Search results for: traditional approach
14123 Hilotherapy in Orthognathic Surgery
Authors: N. Gharooni-Dowrani, B. Gharooni-Dowrani
Abstract:
The benefits of hilotherapy following orthogonathic surgery have been explored in recent years, demonstrating reduction in patient pain and swelling post-operatively. However, hilotherapy is not always widely accessible to all patients following orthognathic surgery. In this study, 50 patients were examined at Luton and Dunstable Hospital, half (25) of which used hilotherm masks post operatively and half of which opted for traditional ice packs in order to aid recovery. This study demonstrated that the use of hilotherapy reduced patient pain when analgesia need and use were analysed, as well as shortening inpatient stay. Although no current hilotherm masks are available without rental services in our trust, this study demonstrated the positive outcomes that they may bring, which may be worth future investment for our department.Keywords: orthognathic surgery, orthodontics, hilotherapy, OMFS
Procedia PDF Downloads 8314122 Evaluation of SDS (Software Defined Storage) Controller (CorpHD) for Various Storage Demands
Authors: Shreya Bokare, Sanjay Pawar, Shika Nema
Abstract:
Growth in cloud applications is generating the tremendous amount of data, building load on traditional storage management systems. Software Defined Storage (SDS) is a new storage management concept becoming popular to handle this large amount of data. CoprHD is one of the open source SDS controller, available for experimentation and development in the storage industry. In this paper, the storage management techniques provided by CoprHD to manage heterogeneous storage platforms are experimented and analyzed. Various storage management parameters such as time to provision, storage capacity measurement, and heterogeneity are experimentally evaluated along with the theoretical expression to prove the completeness of CoprHD controller for storage management.Keywords: software defined storage, SDS, CoprHD, open source, SMI-S simulator, clarion, Symmetrix
Procedia PDF Downloads 31314121 Enhancing Rural Agricultural Value Chains through Electric Mobility Services in Ethiopia
Authors: Clemens Pizzinini, Philipp Rosner, David Ziegler, Markus Lienkamp
Abstract:
Transportation is a constitutional part of most supply and value chains in modern economies. Smallholder farmers in rural Ethiopia face severe challenges along their supply and value chains. In particular, suitable, affordable, and available transport services are in high demand. To develop a context-specific technical solutions, a problem-to-solution methodology based on the interaction with technology is developed. With this approach, we fill the gap between proven transportation assessment frameworks and general user-centered techniques. Central to our approach is an electric test vehicle that is implemented in rural supply and value chains for research, development, and testing. Based on our objective and the derived methodological requirements, a set of existing methods is selected. Local partners are integrated into an organizational framework that executes major parts of this research endeavour in the Arsi Zone, Oromia Region, Ethiopia.Keywords: agricultural value chain, participatory methods, agile methods, sub-Saharan Africa, Ethiopia, electric vehicle, transport service
Procedia PDF Downloads 7414120 Syntactic Ambiguity and Syntactic Analysis: Transformational Grammar Approach
Authors: Olufemi Olupe
Abstract:
Within linguistics, various approaches have been adopted to the study of language. One of such approaches is the syntax. The syntax is an aspect of the grammar of the language which deals with how words are put together to form phrases and sentences and how such structures are interpreted in language. Ambiguity, which is also germane in this discourse is about the uncertainty of meaning as a result of the possibility of a phrase or sentence being understood and interpreted in more than one way. In the light of the above, this paper attempts a syntactic study of syntactic ambiguities in The English Language, using the Transformational Generative Grammar (TGG) Approach. In doing this, phrases and sentences were raised with each description followed by relevant analysis. Finding in the work reveals that ambiguity cannot always be disambiguated by the means of syntactic analysis alone without recourse to semantic interpretation. The further finding shows that some syntactical ambiguities structures cannot be analysed on two surface structures in spite of the fact that there are more than one deep structures. The paper concludes that in as much as ambiguity remains in language; it will continue to pose a problem of understanding to a second language learner. Users of English as a second language, must, however, make a conscious effort to avoid its usage to achieve effective communication.Keywords: language, syntax, semantics, morphology, ambiguity
Procedia PDF Downloads 39414119 Criminal Law and Internet of Things: Challenges and Threats
Authors: Celina Nowak
Abstract:
The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.Keywords: criminal law, internet of things, privacy, security threats
Procedia PDF Downloads 16214118 Political Economy and Human Rights Engaging in Conversation
Authors: Manuel Branco
Abstract:
