Search results for: critical information infrastructure
13478 Positive Impact of Cartoon Movies on Adults
Authors: Yacoub Aljaffery
Abstract:
As much as we think negatively about social media such as TV and smart phones, there are many positive benefits our society can get from it. Cartoons, for example, are made specifically for children. However, in this paper, we will prove how cartoon videos can have a positive impact on adults, especially college students. Since cartoons are meant to be a good learning tool for children, as well as adults, we will show our audience how they can use cartoon in teaching critical thinking and other language skills.Keywords: social media, TV, teaching, learning, cartoon movies
Procedia PDF Downloads 32413477 Exchanging Radiology Reporting System with Electronic Health Record: Designing a Conceptual Model
Authors: Azadeh Bashiri
Abstract:
Introduction: In order to better designing of electronic health record system in Iran, integration of health information systems based on a common language must be done to interpret and exchange this information with this system is required. Background: This study, provides a conceptual model of radiology reporting system using unified modeling language. The proposed model can solve the problem of integration this information system with electronic health record system. By using this model and design its service based, easily connect to electronic health record in Iran and facilitate transfer radiology report data. Methods: This is a cross-sectional study that was conducted in 2013. The student community was 22 experts that working at the Imaging Center in Imam Khomeini Hospital in Tehran and the sample was accorded with the community. Research tool was a questionnaire that prepared by the researcher to determine the information requirements. Content validity and test-retest method was used to measure validity and reliability of questioner respectively. Data analyzed with average index, using SPSS. Also, Visual Paradigm software was used to design a conceptual model. Result: Based on the requirements assessment of experts and related texts, administrative, demographic and clinical data and radiological examination results and if the anesthesia procedure performed, anesthesia data suggested as minimum data set for radiology report and based it class diagram designed. Also by identifying radiology reporting system process, use case was drawn. Conclusion: According to the application of radiology reports in electronic health record system for diagnosing and managing of clinical problem of the patient, provide the conceptual Model for radiology reporting system; in order to systematically design it, the problem of data sharing between these systems and electronic health records system would eliminate.Keywords: structured radiology report, information needs, minimum data set, electronic health record system in Iran
Procedia PDF Downloads 25413476 Building Information Management in Context of Urban Spaces, Analysis of Current Use and Possibilities
Authors: Lucie Jirotková, Daniel Macek, Andrea Palazzo, Veronika Malinová
Abstract:
Currently, the implementation of 3D models in the construction industry is gaining popularity. Countries around the world are developing their own modelling standards and implement the use of 3D models into their individual permitting processes. Another theme that needs to be addressed are public building spaces and their subsequent maintenance, where the usage of BIM methodology is directly offered. The significant benefit of the implementation of Building Information Management is the information transfer. The 3D model contains not only the spatial representation of the item shapes but also various parameters that are assigned to the individual elements, which are easily traceable, mainly because they are all stored in one place in the BIM model. However, it is important to keep the data in the models up to date to achieve useability of the model throughout the life cycle of the building. It is now becoming standard practice to use BIM models in the construction of buildings, however, the building environment is very often neglected. Especially in large-scale development projects, the public space of buildings is often forwarded to municipalities, which obtains the ownership and are in charge of its maintenance. A 3D model of the building surroundings would include both the above-ground visible elements of the development as well as the underground parts, such as the technological facilities of water features, electricity lines for public lighting, etc. The paper shows the possibilities of a model in the field of information for the handover of premises, the following maintenance and decision making. The attributes and spatial representation of the individual elements make the model a reliable foundation for the creation of "Smart Cities". The paper analyses the current use of the BIM methodology and presents the state-of-the-art possibilities of development.Keywords: BIM model, urban space, BIM methodology, facility management
Procedia PDF Downloads 12413475 Fire Risk Information Harmonization for Transboundary Fire Events between Portugal and Spain
Authors: Domingos Viegas, Miguel Almeida, Carmen Rocha, Ilda Novo, Yolanda Luna
Abstract:
Forest fires along the more than 1200km of the Spanish-Portuguese border are more and more frequent, currently achieving around 2000 fire events per year. Some of these events develop to large international wildfire requiring concerted operations based on shared information between the two countries. The fire event of Valencia de Alcantara (2003) causing several fatalities and more than 13000ha burnt, is a reference example of these international events. Currently, Portugal and Spain have a specific cross-border cooperation protocol on wildfires response for a strip of about 30km (15 km for each side). It is recognized by public authorities the successfulness of this collaboration however it is also assumed that this cooperation should include more functionalities such as the development of a common risk information system for transboundary fire events. Since Portuguese and Spanish authorities use different approaches to determine the fire risk indexes inputs and different methodologies to assess the fire risk, sometimes the conjoint firefighting operations are jeopardized since the information is not harmonized and the understanding of the situation by the civil protection agents from both countries is not unique. Thus, a methodology aiming the harmonization of the fire risk calculation and perception by Portuguese and Spanish Civil protection authorities is hereby presented. The final results are presented as well. The fire risk index used in this work is the Canadian Fire Weather Index (FWI), which is based on meteorological