Search results for: panel data analysis
38890 Design and Analysis of a Lightweight Fire-Resistant Door
Authors: Zainab Fadil, Mouath Alawadhi, Abdullah Alhusainan, Fahad Alqadiri, Abdulaziz Alqadiri
Abstract:
This study investigates how lightweight a fire resistance door will perform with under types of insulation materials. Data is initially collected from various websites, scientific books and research papers. Results show that different layers of insulation in a single door can perform better than one insulator. Furthermore, insulation materials that are lightweight, high strength and low thermal conductivity are the most preferred for fire-rated doors. Whereas heavy weight, low strength, and high thermal conductivity are least preferred for fire-resistance doors. Fire-rated doors specifications, theoretical test methodology, structural analysis, and comparison between five different models with diverse layers insulations are presented. Five different door models are being investigated with different insulation materials and arrangements. Model 1 contains an air gap between door layers. Model 2 includes phenolic foam, mild steel and polyurethane. Model 3 includes phenolic foam and glass wool. Model 4 includes polyurethane and glass wool. Model 5 includes only rock wool between the door layers. It is noticed that model 5 is the most efficient model and its design is simple compared to other models. For this model, numerical calculations are performed to check its efficiency and the results are compared to data from experiments for validation. Good agreement was noticed.Keywords: fire resistance, insulation, strength, thermal conductivity, lightweight, layers
Procedia PDF Downloads 8938889 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 3038888 The Antecedent Variables of Government Financial Accounting System (SAKD) Implementation and Its Consequences: Empirical Study on the Device of Regional Coordinating Agency for Development of Cross County, City Region III Central Java Province, Indo
Authors: Dona Primasari
Abstract:
This study examines the antecedent variables of Government Financial Acccounting System (SAKD) implementation and its consequence. The antecedent variables are: decentralization of decision making, adaptation, and the manager support. The consequences are satisfaction and performance officer. This research represents the empirical test which used convenience sampling technics in data collection. The data were collected from 167 officers of local government in the Regional Coordinating Agency for Development of Cross County/City Region III Central Java Province. Data analysis used Structural Equation Model (SEM) with the AMOS 18.0 program. The result of hypothesis examination indicates that six raised hypothesis are accepted and two hypothesis are rejected.Keywords: decentralization of decision making, adaptation officer, manager support, implementation of Government Accounting Financial System (SAKD), satisfaction and performance officer
Procedia PDF Downloads 38938887 Risks beyond Cyber in IoT Infrastructure and Services
Authors: Mattias Bergstrom
Abstract:
Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.Keywords: IoT, security, infrastructure, SCADA, blockchain, AI
Procedia PDF Downloads 10738886 Sequence Stratigraphy and Petrophysical Analysis of Sawan Gas Field, Central Indus Basin, Pakistan
Authors: Saeed Ur Rehman Chaudhry
Abstract:
The objectives of the study are to reconstruct sequence stratigraphic framework and petrophysical analysis of the reservoir marked by using sequence stratigraphy of Sawan Gas Field. The study area lies in Central Indus Basin, District Khairpur, Sindh province, Pakistan. The study area lies tectonically in an extensional regime. Lower Goru Formation and Sembar Formation act as a reservoir and source respectively. To achieve objectives, data set of seismic lines, consisting of seismic lines PSM96-114, PSM96-115, PSM96-133, PSM98-201, PSM98-202 and well logs of Sawan-01, Sawan-02 and Gajwaro-01 has been used. First of all interpretation of seismic lines has been carried out. Interpretation of seismic lines shows extensional regime in the area and cut entire Cretaceous section. Total of seven reflectors has been marked on each seismic line. Lower Goru Formation is thinning towards west. Seismic lines also show eastward tilt of stratigraphy due to uplift at the western side. Sequence stratigraphic reconstruction has been done by integrating seismic and wireline log data. Total of seven sequence boundaries has been interpreted between the top of Chiltan Limestone to Top of Lower Goru Formation. It has been observed on seismic lines that Sembar Formation initially generated shelf margin profile and then ramp margin on which Lower Goru deposition took place. Shelf edge deltas and slope fans have been observed on seismic lines, and signatures of slope fans are also observed on wireline logs as well. Total of six sequences has been interpreted. Stratigraphic and sequence stratigraphic correlation has been carried out by using Sawan 01, Sawan 02 and Gajwaro 01 and a Low Stand Systems tract (LST) within Lower Goru C sands has been marked as a zone of interest. The petrophysical interpretation includes shale volume, effective porosity, permeability, saturation of water and hydrocarbon. On the basis of good effective porosity and hydrocarbon saturation petrophysical analysis confirms that the LST in Sawan-01 and Sawan-02 has good hydrocarbon potential.Keywords: petrophysical analysis, reservoir potential, Sawan Gas Field, sequence stratigraphy
Procedia PDF Downloads 26238885 An Evolutionary Algorithm for Optimal Fuel-Type Configurations in Car Lines
Authors: Charalampos Saridakis, Stelios Tsafarakis
Abstract:
Although environmental concern is on the rise across Europe, current market data indicate that adoption rates of environmentally friendly vehicles remain extremely low. Against this background, the aim of this paper is to a) assess preferences of European consumers for clean-fuel cars and their characteristics and b) design car lines that optimize the combination of fuel types among models in the line-up. In this direction, the authors introduce a new evolutionary mechanism and implement it to stated-preference data derived from a large-scale choice-based conjoint experiment that measures consumer preferences for various factors affecting clean-fuel vehicle (CFV) adoption. The proposed two-step methodology provides interesting insights into how new and existing fuel-types can be combined in a car line that maximizes customer satisfaction.Keywords: clean-fuel vehicles, product line design, conjoint analysis, choice experiment, differential evolution
Procedia PDF Downloads 27938884 Geodesign Application for Bio-Swale Design: A Data-Driven Design Approach for a Case Site in Ottawa Street North in Hamilton, Ontario, Canada
Authors: Adele Pierre, Nadia Amoroso
Abstract:
Changing climate patterns are resulting in increased in storm severity, challenging traditional methods of managing stormwater runoff. This research compares a system of bioswales to existing curb and gutter infrastructure in a post-industrial streetscape of Hamilton, Ontario. Using the geodesign process, including rule-based set parameters and an integrated approach combining geospatial information with stakeholder input, a section of Ottawa St. North was modelled to show how green infrastructure can ease the burden on aging, combined sewer systems. Qualitative data was gathered from residents of the neighbourhood through field notes, and quantitative geospatial data through GIS and site analysis. Parametric modelling was used to generate multiple design scenarios, each visualizing resulting impacts on stormwater runoff along with their calculations. The selected design scenarios offered both an aesthetically pleasing urban bioswale street-scape system while minimizing and controlling stormwater runoff. Interactive maps, videos and the 3D model were presented for stakeholder comment via ESRI’s (Environmental System Research Institute) web-scene. The results of the study demonstrate powerful tools that can assist landscape architects in designing, collaborating and communicating stormwater strategies.Keywords: bioswale, geodesign, data-driven and rule-based design, geodesign, GIS, stormwater management
Procedia PDF Downloads 18138883 EEG Signal Processing Methods to Differentiate Mental States
Authors: Sun H. Hwang, Young E. Lee, Yunhan Ga, Gilwon Yoon
Abstract:
EEG is a very complex signal with noises and other bio-potential interferences. EOG is the most distinct interfering signal when EEG signals are measured and analyzed. It is very important how to process raw EEG signals in order to obtain useful information. In this study, the EEG signal processing techniques such as EOG filtering and outlier removal were examined to minimize unwanted EOG signals and other noises. The two different mental states of resting and focusing were examined through EEG analysis. A focused state was induced by letting subjects to watch a red dot on the white screen. EEG data for 32 healthy subjects were measured. EEG data after 60-Hz notch filtering were processed by a commercially available EOG filtering and our presented algorithm based on the removal of outliers. The ratio of beta wave to theta wave was used as a parameter for determining the degree of focusing. The results show that our algorithm was more appropriate than the existing EOG filtering.Keywords: EEG, focus, mental state, outlier, signal processing
Procedia PDF Downloads 28438882 Slope Instability Study Using Kinematic Analysis and Lineament Density Mapping along a Part of National Highway 58, Uttarakhand, India
Authors: Kush Kumar, Varun Joshi
Abstract:
Slope instability is a major problem of the mountainous region, especially in parts of the Indian Himalayan Region (IHR). The on-going tectonic, rugged topography, steep slope, heavy precipitation, toe erosion, structural discontinuities, and deformation are the main triggering factors of landslides in this region. Besides the loss of life, property, and infrastructure caused by a landslide, it also results in various environmental problems, i.e., degradation of slopes, land use, river quality by increased sediments, and loss of well-established vegetation. The Indian state of Uttarakhand, being a part of the active Himalayas, also faces numerous cases of slope instability. Therefore, the vulnerable landslide zones need to be delineated to safeguard various losses. The study area is focused in Garhwal and Tehri -Garhwal district of Uttarakhand state along National Highway 58, which is a strategic road and also connects the four important sacred pilgrims (Char Dham) of India. The lithology of these areas mainly comprises of sandstone, quartzite of Chakrata formation, and phyllites of Chandpur formation. The greywacke and sandstone rock of Saknidhar formation dips northerly and is overlain by phyllite of Chandpur formation. The present research incorporates the lineament density mapping using remote sensing satellite data supplemented by a detailed field study via kinematic analysis. The DEM data of ALOS PALSAR (12.5 m resolution) is resampled to 10 m resolution and used for preparing various thematic maps such as slope, aspect, drainage, hill shade, lineament, and lineament density using ARCGIS 10.6 software. Furthermore, detailed field mapping, including structural mapping, geomorphological mapping, is integrated for kinematic analysis of the slope using Dips 6.0 software of Rockscience. The kinematic analysis of 40 locations was carried out, among which 15 show the planar type of failure, five-show wedge failure, and rest, 20 show no failures. The lineament density map is overlapped with the location of the unstable slope inferred from kinematic analysis to infer the association of the field information and remote sensing derived information, and significant compatibility was observed. With the help of the present study, location-specific mitigation measures could be suggested. The mitigation measures would be helping in minimizing the probability of slope instability, especially during the rainy season, and reducing the hampering of road traffic.Keywords: Indian Himalayan Region, kinematic analysis, lineament density mapping, slope instability
