Authors: Elias K. Maragos, Petros E. Maravelakis

Abstract:

In Dynamic Data Envelopment Analysis (DDEA), which is a subfield of Data Envelopment Analysis (DEA), the productivity of Decision Making Units (DMUs) is considered in relation to time. In this case, as it is accepted by the most of the researchers, there are outputs, which are produced by a DMU to be used as inputs in a future time. Those outputs are known as intermediates. The common models, in DDEA, do not take into account the shape of the distribution of those inputs, outputs or intermediates data, assuming that the distribution of the virtual value of them does not deviate from linearity. This weakness causes the limitation of the accuracy of the analytical power of the traditional DDEA models. In this paper, the authors, using the concept of piecewise linear inputs and outputs, propose an extended DDEA model. The proposed model increases the flexibility of the traditional DDEA models and improves the measurement of the dynamic performance of DMUs.

Keywords: Dynamic Data Envelopment Analysis, DDEA, piecewise linear inputs, piecewise linear outputs

Procedia PDF Downloads 156
2210 sing Eye Tracking to Measure the Impact of Persuasion Principles in Phishing Emails

Authors: Laura Bishop, Isabel Jones, Linn Halvorsen, Angela Smith

Abstract:

Phishing emails are a form of social engineering where attackers deceive email users into revealing sensitive information or installing malware such as ransomware. Scammers often use persuasion techniques to influence email users to interact with malicious content. This study will use eye-tracking equipment to analyze how participants respond to and process Cialdini’s persuasion principles when utilized within phishing emails. Eye tracking provides insights into what is happening on the subconscious level of the brain that the participant may not be aware of. An experiment is conducted to track participant eye movements, whilst interacting with and then filing a series of persuasive emails delivered at random. Eye tracking metrics will be analyzed in relation to whether a malicious email has been identified as phishing (filed as ‘suspicious’) or not phishing (filed in any other folder). This will help determine the most influential persuasion techniques and those 'areas of interest' within an email that require intervention. The results will aid further research on how to reduce the effects of persuasion on human decision-making when interacting with phishing emails.

Keywords: cybersecurity, human-centric, phishing, psychology

Procedia PDF Downloads 73
2209 The Traveling Behavior and Needs for Tourist Support Facilities of Inbound Tourists Visiting Ratanakosin Island

Authors: Sakul Jariyachamsit

Abstract:

The objectives of this research were to study the behaviour of inbound tourist who visited Ratanakosin Island and to study their needs concerning support facilities. The independent variables included gender, age, levels of education, occupation, and income while the dependent variables were classified into two groups: tourists’ behaviour variables and tourists’ need of supporting facilities. A simple random sampling method was utilized to get 225 respondents. The majority of respondents were both male and female in the same proportion but most were between 21-30 years old. Most were married with a graduated degree. The average income of the respondents was between $20,000-30,000. The findings revealed that the majority of respondents came to Thailand for the first time and spent about 8 days in Thailand and preferred to travel in small groups. Their decision to come to Thailand was influenced by word of mouth. When they first thought of Thailand, they thought of Thai food. In terms of the needs for tourists around the Ratanakosin Island, and ranked in importance, are as follows: a tourist centre, somebody who can speak English, a trustable agency, police patrol, and the availability of maps and brochures.

Keywords: Rattanakosin Island, tourist, travelling behaviour, media engineering

Procedia PDF Downloads 354
2208 Nonlinear Response of Infinite Beams on a Multilayer Tensionless Extensible Geosynthetic – Reinforced Earth Bed under Moving Load

Authors: K. Karuppasamy

Abstract:

In this paper analysis of an infinite beam resting on multilayer tensionless extensible geosynthetic reinforced granular fill - poor soil system overlying soft soil strata under moving the load with constant velocity is presented. The beam is subjected to a concentrated load moving with constant velocity. The upper reinforced granular bed is modeled by a rough membrane embedded in Pasternak shear layer overlying a series of compressible nonlinear Winkler springs representing the underlying the very poor soil. The multilayer tensionless extensible geosynthetic layer has been assumed to deform such that at the interface the geosynthetic and the soil have some deformation. Nonlinear behavior of granular fill and the very poor soil has been considered in the analysis by means of hyperbolic constitutive relationships. Governing differential equations of the soil foundation system have been obtained and solved with the help of appropriate boundary conditions. The solution has been obtained by employing finite difference method by means of Gauss-Siedel iterative scheme. Detailed parametric study has been conducted to study the influence of various parameters on the response of soil – foundation system under consideration by means of deflection and bending moment in the beam and tension mobilized in the geosynthetic layer. These parameters include the magnitude of applied load, the velocity of the load, damping, the ultimate resistance of the poor soil and granular fill layer. The range of values of parameters has been considered as per Indian Railways conditions. This study clearly observed that the comparisons of multilayer tensionless extensible geosynthetic reinforcement with poor foundation soil and magnitude of applied load, relative compressibility of granular fill and ultimate resistance of poor soil has significant influence on the response of soil – foundation system. However, for the considered range of velocity, the response has been found to be insensitive towards velocity. The ultimate resistance of granular fill layer has also been found to have no significant influence on the response of the system.

Keywords: infinite beams, multilayer tensionless extensible geosynthetic, granular layer, moving load and nonlinear behavior of poor soil

Procedia PDF Downloads 434
2207 Inclusive Business Development: A Case Study of Developing Community-Operated Business Venture

Authors: Paula Linna

Abstract:

During the recent years interest in inclusive business has increased. Still, research on inclusive business development is at infancy. This study provides empirical evidence on inclusive business development of mini-grid solution for the rural African communities. This study tests how well the insights of creation theory can explain inclusive business development process which often occurs under uncertainty due to demands for developing new technology, new business model and establishing business in new market. These several uncertain elements of business development impact what kind of business strategies the entrepreneur can practice and what kind of decision making tools to use. In addition, community engagement is essential for the successful operative management of a mini-grid solution. This study advances the understanding of inclusive business development and can be used as the foundation for future work to facilitate the process of new business venture creation at the BOP particularly when developing community-operated entrepreneurship model.

Keywords: creation theory, base of the pyramid (BOP), community-operated entrepreneurship, rural African communities

Procedia PDF Downloads 499
2206 Assessing Firm Readiness to Implement Cloud Computing: Toward a Comprehensive Model

Authors: Seyed Mohammadbagher Jafari, Elahe Mahdizadeh, Masomeh Ghahremani

Abstract:

Nowadays almost all organizations depend on information systems to run their businesses. Investment on information systems and their maintenance to keep them always in best situation to support firm business is one of the main issues for every organization. The new concept of cloud computing was developed as a technical and economic model to address this issue. In cloud computing the computing resources, including networks, applications, hardwares and services are configured as needed and are available at the moment of request. However, migration to cloud is not an easy task and there are many issues that should be taken into account. This study tries to provide a comprehensive model to assess a firm readiness to implement cloud computing. By conducting a systematic literature review, four dimensions of readiness were extracted which include technological, human, organizational and environmental dimensions. Every dimension has various criteria that have been discussed in details. This model provides a framework for cloud computing readiness assessment. Organizations that intend to migrate to cloud can use this model as a tool to assess their firm readiness before making any decision on cloud implementation.

Keywords: cloud computing, human readiness, organizational readiness, readiness assessment model

Procedia PDF Downloads 390
2205 New Approaches to Guest Engagement Leading to Guest Satisfaction and Driving Guest Loyalty

Authors: Vaibhav Garg

Abstract:

The concept of guest engagement lies in the rigor of operational excellence and the emotional engagement of associates who perform their tasks genuinely from their hearts and hence in word and indeed, in intent and through gestures, a great hospitality is always genuine, attentive, passionate, caring and warm where engaged associates deliver exceptional service experiences and creates memories to last forever for the guests. One out of every five guests says that their decision of coming back to the same hotel is influenced by the opportunity to “experience and be engaged” A key question is what does a guest mean by experience and be engaged? Most hotels are highly concerned about the guest satisfaction. Therefore they have the brand standards which are a guide to the associate to ensure consistent implementation of set service and product standards to satisfy a guest. However, satisfaction of basic guest needs does not necessarily lead to engagement. For example an absolutely clean room and an in room dining order delivered on time can satisfy a guest but may not engage him. Absence of these standards can certainly lead to guest dissatisfaction however; the presence of these standards does not necessarily lead to guest engagement or guest delight.

Keywords: guest engagement, guest satisfaction, hospitality, hotel operations, operational excellence

Procedia PDF Downloads 235