data. The FWI is limited on its application as it does not take into account other important factors with great effect on the fire appearance and development. The combination of these factors is very complex since, besides the meteorology, it addresses several parameters of different topics, namely: sociology, topography, vegetation and soil cover. Therefore, the meaning of FWI values is different from region to region, according the specific characteristics of each region. In this work, a methodology for FWI calibration based on the number of fire occurrences and on the burnt area in the transboundary regions of Portugal and Spain, in order to assess the fire risk based on calibrated FWI values, is proposed. As previously mentioned, the cooperative firefighting operations require a common perception of the information shared. Therefore, a common classification of the fire risk for the fire events occurred in the transboundary strip is proposed with the objective of harmonizing this type of information. This work is integrated in the ECHO project SpitFire - Spanish-Portuguese Meteorological Information System for Transboundary Operations in Forest Fires, which aims the development of a web platform for the sharing of information and supporting decision tools to be used in international fire events involving Portugal and Spain.Keywords: data harmonization, FWI, international collaboration, transboundary wildfires
Procedia PDF Downloads 25213474 Road Maintenance Management Decision System Using Multi-Criteria and Geographical Information System for Takoradi Roads, Ghana
Authors: Eric Mensah, Carlos Mensah
Abstract:
The road maintenance backlogs created as a result of deferred maintenance especially in developing countries has caused considerable deterioration of many road assets. This is usually due to difficulties encountered in selecting and prioritising maintainable roads based on objective criteria rather than some political or other less important criteria. In order to ensure judicious use of limited resources for road maintenance, five factors were identified as the most important criteria for road management within the study area. This was based on the judgements of 40 experts. The results were further used to develop weightings using the Multi-Criteria Decision Process (MCDP) to analyse and select road alternatives according to maintenance goal. Using Geographical Information Systems (GIS), maintainable roads were grouped using the Jenk’s natural breaks to allow for further prioritised in order of importance for display on a dashboard of maps, charts, and tables. This reduces the problems of subjective maintenance and road selections, thereby reducing wastage of resources and easing the maintenance process through an object organised spatial decision support system.Keywords: decision support, geographical information systems, multi-criteria decision process, weighted sum
Procedia PDF Downloads 37613473 Exploring Factors Affecting the Implementation of Flexible Curriculum in Information Systems Higher Education
Authors: Clement C. Aladi, Zhaoxia Yi
Abstract:
This study investigates factors influencing the implementation of flexible curricula in e-learning in Information Systems (IS) higher education. Drawing from curriculum theorists and contemporary literature, and using the Technology, Pedagogy, and Content Knowledge (TPACK) framework, it explores teacher-related challenges and their impact on curriculum flexibility implementation. By using the PLS-SEM, the study uncovers these factors and hopes to contribute to enhancing curriculum flexibility in delivering online and blended learning in IS higher education.Keywords: flexible curriculum, online learning, e-learning, technology
Procedia PDF Downloads 5513472 2D Ferromagnetism in Van der Waals Bonded Fe₃GeTe₂
Authors: Ankita Tiwari, Jyoti Saini, Subhasis Ghosh
Abstract:
For many years, researchers have been fascinated by the subject of how properties evolve as dimensionality is lowered. Early on, it was shown that the presence of a significant magnetic anisotropy might compensate for the lack of long-range (LR) magnetic order in a low-dimensional system (d < 3) with continuous symmetry, as proposed by Hohenberg-Mermin and Wagner (HMW). Strong magnetic anisotropy allows an LR magnetic order to stabilize in two dimensions (2D) even in the presence of stronger thermal fluctuations which is responsible for the absence of Heisenberg ferromagnetism in 2D. Van der Waals (vdW) ferromagnets, including CrI₃, CrTe₂, Cr₂X₂Te₆ (X = Si and Ge) and Fe₃GeTe₂, offer a nearly ideal platform for studying ferromagnetism in 2D. Fe₃GeTe₂ is the subject of extensive investigation due to its tunable magnetic properties, high Curie temperature (Tc ~ 220K), and perpendicular magnetic anisotropy. Many applications in the field of spintronics device development have been quite active due to these appealing features of Fe₃GeTe₂. Although it is known that LR-driven ferromagnetism is necessary to get around the HMW theorem in 2D experimental realization, Heisenberg 2D ferromagnetism remains elusive in condensed matter systems. Here, we show that Fe₃GeTe₂ hosts both localized and delocalized spins, resulting in itinerant and local-moment ferromagnetism. The presence of LR itinerant interaction facilitates to stabilize Heisenberg ferromagnet in 2D. With the help of Rhodes-Wohlfarth (RW) and generalized RW-based analysis, Fe₃GeTe₂ has been shown to be a 2D ferromagnet with itinerant magnetism that can be modulated by an external magnetic field. Hence, the presence of both local moment and itinerant magnetism has made this system interesting in terms of research in low dimensions. We have also rigorously performed critical analysis using an improvised method. We show that the variable critical exponents are typical signatures of 2D ferromagnetism in Fe₃GeTe₂. The spontaneous magnetization exponent β changes the universality class from mean-field to 2D Heisenberg with field. We have also confirmed the range of interaction via the renormalization group (RG) theory. According to RG theory, Fe₃GeTe₂ is a 2D ferromagnet with LR interactions.Keywords: Van der Waal ferromagnet, 2D ferromagnetism, phase transition, itinerant ferromagnetism, long range order
Procedia PDF Downloads 7113471 The Safety Transfer in Acute Critical Patient by Telemedicine (START) Program at Udonthani General Hospital
Authors: Wisit Wichitkosoom
Abstract:
Objective:The majority of the hisk-risk patients (ST-elevation myocardial infarction (STEMI), Acute cerebrovascular accident, Sepsis, Acute Traumatic patient ) are admitted to district or lacal hospitals (average 1-1.30 hr. from Udonthani general hospital, Northeastern province, Thailand) without proper facilities. The referral system was support to early care and early management at pre-hospital stage and prepare for the patient data to higher hospital. This study assessed the reduction in treatment delay achieved by pre-hospital diagnosis and referral directly to Udonthani General Hospital. Methods and results: Four district or local hospitals without proper facilities for treatment the very high-risk patient were serving the study region. Pre-hospital diagnoses were established with the simple technology such as LINE, SMS, telephone and Fax for concept of LEAN process and then the telemedicine, by ambulance monitoring (ECG, SpO2, BT, BP) in both real time and snapshot mode was administrated during the period of transfer for safety transfer concept (inter-hospital stage). The standard treatment for patients with STEMI, Intracranial injury and acute cerebrovascular accident were done. From 1 October 2012 to 30 September 2013, the 892 high-risk patients transported by ambulance and transferred to Udonthani general hospital were registered. Patients with STEMI diagnosed pre-hospitally and referred directly to the Udonthani general hospital with telemedicine closed monitor (n=248). The mortality rate decreased from 11.69% in 2011 to 6.92 in 2012. The 34 patients were arrested on the way and successful to CPR during transfer with the telemedicine consultation were 79.41%. Conclusion: The proper innovation could apply for health care system. The very high-risk patients must had the closed monitoring with two-way communication for the “safety transfer period”. It could modified to another high-risk group too.Keywords: safety transfer, telemedicine, critical patients, medical and health sciences
Procedia PDF Downloads 30613470 Self-Disclosure of Location: Influences of Personality Traits, Intrinsic Motivations and Extrinsic Motivations
Authors: Chechen Liao, Sheng Yi Lin
Abstract:
With the popularity of smartphone usage and the flourish of social networks, many people began to use the 'check-in' functions to share their location information and days of live and self-disclosure. In order to increase exposure and awareness, some stores provide discounts and other benefits to attract consumers to 'check-in' in their stores. The purpose of this study was to investigate whether personality traits, intrinsic motivations, extrinsic motivations, and privacy concerns would affect self-disclosure of location for consumers. Research data were collected from 407 individuals that have used Facebook check-in in Taiwan. This study used SmartPLS 2.0 structural equation modeling to validate the model. The results show that information sharing, information storage, enjoyment, self-presentation, get a feedback, economic reward, and keep up with trends had significant positive effects on self-disclosure. While extroversion and openness to use have significant positive effects on self-disclosure, conscientiousness and privacy concerns have significant negative effects on self-disclosure. The results of the study provide academic and practical implications for the future growth of location-based self-disclosure.Keywords: check-in, extrinsic motivation, intrinsic motivation, personality trait, self-disclosure
Procedia PDF Downloads 17013469 The Differences and Similarities in Neurocognitive Deficits in Mild Traumatic Brain Injury and Depression
Authors: Boris Ershov
Abstract:
Depression is the most common mood disorder experienced by patients who have sustained a traumatic brain injury (TBI) and is associated with poorer cognitive functional outcomes. However, in some cases, similar cognitive impairments can also be observed in depression. There is not enough information about the features of the cognitive deficit in patients with TBI in relation to patients with depression. TBI patients without depressive symptoms (TBInD, n25), TBI patients with depressive symptoms (TBID, n31), and 28 patients with bipolar II disorder (BP) were included in the study. There were no significant differences in participants in respect to age, handedness and educational level. The patients clinical status was determined by using Montgomery–Asberg Depression Rating Scale (MADRS). All participants completed a cognitive battery (The Brief Assessment of Cognition in Affective Disorders (BAC-A)). Additionally, the Rey–Osterrieth Complex Figure (ROCF) was used to assess visuospatial construction abilities and visual memory, as well as planning and organizational skills. Compared to BP, TBInD and TBID showed a significant impairments in visuomotor abilities, verbal and visual memory. There were no significant differences between BP and TBID groups in working memory, speed of information processing, problem solving. Interference effect (cognitive inhibition) was significantly greater in TBInD and TBID compared to BP. Memory bias towards mood-related information in BP and TBID was greater in comparison with TBInD. These results suggest that depressive symptoms are associated with impairments some executive functions in combination at decrease of speed of information processing.Keywords: bipolar II disorder, depression, neurocognitive deficits, traumatic brain injury
Procedia PDF Downloads 34713468 Privacy Policy Prediction for Uploaded Image on Content Sharing Sites
Authors: Pallavi Mane, Nikita Mankar, Shraddha Mazire, Rasika Pashankar
Abstract:
Content sharing sites are very useful in sharing information and images. However, with the increasing demand of content sharing sites privacy and security concern have also increased. There is need to develop a tool for controlling user access to their shared content. Therefore, we are developing an Adaptive Privacy Policy Prediction (A3P) system which is helpful for users to create privacy settings for their images. We propose the two-level framework which assigns the best available privacy policy for the users images according to users available histories on the site.Keywords: online information services, prediction, security and protection, web based services
Procedia PDF Downloads 35813467 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies
Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk
Abstract:
Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)
Procedia PDF Downloads 9313466 Centrifuge Testing to Determine the Effect of Temperature on the Adhesion Strength of Ice
Authors: Zaid A. Janjua, Barbara Turnbull, Kwing-So Choi
Abstract:
The adhesion of glaze ice on power infrastructure, ships and aerofoils cause monetary and structural damage. Here we investigate the influence of temperature as an important parameter affecting adhesion strength of ice. Two terms are defined to investigate this: 'freezing temperature', the temperature at which glaze ice forms; and 'ambient temperature', the temperature of the surrounding during the test. Using three metal surfaces, the adhesion strength of ice has been calculated as a value of shear stress at the point of detachment on a spinning centrifuge. Findings show that the ambient temperature has a greater influence than the freezing temperature on the adhesion strength of ice. This is because there exists an amorphous liquid-like layer at the ice-surface interface, whose bond with the surface increases in strength at lower ambient temperatures when the substrate conducts heat much faster than the ice and acts as a heat sink. The results will help us to measure the actual adhesion strength of ice to metal surfaces based on data from weather monitoring devices. Future tests envisaged focus on thermally non-conducting substrates and their influence on adhesion strength.Keywords: ice adhesion, centrifuge, glaze ice, freezing temperature, ambient temperature
Procedia PDF Downloads 34313465 A Dam Break Analysis Using MIKE11
Authors: Oussama Derdous, Lakhdar Djemili, Hamza Bouchahed
Abstract:
The consequences of a dam breach can be devastating; both in terms of lives lost and damaged infrastructure and property. Hydraulic modeling provides a clear picture of the possible consequences of partial or complete failure of a dam, which is the key to carry out emergency planning and conduct reliable risk assessments. In this paper, the MIKE11 model developed by the Danish Hydrologic Institute (DHI) was used to simulate the flood wave propagation associated with a potential failure analysis failure of Zardezas dam located in the city of Skikda in the North East of Algeria. MIKE11 results including inundation maps and the representative channel/valley cross-sections depicting flow depth and maximal flow velocities showed that Zardezas reservoir presents a significant risk to downstream areas in the event of a dam failure. These results can be used as the basis of the development of an Emergency Action Plan (EAP).The main objective of this plan is to predict the appropriate steps to avoid or at least decrease the consequences of unexpected failure of Zardezas dam.Keywords: MIKE11, dam break, inundation maps, emergency action plan
Procedia PDF Downloads 46313464 Building Bridges on Roads With Major Constructions
Authors: Mohamed Zaidour
Abstract:
In this summary, we are going to look in brief at the bridges and their building and construction on most roads and we have followed a simple method to explain each field clearly because the geographical and climatic diversity of an area leads to different methods and types of roads and installation engineering in other areas In mountain areas we need to build retaining walls in areas of rain. It needs to construct ferries to discharge water from roads in areas of temporary or permanent rivers. There is a need to build bridges and construct road installations in the process of collecting the necessary information, such as soil type. This information needs it, engineer, when designing the constructor and in this section, we will identify the types and methods of calculation bridge columns rules phrases the walls are chock.Keywords: bridges, buildings, concrete, constructions, roads
Procedia PDF Downloads 11913463 Empirical Study on Factors Influencing SEO
Authors: Pakinee Aimmanee, Phoom Chokratsamesiri
Abstract:
Search engine has become an essential tool nowadays for people to search for their needed information on the internet. In this work, we evaluate the performance of the search engine from three factors: the keyword frequency, the number of inbound links, and the difficulty of the keyword. The evaluations are based on the ranking position and the number of days that Google has seen or detect the webpage. We find that the keyword frequency and the difficulty of the keyword do not affect the Google ranking where the number of inbound links gives remarkable improvement of the ranking position. The optimal number of inbound links found in the experiment is 10.Keywords: SEO, information retrieval, web search, knowledge technologies
Procedia PDF Downloads 28313462 Smart Card Technology Adaption in a Hospital Setting
Authors: H. K. V. Narayan
Abstract:
This study was conducted at Tata Memorial Hospital (TMH), Mumbai, India. The study was to evaluate the impact of adapting Smart Card (SC) for clinical and business transactions in order to reduce Lead times and to enforce business rules of the hospital. The objective for implementing the Smart Card was to improve the patient perception of quality in terms of structures process and outcomes and also to improve the productivity of the Institution. The Smart Card was implemented in phases from 2011 and integrated with the Hospital Information System (HIS/EMR). The implementation was a learning curve for all the stake holders as software obviated the need to use hardcopies of transactions. The acceptability to the stake holders was challenge in change management. The study assessed the impact 3 years into the implementation and the observed trends have suggested that it has decreased the lead times for services and increased the no of transactions and thereby the productivity. Patients who used to complain of multiple queues and cumbersome transactions now compliment the administration for effective use of Information and Communication Technology.Keywords: smart card, high availability of health care information, reduction in potential medical errors due to elimination of transcription errors, reduction in no of queues, increased transactions, augmentation of revenue
Procedia PDF Downloads 28513461 Agent-Based Simulation for Supply Chain Transport Corridors
Authors: Kamalendu Pal
Abstract:
Supply chains are the spinal cord of trade and commerce. Their logistics use different transport corridors on regular basis for operational purpose. The international supply chain transport corridors include different infrastructure elements (e.g. weighbridge, package handling equipment, border clearance authorities, and so on) in supply chains. This paper presents the use of multi-agent systems (MAS) to model and simulate some aspects of transportation corridors, and in particular the area of weighbridge resource optimization for operational profit generation purpose. An underlying multi-agent model provides a means of modeling the relationships among stakeholders in order to enable coordination in a transport corridor environment. Simulations of the costs of container unloading, reloading, and waiting time for queuing up tracks have been carried out using data sets. Results of the simulation provide the potential guidance in making decisions about optimal service resource allocation in a trade corridor.Keywords: multi-agent systems, simulation, supply chain, transport corridor, weighbridge
Procedia PDF Downloads 35313460 Technoeustress in Higher Education Teachers: A Study on Positive Stress
Authors: Ligia Nascimento, Manuela Faia Correia
Abstract:
Nowadays, Information and Communication Technologies (ICT) are embedded in most professions. Technostress - or stress induced by the use of ICTs, has been studied in various sectors of activity and in different geographical areas, mainly from the perspective of its harmful impacts. In the context of work, the technological contexts capable of causing stress have been examined in-depth, as well as the type of individuals most likely to experience its negative effects. However, new lines of the research argue that the stress generated by the use of ICTs may not necessarily be detrimental (technodistress), admitting that, in contrast, and in addition, it may actually be beneficial to organizations and their employees (technoeustress). Any measures that succeed in reducing technodistress do not necessarily lead to the creation of technoeustress, justifying the study of this phenomenon in a focused and independent manner. Adopting the transactional model of stress as the basic theoretical framework, an ongoing research project aims to study technoeustress independently. Given the role played in the qualification and progress of society and the economy, it becomes particularly critical to care for the well-being of the higher education teacher. Particularly in recent times, when teleworking is prevalent, these professionals have made a huge, compulsive effort to adapt to a new teaching reality. Rather than limiting itself to mitigating adverse effects of ICT use, which featured earlier approaches, the present study seeks to understand how to activate the positive side of technostress in higher education teachers in order to obtain favorable personal and organizational outcomes from ICT use at work. The research model seeks to understand, upstream, the ICT characteristics that increase the perception of technoeustress among higher education teachers, studying the direct and moderating effects of individual and organizational variables and, downstream, the impacts that technoeustress has on job satisfaction and performance. This research contributes both to expanding the knowledge of the technostress phenomenon and to identify possible recommendations for management.Keywords: higher education teachers, ICT, stress, technoeustress
Procedia PDF Downloads 14613459 The Politics of Identity: A Longitudinal Study of the Sociopolitical Development of Education Leaders
Authors: Shelley Zion
Abstract:
This study examines the longitudinal impact (10 years) of a course for education leaders designed to encourage the development of critical consciousness surrounding issues of equity, oppression, power, and privilege. The ability to resist and challenge oppression across social and cultural contexts can be acquired through the use of transformative pedagogies that create spaces that use the practice of exploration to make connections between pervasive structural and institutional practices and race and ethnicity. This study seeks to extend this understanding by exploring the longitudinal influence of participating in a course that utilizes transformative pedagogies, course materials, exercises, and activities to encourage the practice of exploration of student experiences with racial and ethnic discrimination with the end goal of providing them with the necessary knowledge and skills that foster their ability to resist and challenge oppression and discrimination -critical action- in their lives. To this end, we use the explanatory power of the theories of critical consciousness development, sociopolitical development, and social identity construction that view exploration as a crucial practice in understanding the role ethnic and racial differences play in creating opportunities or barriers in the lives of individuals. When educators use transformative pedagogies, they create a space where students collectively explore their experiences with racial and ethnic discrimination through course readings, in-class activities, and discussions. The end goal of this exploration is twofold: first, to encourage the student’s ability to understand how differences are identified, given meaning to, and used to position them in specific places and spaces in their world; second, to scaffold students’ ability to make connections between their individual and collective differences and particular institutional and structural practices that create opportunities or barriers in their lives. Studies have found the formal exploration of students’ individual and collective differences in relation to their experiences with racial and ethnic discrimination results in developing an understanding of the roles race and ethnicity play in their lives. To trace the role played by exploration in identity construction, we utilize an integrative approach to identity construction informed by multiple theoretical frameworks grounded in cultural studies, social psychology, and sociology that understand social-cultural, racial, and ethnic -identities as dynamic and ever-changing based on context-specific environments. Stuart Hall refers to this practice as taking “symbolic detours through the past” while reflecting on the different ways individuals have been positioned based on their roots (group membership) and also how they, in turn, chose to position themselves through collective sense-making of the various meanings their differences carried through the routes they have taken. The practice of exploration in the construction of ethnic-racial identities has been found to be beneficial to sociopolitical development.Keywords: political polarization, civic participation, democracy, education
Procedia PDF Downloads 5613458 The Challenges of Citizen Engagement in Urban Transformation: Key Learnings from Three European Cities
Authors: Idoia Landa Oregi, Itsaso Gonzalez Ochoantesana, Olatz Nicolas Buxens, Carlo Ferretti
Abstract:
The impact of citizens in urban transformations has become increasingly important in the pursuit of creating citizen-centered cities. Citizens at the forefront of the urban transformation process are key to establishing resilient, sustainable, and inclusive cities that cater to the needs of all residents. Therefore, collecting data and information directly from citizens is crucial for the sustainable development of cities. Within this context, public participation becomes a pillar for acquiring the necessary information from citizens. Public participation in urban transformation processes establishes a more responsive, equitable, and resilient urban environment. This approach cultivates a sense of shared responsibility and collective progress in building cities that truly serve the well-being of all residents. However, the implementation of public participation practices often overlooks strategies to effectively engage citizens in the processes, resulting in non-successful participatory outcomes. Therefore, this research