This paper argues that mainstream economics is one of the reasons that can explain the difficulty in fully realizing human rights because its logic is intrinsically contradictory to human rights, most especially economic, social and cultural rights. First, its utilitarianism, both in its cardinal and ordinal understanding, contradicts human rights principles. Maximizing aggregate utility along the lines of cardinal utility is a theoretical exercise that consists in ensuring as much as possible that gains outweigh losses in society. In this process an individual may get worse off, though. If mainstream logic is comfortable with this, human rights' logic does not. Indeed, universality is a key principle in human rights and for this reason the maximization exercise should aim at satisfying all citizens’ requests when goods and services necessary to secure human rights are at stake. The ordinal version of utilitarianism, in turn, contradicts the human rights principle of indivisibility. Contrary to ordinal utility theory that ranks baskets of goods, human rights do not accept ranking when these goods and services are necessary to secure human rights. Second, by relying preferably on market logic to allocate goods and services, mainstream economics contradicts human rights because the intermediation of money prices and the purpose of profit may cause exclusion, thus compromising the principle of universality. Finally, mainstream economics sees human rights mainly as constraints to the development of its logic. According to this view securing human rights would, then, be considered a cost weighing on economic efficiency and, therefore, something to be minimized. Fully realizing human rights needs, therefore, a different approach. This paper discusses a human rights-based political economy. This political economy, among other characteristics should give up mainstream economics narrow utilitarian approach, give up its belief that market logic should guide all exchanges of goods and services between human beings, and finally give up its view of human rights as constraints on rational choice and consequently on good economic performance. Giving up mainstream’s narrow utilitarian approach means, first embracing procedural utility and human rights-aimed consequentialism. Second, a more radical break can be imagined; non-utilitarian, or even anti-utilitarian, approaches may emerge, then, as alternatives, these two standpoints being not necessarily mutually exclusive, though. Giving up market exclusivity means embracing decommodification. More specifically, this means an approach that takes into consideration the value produced outside the market and an allocation process no longer necessarily centered on money prices. Giving up the view of human rights as constraints means, finally, to consider human rights as an expression of wellbeing and a manifestation of choice. This means, in turn, an approach that uses indicators of economic performance other than growth at the macro level and profit at the micro level, because what we measure affects what we do.Keywords: economic and social rights, political economy, economic theory, markets
Procedia PDF Downloads 15214117 Specialised Centres in TERI Knowledge Resource Centre
Authors: Pallavi Singh
Abstract:
Developing library knowledge centres involves transforming traditional library spaces into dynamic, interactive environments that support collaborative learning, digital literacy, and access to various resources. Knowledge centres, also known as knowledge hubs or centres of excellence, play a crucial role in organizations and communities by serving as repositories of expertise and information. The Energy and Resources Institute (TERI) is a research organisation dedicated to sustainable community solutions. TERI Knowledge Resource Center is also aligned with the objective of the host organization within TERI; there are several specialized knowledge centers dedicated to various aspects of sustainability, energy, climate change, environmental management, green mobility, etc.Keywords: knowledge centres, environmental management, green mobility, energy
Procedia PDF Downloads 514116 Ethnobotanical Study, Phytochemical Screening, and Biological Activity of Culinary Spices Commonly Used in Ommdurman, Sudan
Authors: Randa M. T. Mohamed
Abstract:
Spices have long been used as traditional ingredients in the kitchen for seasoning, coloring, aromatic and food preservative properties. Besides, spices are equally used for therapeutic purposes. The objective of this study was to survey and document the medicinal properties of spices commonly used in the Sudanese kitchen for different food preparations. Also, extracts from reported spices were screened for the presence of secondary metabolites as well as their antioxidant and beta-lactamase inhibitory properties. This study was conducted in the Rekabbya Quartier in Omdurman, Khartoum State, Sudan. Information was collected by carrying out semi-structured interviews. All informants (30) in the present study were women. Spices were purchased from Attareen shop in Omdurman. Essential oils from spices were extracted by hydrodistillation, and ethanolic extracts by maceration. Phytochemical screening was performed by thin-layer chromatography (TLC). The antioxidant capacity of essential oils and ethanolic extracts was investigated through TLC bioautography. Beta lactamase inhibitory activity was performed by the acidimetric test. Ethnobotany study showed that a total of 16 spices were found to treat 36 ailments belonging to 10 categories. The most frequently claimed medicinal uses were for the digestive system diseases treated by 14 spices and respiratory system diseases treated by 8 spices. Gynecological problems were treated with 4 spices. Dermatological diseases were cured by 5 spices, while infections caused by tapeworms and other microbes causing dysentery were treated by 3 spices. 4 spices were used to treat bad breath, bleeding gum and toothache. Headache, eyes infection, cardiac stimulation and epilepsy were treated with one spice each. Other health problems like fatigue and loss of appetite, and low breast milk production were treated by 1, 3 and 2 spices, respectively. The majority (69%, 11/16) of spices were exported from different countries like India, China, Indonesia, Ethiopia, Egypt and Nigeria, while 31% (5/16) was cultivated in Sudan. Essential oils of all spices were rich in terpenes, while ethanolic extracts contained variable classes of secondary metabolites. Both essential oils and ethanolic extracts of all spices exerted considerable antioxidant activity. Only one extract, Syzygium aromaticum, possessed beta-lactamase inhibitory activity. In conclusion, this study could contribute to conserving information on traditional medicinal uses of spices in Sudan. Also, the results demonstrated the potential of some of these spices to exert beneficial antimicrobial and antioxidant effects. Detailed phytochemical and biological assays of these spices are recommended.Keywords: spices, enthnobotany, antioxidant, betalactamase inhibition
Procedia PDF Downloads 3014115 Matrix Method Posting
Authors: Varong Pongsai
Abstract:
The objective of this paper is introducing a new method of accounting posting which is called Matrix Method Posting. This method is based on the Matrix operation of pure Mathematics. Although, accounting field is classified as one of the social-science knowledge, many of accounting operations are placed by Mathematics sign and operation. Through the operation applying, it seems to be that the operations of Mathematics should be applied to accounting possibly. So, this paper tries to over-lap Mathematics logic to accounting logic smoothly. According to the context of discovery, deductive approach is employed to prove a simultaneously logical concept of both Mathematics and Accounting. The result proves that the Matrix can be placed to operate accounting perfectly, because Matrix and accounting logic also have a similarity concept which is balancing 2 sides during operations. Moreover, the Matrix posting also has a lot of benefit. It can help financial analyst calculating financial ratios comfortably. Furthermore, the matrix determinant which is a signature operation itself also helps auditors checking out the correction of clients’ recording. If the determinant is not equaled to 0, it will point out that the recording process of clients getting into the problem. Finally, the Matrix should be easily determining a concept of merger and consolidation far beyond the present day concept.Keywords: matrix method posting, deductive approach, determinant, accounting application
Procedia PDF Downloads 36714114 Complex Network Approach to International Trade of Fossil Fuel
Authors: Semanur Soyyigit Kaya, Ercan Eren
Abstract:
Energy has a prominent role for development of nations. Countries which have energy resources also have strategic power in the international trade of energy since it is essential for all stages of production in the economy. Thus, it is important for countries to analyze the weakness and strength of the system. On the other side, it is commonly believed that international trade has complex network properties. Complex network is a tool for the analysis of complex systems with heterogeneous agents and interaction between them. A complex network consists of nodes and the interactions between these nodes. Total properties which emerge as a result of these interactions are distinct from the sum of small parts (more or less) in complex systems. Thus, standard approaches to international trade are superficial to analyze these systems. Network analysis provides a new approach to analyze international trade as a network. In this network countries constitute nodes and trade relations (export or import) constitute edges. It becomes possible to analyze international trade network in terms of high degree indicators which are specific to complex systems such as connectivity, clustering, assortativity/disassortativity, centrality, etc. In this analysis, international trade of crude oil and coal which are types of fossil fuel has been analyzed from 2005 to 2014 via network analysis. First, it has been analyzed in terms of some topological parameters such as density, transitivity, clustering etc. Afterwards, fitness to Pareto distribution has been analyzed. Finally, weighted HITS algorithm has been applied to the data as a centrality measure to determine the real prominence of countries in these trade networks. Weighted HITS algorithm is a strong tool to analyze the network by ranking countries with regards to prominence of their trade partners. We have calculated both an export centrality and an import centrality by applying w-HITS algorithm to data.Keywords: complex network approach, fossil fuel, international trade, network theory
Procedia PDF Downloads 33614113 A Parallel Implementation of Artificial Bee Colony Algorithm within CUDA Architecture
Authors: Selcuk Aslan, Dervis Karaboga, Celal Ozturk
Abstract:
Artificial Bee Colony (ABC) algorithm is one of the most successful swarm intelligence based metaheuristics. It has been applied to a number of constrained or unconstrained numerical and combinatorial optimization problems. In this paper, we presented a parallelized version of ABC algorithm by adapting employed and onlooker bee phases to the Compute Unified Device Architecture (CUDA) platform which is a graphical processing unit (GPU) programming environment by NVIDIA. The execution speed and obtained results of the proposed approach and sequential version of ABC algorithm are compared on functions that are typically used as benchmarks for optimization algorithms. Tests on standard benchmark functions with different colony size and number of parameters showed that proposed parallelization approach for ABC algorithm decreases the execution time consumed by the employed and onlooker bee phases in total and achieved similar or better quality of the results compared to the standard sequential implementation of the ABC algorithm.Keywords: Artificial Bee Colony algorithm, GPU computing, swarm intelligence, parallelization
Procedia PDF Downloads 37814112 Role of Alternative Dispute Resolution (ADR) in Advancing UN-SDG 16 and Pathways to Justice in Kenya: Opportunities and Challenges
Authors: Thomas Njuguna Kibutu
Abstract:
The ability to access justice is an important facet of securing peaceful, just, and inclusive societies, as recognized by Goal 16 of the 2030 Agenda for Sustainable Development. Goal 16 calls for peace, justice, and strong institutions to promote the rule of law and access to justice at a global level. More specifically, Target 16.3 of the Goal aims to promote the rule of law at the national and international levels and ensure equal access to justice for all. On the other hand, it is now widely recognized that Alternative Dispute Resolution (hereafter, ADR) represents an efficient mechanism for resolving disputes outside the adversarial conventional court system of litigation or prosecution. ADR processes include but are not limited to negotiation, reconciliation, mediation, arbitration, and traditional conflict resolution. ADR has a number of advantages, including being flexible, cost-efficient, time-effective, and confidential, and giving the parties more control over the process and the results, thus promoting restorative justice. The methodology of this paper is a desktop review of books, journal articles, reports and government documents., among others. The paper recognizes that ADR represents a cornerstone of Africa’s, and more specifically, Kenya’s, efforts to promote inclusive, accountable, and effective institutions and achieve the objectives of goal 16. In Kenya, and not unlike many African countries, there has been an outcry over the backlog of cases that are yet to be resolved in the courts and the statistics have shown that the numbers keep on rising. While ADR mechanisms have played a major role in reducing these numbers, access to justice in the country remains a big challenge, especially to the subaltern. There is, therefore, a need to analyze the opportunities and challenges facing the application of ADR mechanisms as tools for accessing justice in Kenya and further discuss various ways in which we can overcome these challenges to make ADR an effective alternative to dispute resolution. The paper argues that by embracing ADR across various sectors and addressing existing shortcomings, Kenya can, over time, realize its vision of a more just and equitable society. This paper discusses the opportunities and challenges of the application of ADR in Kenya with a view to sharing the lessons and challenges with the wider African continent. The paper concludes that ADR mechanisms can provide critical pathways to justice in Kenya and the African continent in general but come with distinct challenges. The paper thus calls for concerted efforts of respective stakeholders to overcome these challenges.Keywords: mediation, arbitration, negotiation, reconsiliation, Traditional conflict resolution, sustainable development
Procedia PDF Downloads 3014111 PID Sliding Mode Control with Sliding Surface Dynamics based Continuous Control Action for Robotic Systems
Authors: Wael M. Elawady, Mohamed F. Asar, Amany M. Sarhan
Abstract:
This paper adopts a continuous sliding mode control scheme for trajectory tracking control of robot manipulators with structured and unstructured uncertain dynamics and external disturbances. In this algorithm, the equivalent control in the conventional sliding mode control is replaced by a PID control action. Moreover, the discontinuous switching control signal is replaced by a continuous proportional-integral (PI) control term such that the implementation of the proposed control algorithm does not require the prior knowledge of the bounds of unknown uncertainties and external disturbances and completely eliminates the chattering phenomenon of the conventional sliding mode control approach. The closed-loop system with the adopted control algorithm has been proved to be globally stable by using Lyapunov stability theory. Numerical simulations using the dynamical model of robot manipulators with modeling uncertainties demonstrate the superiority and effectiveness of the proposed approach in high speed trajectory tracking problems.Keywords: PID, robot, sliding mode control, uncertainties
Procedia PDF Downloads 50814110 Predicting Machine-Down of Woodworking Industrial Machines
Authors: Matteo Calabrese, Martin Cimmino, Dimos Kapetis, Martina Manfrin, Donato Concilio, Giuseppe Toscano, Giovanni Ciandrini, Giancarlo Paccapeli, Gianluca Giarratana, Marco Siciliano, Andrea Forlani, Alberto Carrotta
Abstract:
In this paper we describe a machine learning methodology for Predictive Maintenance (PdM) applied on woodworking industrial machines. PdM is a prominent strategy consisting of all the operational techniques and actions required to ensure machine availability and to prevent a machine-down failure. One of the challenges with PdM approach is to design and develop of an embedded smart system to enable the health status of the machine. The proposed approach allows screening simultaneously multiple connected machines, thus providing real-time monitoring that can be adopted with maintenance management. This is achieved by applying temporal feature engineering techniques and training an ensemble of classification algorithms to predict Remaining Useful Lifetime of woodworking machines. The effectiveness of the methodology is demonstrated by testing an independent sample of additional woodworking machines without presenting machine down event.Keywords: predictive maintenance, machine learning, connected machines, artificial intelligence
Procedia PDF Downloads 22614109 From Problem Space to Executional Architecture: The Development of a Simulator to Examine the Effect of Autonomy on Mainline Rail Capacity
Authors: Emily J. Morey, Kevin Galvin, Thomas Riley, R. Eddie Wilson
Abstract:
The key challenges faced by integrating autonomous rail operations into the existing mainline railway environment have been identified through the understanding and framing of the problem space and stakeholder analysis. This was achieved through the completion of the first four steps of Soft Systems Methodology, where the problem space has been expressed via conceptual models. Having identified these challenges, we investigated one of them, namely capacity, via the use of models and simulation. This paper examines the approach used to move from the conceptual models to a simulation which can determine whether the integration of autonomous trains can plausibly increase capacity. Within this approach, we developed an architecture and converted logical models into physical resource models and associated design features which were used to build a simulator. From this simulator, we are able to analyse mixtures of legacy-autonomous operations and produce fundamental diagrams and trajectory plots to describe the dynamic behaviour of mixed mainline railway operations.Keywords: autonomy, executable architecture, modelling and simulation, railway capacity