focuses on identifying and analyzing the critical aspects of citizen engagement during the same participatory urban transformation process in different European contexts: Ermua (Spain), Elva (Estonia) and Matera (Italy). The participatory neighborhood regeneration process is divided into three main stages, to turn social districts into inclusive and smart neighborhoods: (i) the strategic level, (ii) the design level, and (iii) the implementation level. In the initial stage, the focus is on diagnosing the neighborhood and creating a shared vision with the community. The second stage centers around collaboratively designing various action plans to foster inclusivity and intelligence while pushing local economic development within the district. Finally, the third stage ensures the proper co-implementation of the designed actions in the neighborhood. To this date, the presented results critically analyze the key aspects of engagement in the first stage of the methodology, the strategic plan, in the three above-mentioned contexts. It is a multifaceted study that incorporates three case studies to shed light on the various perspectives and strategies adopted by each city. The results indicate that despite of the various cultural contexts, all cities face similar barriers when seeking to enhance engagement. Accordingly, the study identifies specific challenges within the participatory approach across the three cities such as the existence of discontented citizens, communication gaps, inconsistent participation, or administration resistance. Consequently, key learnings of the process indicate that a collaborative sphere needs to be cultivated, educating both citizens and administrations in the aspects of co-governance, giving these practices the appropriate space and their own communication channels. This study is part of the DROP project, funded by the European Union, which aims to develop a citizen-centered urban renewal methodology to transform the social districts into smart and inclusive neighborhoods.Keywords: citizen-centred cities, engagement, public participation, urban transformation
Procedia PDF Downloads 6813457 Learning the Most Common Causes of Major Industrial Accidents and Apply Best Practices to Prevent Such Accidents
Authors: Rajender Dahiya
Abstract:
Investigation outcomes of major process incidents have been consistent for decades and validate that the causes and consequences are often identical. The debate remains as we continue to experience similar process incidents even with enormous development of new tools, technologies, industry standards, codes, regulations, and learning processes? The objective of this paper is to investigate the most common causes of major industrial incidents and reveal industry challenges and best practices to prevent such incidents. The author, in his current role, performs audits and inspections of a variety of high-hazard industries in North America, including petroleum refineries, chemicals, petrochemicals, manufacturing, etc. In this paper, he shares real life scenarios, examples, and case studies from high hazards operating facilities including key challenges and best practices. This case study will provide a clear understanding of the importance of near miss incident investigation. The incident was a Safe operating limit excursion. The case describes the deficiencies in management programs, the competency of employees, and the culture of the corporation that includes hazard identification and risk assessment, maintaining the integrity of safety-critical equipment, operating discipline, learning from process safety near misses, process safety competency, process safety culture, audits, and performance measurement. Failure to identify the hazards and manage the risks of highly hazardous materials and processes is one of the primary root-causes of an incident, and failure to learn from past incidents is the leading cause of the recurrence of incidents. Several investigations of major incidents discovered that each showed several warning signs before occurring, and most importantly, all were preventable. The author will discuss why preventable incidents were not prevented and review the mutual causes of learning failures from past major incidents. The leading causes of past incidents are summarized below. Management failure to identify the hazard and/or mitigate the risk of hazardous processes or materials. This process starts early in the project stage and continues throughout the life cycle of the facility. For example, a poorly done hazard study such as HAZID, PHA, or LOPA is one of the leading causes of the failure. If this step is performed correctly, then the next potential cause is. Management failure to maintain the integrity of safety critical systems and equipment. In most of the incidents, mechanical integrity of the critical equipment was not maintained, safety barriers were either bypassed, disabled, or not maintained. The third major cause is Management failure to learn and/or apply learning from the past incidents. There were several precursors before those incidents. These precursors were either ignored altogether or not taken seriously. This paper will conclude by sharing how a well-implemented operating management system, good process safety culture, and competent leaders and staff contributed to managing the risks to prevent major incidents.Keywords: incident investigation, risk management, loss prevention, process safety, accident prevention
Procedia PDF Downloads 5713456 Reliability and Availability Analysis of Satellite Data Reception System using Reliability Modeling
Authors: Ch. Sridevi, S. P. Shailender Kumar, B. Gurudayal, A. Chalapathi Rao, K. Koteswara Rao, P. Srinivasulu
Abstract:
System reliability and system availability evaluation plays a crucial role in ensuring the seamless operation of complex satellite data reception system with consistent performance for longer periods. This paper presents a novel approach for the same using a case study on one of the antenna systems at satellite data reception ground station in India. The methodology involves analyzing system's components, their failure rates, system's architecture, generation of logical reliability block diagram model and estimating the reliability of the system using the component level mean time between failures considering exponential distribution to derive a baseline estimate of the system's reliability. The model is then validated with collected system level field failure data from the operational satellite data reception systems that includes failure occurred, failure time, criticality of the failure and repair times by using statistical techniques like median rank, regression and Weibull analysis to extract meaningful insights regarding failure patterns and practical reliability of the system and to assess the accuracy of the developed reliability model. The study mainly focused on identification of critical units within the system, which are prone to failures and have a significant impact on overall performance and brought out a reliability model of the identified critical unit. This model takes into account the interdependencies among system components and their impact on overall system reliability and provides valuable insights into the performance of the system to understand the Improvement or degradation of the system over a period of time and will be the vital input to arrive at the optimized design for future development. It also provides a plug and play framework to understand the effect on performance of the system in case of any up gradations or new designs of the unit. It helps in effective planning and formulating contingency plans to address potential system failures, ensuring the continuity of operations. Furthermore, to instill confidence in system users, the duration for which the system can operate continuously with the desired level of 3 sigma reliability was estimated that turned out to be a vital input to maintenance plan. System availability and station availability was also assessed by considering scenarios of clash and non-clash to determine the overall system performance and potential bottlenecks. Overall, this paper establishes a comprehensive methodology for reliability and availability analysis of complex satellite data reception systems. The results derived from this approach facilitate effective planning contingency measures, and provide users with confidence in system performance and enables decision-makers to make informed choices about system maintenance, upgrades and replacements. It also aids in identifying critical units and assessing system availability in various scenarios and helps in minimizing downtime and optimizing resource allocation.Keywords: exponential distribution, reliability modeling, reliability block diagram, satellite data reception system, system availability, weibull analysis
Procedia PDF Downloads 8413455 Heritage Value and Industrial Tourism Potential of the Urals, Russia
Authors: Anatoly V. Stepanov, Maria Y. Ilyushkina, Alexander S. Burnasov
Abstract:
Expansion of tourism, especially after WWII, has led to significant improvements in the regional infrastructure. The present study has revealed a lot of progress in the advancement of industrial heritage narrative in the Central Urals. The evidence comes from the general public’s increased fascination with some of Europe’s oldest mining and industrial sites, and the agreement of many stakeholders that the Urals industrial heritage should be preserved. The development of tourist sites in Nizhny Tagil and Nevyansk, gold-digging in Beryosovsky, gemstone search in Murzinka, and the progress with the Urals Gemstone Ring project are the examples showing the immense opportunities of industrial heritage tourism development in the region that are still to be realized. Regardless of the economic future of the Central Urals, whether it will remain an industrial region or experience a deeper deindustrialization, the sprouts of the industrial heritage tourism should be advanced and amplified for the benefit of local communities and the tourist community at large as it is hard to imagine a more suitable site for the discovery of industrial and mining heritage than the Central Urals Region of Russia.Keywords: industrial heritage, mining heritage, Central Urals, Russia
Procedia PDF Downloads 13613454 Codification Controversy in Islamic and Saudi Law(Theoretical and Practical Study)
Authors: Mohamed Almagsoudi
Abstract:
The aim of this paper is to deal with two issues. One of them is about the theoretical side of codification, and the other is related to the practical side. At first, I have tried to criticize the debate running about codification of Islamic and Saudi Law, through observing and analyzing views of opponents and advocates. I tried to prove a hypothesis that both parties could not completely succeed in reviewing the theoretical base of this topic where discussion would not deal with irrelevant matters. It is a crucial shortcoming that made advocates unable to answer the critical questions addressed by those opponents.Keywords: Codification, Saudi Law, Islamic law, Sharia
Procedia PDF Downloads 12313453 Vehicle Type Classification with Geometric and Appearance Attributes
Authors: Ghada S. Moussa
Abstract:
With the increase in population along with economic prosperity, an enormous increase in the number and types of vehicles on the roads occurred. This fact brings a growing need for efficiently yet effectively classifying vehicles into their corresponding categories, which play a crucial role in many areas of infrastructure planning and traffic management. This paper presents two vehicle-type classification approaches; 1) geometric-based and 2) appearance-based. The two classification approaches are used for two tasks: multi-class and intra-class vehicle classifications. For the evaluation purpose of the proposed classification approaches’ performance and the identification of the most effective yet efficient one, 10-fold cross-validation technique is used with a large dataset. The proposed approaches are distinguishable from previous research on vehicle classification in which: i) they consider both geometric and appearance attributes of vehicles, and ii) they perform remarkably well in both multi-class and intra-class vehicle classification. Experimental results exhibit promising potentials implementations of the proposed vehicle classification approaches into real-world applications.Keywords: appearance attributes, geometric attributes, support vector machine, vehicle classification
Procedia PDF Downloads 33813452 Mobile Microscope for the Detection of Pathogenic Cells Using Image Processing
Authors: P. S. Surya Meghana, K. Lingeshwaran, C. Kannan, V. Raghavendran, C. Priya
Abstract:
One of the most basic and powerful tools in all of science and medicine is the light microscope, the fundamental device for laboratory as well as research purposes. With the improving technology, the need for portable, economic and user-friendly instruments is in high demand. The conventional microscope fails to live up to the emerging trend. Also, adequate access to healthcare is not widely available, especially in developing countries. The most basic step towards the curing of a malady is the diagnosis of the disease itself. The main aim of this paper is to diagnose Malaria with the most common device, cell phones, which prove to be the immediate solution for most of the modern day needs with the development of wireless infrastructure allowing to compute and communicate on the move. This opened up the opportunity to develop novel imaging, sensing, and diagnostics platforms using mobile phones as an underlying platform to address the global demand for accurate, sensitive, cost-effective, and field-portable measurement devices for use in remote and resource-limited settings around the world.Keywords: cellular, hand-held, health care, image processing, malarial parasites, microscope