Procedia PDF Downloads 8314108 Recovering Cultural Heritage: Historical Insights into Ethiopia’s Unique Approach and Present Challenges
Authors: Mengistie Zewdu
Abstract:
Ethiopia is an un-colonized African state with rich cultural and natural heritage resources. Due to different reasons, Ethiopia has various cultural heritage resources residing in different countries. Started in the second half of the 19th century, different Ethiopian regimes have been working to recover the country’s cultural heritage treasures. Thus, the purpose of this article is to explore the endeavours that have been exerted to recover the cultural heritage of Ethiopia to their original place. As this article reveals, differed from other African countries’ endeavour for the restitution of their looted cultural treasures, Ethiopia’s approach to recover its cultural heritage is somewhat unique. This paper also argues that, although Ethiopia has been working for a century and a half to restitute its cultural heritages, the endeavours of Ethiopian governments to recover Ethiopia’s priceless cultural heritage have still been minimal. The efforts to recover Ethiopian cultural heritage have shown progress with increasing magnitude. However, large-scale endeavors are still needed to bring back the priceless cultural heritage resources to their country of origin.Keywords: Ethiopia, cultural heritage, plundered heritage, recovering cultural heritage, endeavor to recover cultural heritage
Procedia PDF Downloads 8114107 Toxicity Identification and Evaluation for the Effluent from Seawater Desalination Facility in Korea Using D. magna and V. fischeri
Authors: Sung Jong Lee, Hong Joo Ha, Chun Sang Hong
Abstract:
In recent years, the interests on the impacts of industrial wastewater on aquatic ecosystem have increased with concern about ecosystem protection and human health. Whole effluent toxicity tests are used to monitor toxicity by unknown toxic chemicals as well as conventional pollutants from industrial effluent discharges. This study describes the application of TIE (toxicity identification evaluation) procedures to an acutely toxic effluent from a Seawater desalination facility in industrial complex which was toxic to Daphnia magna. In TIE phase I (characterization step), the toxic effects by heavy metals, organic compounds, oxidants, volatile organic compounds, suspended solids and ammonia were screened and revealed that the source of toxicity is far from these toxicants group. Chemical analysis (TIE phase II) on TDS showed that the concentration of chloride ion (24,215 ~ 29,562 mg/L) was substantially higher than that predicted from EC50 for D. magna. In confirmation step (TIE phase III), chloride ion was demonstrated to be main toxicant in this effluent by the spiking approach, species sensitivity approach, and deletion approach. Calcium, potassium, magnesium, sodium, fluorine, sulfate ion concentration was not shown toxicity from D. magna. Finally, we concluded that chloride was the most contributing toxicant in the waste water treatment plant. Further research activities are needed for technical support of toxicity identification and evaluation on the various types of wastewater treatment plant discharge in Korea. Acknowledgement: This research was supported by a grant (16IFIP-B089911-03) from Plant Research Program funded by Ministry of Land, Infrastructure and Transport of Korean government.Keywords: TIE, D. magna, V. fischeri, seawater desalination facility
Procedia PDF Downloads 25914106 Modified Naive Bayes-Based Prediction Modeling for Crop Yield Prediction
Authors: Kefaya Qaddoum
Abstract:
Most of greenhouse growers desire a determined amount of yields in order to accurately meet market requirements. The purpose of this paper is to model a simple but often satisfactory supervised classification method. The original naive Bayes have a serious weakness, which is producing redundant predictors. In this paper, utilized regularization technique was used to obtain a computationally efficient classifier based on naive Bayes. The suggested construction, utilized L1-penalty, is capable of clearing redundant predictors, where a modification of the LARS algorithm is devised to solve this problem, making this method applicable to a wide range of data. In the experimental section, a study conducted to examine the effect of redundant and irrelevant predictors, and test the method on WSG data set for tomato yields, where there are many more predictors than data, and the urge need to predict weekly yield is the goal of this approach. Finally, the modified approach is compared with several naive Bayes variants and other classification algorithms (SVM and kNN), and is shown to be fairly good.Keywords: tomato yield prediction, naive Bayes, redundancy, WSG
Procedia PDF Downloads 23714105 Secure Data Sharing of Electronic Health Records With Blockchain
Authors: Kenneth Harper
Abstract:
The secure sharing of Electronic Health Records (EHRs) is a critical challenge in modern healthcare, demanding solutions to enhance interoperability, privacy, and data integrity. Traditional standards like Health Information Exchange (HIE) and HL7 have made significant strides in facilitating data exchange between healthcare entities. However, these approaches rely on centralized architectures that are often vulnerable to data breaches, lack sufficient privacy measures, and have scalability issues. This paper proposes a framework for secure, decentralized sharing of EHRs using blockchain technology, cryptographic tokens, and Non-Fungible Tokens (NFTs). The blockchain's immutable ledger, decentralized control, and inherent security mechanisms are leveraged to improve transparency, accountability, and auditability in healthcare data exchanges. Furthermore, we introduce the concept of tokenizing patient data through NFTs, creating unique digital identifiers for each record, which allows for granular data access controls and proof of data ownership. These NFTs can also be employed to grant access to authorized parties, establishing a secure and transparent data sharing model that empowers both healthcare providers and patients. The proposed approach addresses common privacy concerns by employing privacy-preserving techniques such as zero-knowledge proofs (ZKPs) and homomorphic encryption to ensure that sensitive patient information can be shared without exposing the actual content of the data. This ensures compliance with regulations like HIPAA and GDPR. Additionally, the integration of Fast Healthcare Interoperability Resources (FHIR) with blockchain technology allows for enhanced interoperability, enabling healthcare organizations to exchange data seamlessly and securely across various systems while maintaining data governance and regulatory compliance. Through real-world case studies and simulations, this paper demonstrates how blockchain-based EHR sharing can reduce operational costs, improve patient outcomes, and enhance the security and privacy of healthcare data. This decentralized framework holds great potential for revolutionizing healthcare information exchange, providing a transparent, scalable, and secure method for managing patient data in a highly regulated environment.Keywords: blockchain, electronic health records (ehrs), fast healthcare interoperability resources (fhir), health information exchange (hie), hl7, interoperability, non-fungible tokens (nfts), privacy-preserving techniques, tokens, secure data sharing,
Procedia PDF Downloads 2114104 Comparative Study of Traditional Old and Recent Clay Bricks in the Southwest of Tunisia: Chemical, Mineralogical and Physical Properties
Authors: N. Majouri, J. Sghaier, M. El Mankibi
Abstract:
The history of brick manufacturing in south-west Tunisia dates back 1000 years. Most of the bricks are made at local workshops near to the clay supply site. This experimental study aims at studying and comparing the chemical, mineralogical and physical characterization of ancient and recent clay bricks in south-western Tunisia. This was done by collecting a large sample of clay brick specimens from four sites. There was much variability in the properties. The results revealed that there is a difference of up to 50% between old and new bricks; in chemical composition, mineralogy composition and porosity, which are much lower in recent clay bricks.Keywords: clay bricks, chemical properties, mineralogical properties, physical properties
Procedia PDF Downloads 8114103 Effective Retirement Planning: Exploring Financial Planning Behavior in Malaysia
Authors: Stanley Yap Peng Lok, Chong Wei Ying, Leow Hon Wei, Fatemeh Kimiyaghalam
Abstract:
Purpose: This paper examines how people treat on the importance of financial planning for their retirement. There is lack of standard instrument that enable us to access the retirement planning behavior. This paper studies the reliability and validity of a proposed scale for accessing this behavior. Design/methodology/approach: The Retirement Planning Behavior scale (RPB) is developed from the results of reviewing different papers on this topic. A total of 900 Malaysians from the age of 18 and above are used as the sample. Findings: Our results show, firstly, the RPB meets all criteria from the instrument reliability and validity which based on the theory of planned behavior. Second, our findings propose two components for this RPB scale; attitude toward planning for retirement and intention towards retirement planning behavior. Practical implication: An effective retirement planning achieves financial independence after the retirement. Our findings have important implications for the scope and significance of the retirement planning behavior measurement, especially for retirees. Originality/value: This study proposes a new approach to cater consumers’ needs for retirement planning. Therefore, consumers are able to achieve financial independence in their retirement age.Keywords: retirement planning behavior (RPB) scale, reliability, validity, retirement planning, financial independence
Procedia PDF Downloads 40714102 GIS Based Project Management Information System for Infrastructure Projects
Authors: Riki Panchal, Debasis Sarkar
Abstract:
This paper describes the work done for the GIS-based project management for different infrastructure projects. It is a review paper which gives the idea of the trends in the construction project management and various models adopted for the betterment of the project planning and execution. Traditional scheduling and progress control techniques such as bar charts and the critical path method fail to provide information pertaining to the spatial aspects of a construction project. An integrated system was developed to represent construction progress not only in terms of a CPM schedule but also in terms of a graphical representation of the construction that is synchronized with the work schedule. Hence, it is suggested to work on the common platform from where all the data can be shared and analyzed.Keywords: GIS, project management, integrated model, infrastructure project
Procedia PDF Downloads 51914101 Designing a Model to Increase the Flow of Circular Economy Startups Using a Systemic and Multi-Generational Approach
Authors: Luís Marques, João Rocha, Andreia Fernandes, Maria Moura, Cláudia Caseiro, Filipa Figueiredo, João Nunes
Abstract:
The implementation of circularity strategies other than recycling, such as reducing the amount of raw material, as well as reusing or sharing existing products, remains marginal. The European Commission announced that the transition towards a more circular economy could lead to the net creation of about 700,000 jobs in Europe by 2030, through additional labour demand from recycling plants, repair services and other circular activities. Efforts to create new circular business models in accordance with completely circular processes, as opposed to linear ones, have increased considerably in recent years. In order to create a societal Circular Economy transition model, it is necessary to include innovative solutions, where startups play a key role. Early-stage startups based on new business models according to circular processes often face difficulties in creating enough impact. The StartUp Zero Program designs a model and approach to increase the flow of startups in the Circular Economy field, focusing on a systemic decision analysis and multi-generational approach, considering Multi-Criteria Decision Analysis to support a decision-making tool, which is also supported by the use of a combination of an Analytical Hierarchy Process and Multi-Attribute Value Theory methods. We define principles, criteria and indicators for evaluating startup prerogatives, quantifying the evaluation process in a unique result. Additionally, this entrepreneurship program spanning 16 months involved more than 2400 young people, from ages 14 to 23, in more than 200 interaction activities.Keywords: circular economy, entrepreneurship, startups;, multi-criteria decision analysis
Procedia PDF Downloads 10514100 Improved Throttled Load Balancing Approach for Cloud Environment
Authors: Sushant Singh, Anurag Jain, Seema Sabharwal
Abstract:
Cloud computing is advancing with a rapid speed. Already, it has been adopted by a huge set of users. Easy to use and anywhere access like potential of cloud computing has made it more attractive relative to other technologies. This has resulted in reduction of deployment cost on user side. It has also allowed the big companies to sell their infrastructure to recover the installation cost for the organization. Roots of cloud computing have extended from Grid computing. Along with the inherited characteristics of its predecessor technologies it has also adopted the loopholes present in those technologies. Some of the loopholes are identified and corrected recently, but still some are yet to be rectified. Two major areas where still scope of improvement exists are security and performance. The proposed work is devoted to performance enhancement for the user of the existing cloud system by improving the basic throttled mapping approach between task and resources. The improved procedure has been tested using the cloud analyst simulator. The results are compared with the original and it has been found that proposed work is one step ahead of existing techniques.Keywords: cloud analyst, cloud computing, load balancing, throttled
Procedia PDF Downloads 24914099 Capturing the Stress States in Video Conferences by Photoplethysmographic Pulse Detection
Authors: Jarek Krajewski, David Daxberger
Abstract:
We propose a stress detection method based on an RGB camera using heart rate detection, also known as Photoplethysmography Imaging (PPGI). This technique focuses on the measurement of the small changes in skin colour caused by blood perfusion. A stationary lab setting with simulated video conferences is chosen using constant light conditions and a sampling rate of 30 fps. The ground truth measurement of heart rate is conducted with a common PPG system. The proposed approach for pulse peak detection is based on a machine learning-based approach, applying brute force feature extraction for the prediction of heart rate pulses. The statistical analysis showed good agreement (correlation r = .79, p<0.05) between the reference heart rate system and the proposed method. Based on these findings, the proposed method could provide a reliable, low-cost, and contactless way of measuring HR parameters in daily-life environments.Keywords: heart rate, PPGI, machine learning, brute force feature extraction
Procedia PDF Downloads 12314098 Comparing Xbar Charts: Conventional versus Reweighted Robust Estimation Methods for Univariate Data Sets
Authors: Ece Cigdem Mutlu, Burak Alakent
Abstract:
Maintaining the quality of manufactured products at a desired level depends on the stability of process dispersion and location parameters and detection of perturbations in these parameters as promptly as possible. Shewhart control chart is the most widely used technique in statistical process monitoring to monitor the quality of products and control process mean and variability. In the application of Xbar control charts, sample standard deviation and sample mean are known to be the most efficient conventional estimators in determining process dispersion and location parameters, respectively, based on the assumption of independent and normally distributed datasets. On the other hand, there is no guarantee that the real-world data would be normally distributed. In the cases of estimated process parameters from Phase I data clouded with outliers, efficiency of traditional estimators is significantly reduced, and performance of Xbar charts are undesirably low, e.g. occasional outliers in the rational subgroups in Phase I data set may considerably affect the sample mean and standard deviation, resulting a serious delay in detection of inferior products in Phase II. For more efficient application of control charts, it is required to use robust estimators against contaminations, which may exist in Phase I. In the current study, we present a simple approach to construct robust Xbar control charts using average distance to the median, Qn-estimator of scale, M-estimator of scale with logistic psi-function in the estimation of process dispersion parameter, and Harrell-Davis qth quantile estimator, Hodge-Lehmann estimator and M-estimator of location with Huber psi-function and logistic psi-function in the estimation of process location parameter. Phase I efficiency of proposed estimators and Phase II performance of Xbar charts constructed from these estimators are compared with the conventional mean and standard deviation statistics both under normality and against diffuse-localized and symmetric-asymmetric contaminations using 50,000 Monte Carlo simulations on MATLAB. Consequently, it is found that robust estimators yield parameter estimates with higher efficiency against all types of contaminations, and Xbar charts constructed using robust estimators have higher power in detecting disturbances, compared to conventional methods. Additionally, utilizing individuals charts to screen outlier subgroups and employing different combination of dispersion and location estimators on subgroups and individual observations are found to improve the performance of Xbar charts.Keywords: average run length, M-estimators, quality control, robust estimators