Procedia PDF Downloads 26713451 Marketing and Business Intelligence and Their Impact on Products and Services Through Understanding Based on Experiential Knowledge of Customers in Telecommunications Companies
Authors: Ali R. Alshawawreh, Francisco Liébana-Cabanillas, Francisco J. Blanco-Encomienda
Abstract:
Collaboration between marketing and business intelligence (BI) is crucial in today's ever-evolving business landscape. These two domains play pivotal roles in molding customers' experiential knowledge. Marketing insights offer valuable information regarding customer needs, preferences, and behaviors. Conversely, BI facilitates data-driven decision-making, leading to heightened operational efficiency, product quality, and customer satisfaction. Customer experiential knowledge (CEK) encompasses customers' implicit comprehension of consumption experiences influenced by diverse factors, including social and cultural influences. This study primarily focuses on telecommunications companies in Jordan, scrutinizing how experiential customer knowledge mediates the relationship between marketing intelligence and business intelligence. Drawing on theoretical frameworks such as the resource-based view (RBV) and service-dominant logic (SDL), the research aims to comprehend how organizations utilize their resources, particularly knowledge, to foster Evolution. Employing a quantitative research approach, the study collected and analyzed primary data to explore hypotheses. Structural equation modeling (SEM) facilitated by Smart PLS software evaluated the relationships between the constructs, followed by mediation analysis to assess the indirect associations in the model. The study findings offer insights into the intricate dynamics of organizational Creation, uncovering the interconnected relationships between business intelligence, customer experiential knowledge-based innovation (CEK-DI), marketing intelligence (MI), and product and service innovation (PSI), underscoring the pivotal role of advanced intelligence capabilities in developing innovative practices rooted in a profound understanding of customer experiences. Furthermore, the positive impact of BI on PSI reaffirms the significance of data-driven decision-making in shaping the innovation landscape. The significant impact of CEK-DI on PSI highlights the critical role of customer experiences in driving an organization. Companies that actively integrate customer insights into their opportunity creation processes are more likely to create offerings that match customer expectations, which drives higher levels of product and service sophistication. Additionally, the positive and significant impact of MI on CEK-DI underscores the critical role of market insights in shaping evolutionary strategies. While the relationship between MI and PSI is positive, the slightly weaker significance level indicates a subtle association, suggesting that while MI contributes to the development of ideas, In conclusion, the study emphasizes the fundamental role of intelligence capabilities, especially artificial intelligence, emphasizing the need for organizations to leverage market and customer intelligence to achieve effective and competitive innovation practices. Collaborative efforts between marketing and business intelligence serve as pivotal drivers of development, influencing customer experiential knowledge and shaping organizational strategies and practices. Future research could adopt longitudinal designs and gather data from various sectors to offer broader insights. Additionally, the study focuses on the effects of marketing intelligence, business intelligence, customer experiential knowledge, and innovation, but other unexamined variables may also influence innovation processes. Future studies could investigate additional factors, mediators, or moderators, including the role of emerging technologies like AI and machine learning in driving innovation.Keywords: marketing intelligence, business intelligence, product, customer experiential knowledge-driven innovation
Procedia PDF Downloads 3313450 Code Embedding for Software Vulnerability Discovery Based on Semantic Information
Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson
Abstract:
Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.Keywords: code representation, deep learning, source code semantics, vulnerability discovery
Procedia PDF Downloads 15913449 Major Constraints to Adoption of Improved Post-harvest Technologies among Smallholder Farmers in Developing Countries: A Systematic Review
Authors: Muganyizi Jonas Bisheko, G. Rejikumar
Abstract:
Reducing post-harvest losses could be a sustainable solution to enhance the food and income security of smallholder farmers in developing countries. While various research institutions have come up with a number of innovative post-harvest technologies for reducing post-harvest losses, most of them have not been extensively adopted by smallholder farmers. Despite this gap, the synthesized information about the major constraints of post-harvest technology is scarce. This study has been conducted to fill this gap and show the implications of the findings for future post-harvest research. The developed search strategy retrieved 2201 studies. However, after excluding duplicates, title, abstract and full article screening, a total of 41 documents were identified. The major findings are: (i) there is an outstanding deficiency of systematic evidence of the effect of climate change, off-farm income and sources of post-harvest information on the adoption of improved post-harvest technologies; (ii) there is very limited information on adoption constraints pertaining to matters of policy, rules and regulations; (iii) there is very thin literature on behavioral constraints associated with limited adoption of improved post-harvest technologies; (iv) most of the studies focused on post-harvest storage technologies (47%) followed by overall post-harvest management practices (25%), processing technologies (19%) and packaging technologies (3%). Much of the information was found on Cereals (58%), especially maize (44%); (v) geographically, Sub-Saharan Africa accounted for 79% of the reviewed interventions, while South Asia occupied only 21%. The findings of this review are intended to guide various post-harvest technologists and decision-makers in addressing the challenge of huge post-harvest losses.Keywords: constraints, post-harvest loss, post-harvest technology , smallholder farmer
Procedia PDF Downloads 235