Procedia PDF Downloads 19014097 CFD Study of Subcooled Boiling Flow at Elevated Pressure Using a Mechanistic Wall Heat Partitioning Model
Authors: Machimontorn Promtong, Sherman C. P. Cheung, Guan H. Yeoh, Sara Vahaji, Jiyuan Tu
Abstract:
The wide range of industrial applications involved with boiling flows promotes the necessity of establishing fundamental knowledge in boiling flow phenomena. For this purpose, a number of experimental and numerical researches have been performed to elucidate the underlying physics of this flow. In this paper, the improved wall boiling models, implemented on ANSYS CFX 14.5, were introduced to study subcooled boiling flow at elevated pressure. At the heated wall boundary, the Fractal model, Force balance approach and Mechanistic frequency model are given for predicting the nucleation site density, bubble departure diameter, and bubble departure frequency. The presented wall heat flux partitioning closures were modified to consider the influence of bubble sliding along the wall before the lift-off, which usually happens in the flow boiling. The simulation was performed based on the Two-fluid model, where the standard k-ω SST model was selected for turbulence modelling. Existing experimental data at around 5 bars were chosen to evaluate the accuracy of the presented mechanistic approach. The void fraction and Interfacial Area Concentration (IAC) are in good agreement with the experimental data. However, the predicted bubble velocity and Sauter Mean Diameter (SMD) are over-predicted. This over-prediction may be caused by consideration of only dispersed and spherical bubbles in the simulations. In the future work, the important physical mechanisms of bubbles, such as merging and shrinking during sliding on the heated wall will be incorporated into this mechanistic model to enhance its capability for a wider range of flow prediction.Keywords: subcooled boiling flow, computational fluid dynamics (CFD), mechanistic approach, two-fluid model
Procedia PDF Downloads 31814096 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon
Authors: Jessy Abouarab
Abstract:
For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women
Procedia PDF Downloads 14314095 Commitment Dynamics: Generational Variations in Romantic Relationships among Gen X, Millennials and Gen Z
Authors: Ispreha Bailung
Abstract:
Background: Romantic commitment has evolved across generations, influenced by societal, cultural, and technological changes. This study explores how Generation X, Millennials, and Gen Z perceive, develop, and sustain commitment, with a focus on family, society, and technology. The objectives are to uncover generational differences, identify barriers to commitment, and examine cultural influences, offering insights to foster healthier relationships in a shifting world. Method: A phenomenological approach was used to examine generational differences in romantic commitment dynamics. Fifteen participants (five from each generation) were recruited online. Inclusion criteria required participants to identify with a specified generation and have romantic relationship experience. Semi-structured interviews (60–90 minutes) were conducted, focusing on personal experiences, values, and technology's influence on commitment. Interviews were recorded, transcribed, and analyzed thematically. Ethical protocols ensured participant well-being and data integrity. Findings: Generational shifts in commitment were observed, with Gen X emphasizing traditional values like marriage and loyalty, Millennials balancing tradition with personal fulfillment, and Gen Z prioritizing autonomy and mental well-being. Technology, such as dating apps and social media, created option overload and skepticism about authenticity. Despite increasing individualization, family influence remained significant. Key barriers to commitment included emotional detachment, career priorities, and trust issues, reflecting a broader shift toward more flexible and individualized relationships. Conclusion: This study provides valuable insights into generational differences in commitment dynamics, highlighting shifts in how commitment is viewed and enacted. While the study contributes to understanding evolving perspectives, the findings are limited by a small sample size, potential cultural biases, and the short-term nature of the research, limiting generalizability. Future Implications: Future research should focus on cross-cultural and longitudinal studies to track changes in commitment perceptions. Examining digital communication’s impact on relationship satisfaction and exploring new frameworks for assessing relationship success will further inform understanding and policymaking in the context of evolving romantic dynamics.Keywords: generational differences, commitment dynamics, romantic relationships, emotional compatibility, social media
Procedia PDF Downloads 014094 Motivating the Independent Learner at the Arab Open University, Kuwait Branch
Authors: Hassan Sharafuddin, Chekra Allani
Abstract:
Academicians at the Arab Open University have always voiced their concern about the efficacy of the blended learning process. Based on 75% independent study and 25% face-to-face tutorial, it poses the challenge of the predisposition to adjustment. Being used to the psychology of traditional educational systems, AOU students cannot be easily weaned from being spoon-fed. Hence they lack the motivation to plunge into self-study. For better involvement of AOU students into the learning practices, it is imperative to diagnose the factors that impede or increase their motivation. This is conducted through an empirical study grounded upon observations and tested hypothesis and aimed at monitoring and optimizing the students’ learning outcome. Recommendations of the research will follow the findings.Keywords: academic performance, blended learning, educational psychology, independent study, pedagogy
Procedia PDF Downloads 435