Procedia PDF Downloads 13838881 Clinical Correlates of Suicide Attempts in Trauma-Exposed Youth
Authors: Sandra Landy
Abstract:
Traumatic experiences in youth are a major risk factor for future suicidality. With suicide steadily increasing over the last 20 years as one of the top three leading causes of death in children and adolescents, it is essential to examine the aspects of trauma that contribute to suicidality. A quantitative secondary data analysis of a prospective, multicenter 24-month observational study of youth who have experienced traumatic experiences was utilized to determine the relationship between bullying and suicide attempts, cyberbullying and suicide attempts, and number of traumas and suicide attempts. Data was analyzed with the Spearman-rank correlation test to determine the relationships. Findings supported past research establishing a relationship between bulling, including cyberbullying, and suicide attempts, as well as increasing number of traumatic experiences and suicide attempts. Further large scale studies may be beneficial to support these findings.Keywords: adolescent(s), suicide, trauma, bullying, cyberbullying
Procedia PDF Downloads 4538880 Leveraging xAPI in a Corporate e-Learning Environment to Facilitate the Tracking, Modelling, and Predictive Analysis of Learner Behaviour
Authors: Libor Zachoval, Daire O Broin, Oisin Cawley
Abstract:
E-learning platforms, such as Blackboard have two major shortcomings: limited data capture as a result of the limitations of SCORM (Shareable Content Object Reference Model), and lack of incorporation of Artificial Intelligence (AI) and machine learning algorithms which could lead to better course adaptations. With the recent development of Experience Application Programming Interface (xAPI), a large amount of additional types of data can be captured and that opens a window of possibilities from which online education can benefit. In a corporate setting, where companies invest billions on the learning and development of their employees, some learner behaviours can be troublesome for they can hinder the knowledge development of a learner. Behaviours that hinder the knowledge development also raise ambiguity about learner’s knowledge mastery, specifically those related to gaming the system. Furthermore, a company receives little benefit from their investment if employees are passing courses without possessing the required knowledge and potential compliance risks may arise. Using xAPI and rules derived from a state-of-the-art review, we identified three learner behaviours, primarily related to guessing, in a corporate compliance course. The identified behaviours are: trying each option for a question, specifically for multiple-choice questions; selecting a single option for all the questions on the test; and continuously repeating tests upon failing as opposed to going over the learning material. These behaviours were detected on learners who repeated the test at least 4 times before passing the course. These findings suggest that gauging the mastery of a learner from multiple-choice questions test scores alone is a naive approach. Thus, next steps will consider the incorporation of additional data points, knowledge estimation models to model knowledge mastery of a learner more accurately, and analysis of the data for correlations between knowledge development and identified learner behaviours. Additional work could explore how learner behaviours could be utilised to make changes to a course. For example, course content may require modifications (certain sections of learning material may be shown to not be helpful to many learners to master the learning outcomes aimed at) or course design (such as the type and duration of feedback).Keywords: artificial intelligence, corporate e-learning environment, knowledge maintenance, xAPI
Procedia PDF Downloads 12138879 Nurse-Identified Barriers and Facilitators to Delivering End-of-Life Care in a Cardiac Intensive Care Unit: A Qualitative Study
Authors: Elena Ivany, Leanne Aitken
Abstract:
Little is known about the delivery of end-of-life care in cardiac intensive care unit (CICU) settings. The aims of this study were to highlight the nurse-identified barriers and facilitators to delivering end-of-life care in the CICU, and to identify whether any of the barriers and/or facilitators are specific to the CICU setting. This was an exploratory qualitative study utilizing semi-structured individual interviews as the data collection method and inductive thematic analysis to structure the data. Six CICU nurses took part in the study. Five key themes were identified, each theme including both barriers and facilitators. The five key themes are as follows: patient-centered care, emotional challenges, reaching concordance, nursing contribution and the surgical intensive care unit.Keywords: end-of-life, cardiovascular disease, cardiac surgery, critical care
Procedia PDF Downloads 26538878 Model for Introducing Products to New Customers through Decision Tree Using Algorithm C4.5 (J-48)
Authors: Komol Phaisarn, Anuphan Suttimarn, Vitchanan Keawtong, Kittisak Thongyoun, Chaiyos Jamsawang
Abstract:
This article is intended to analyze insurance information which contains information on the customer decision when purchasing life insurance pay package. The data were analyzed in order to present new customers with Life Insurance Perfect Pay package to meet new customers’ needs as much as possible. The basic data of insurance pay package were collect to get data mining; thus, reducing the scattering of information. The data were then classified in order to get decision model or decision tree using Algorithm C4.5 (J-48). In the classification, WEKA tools are used to form the model and testing datasets are used to test the decision tree for the accurate decision. The validation of this model in classifying showed that the accurate prediction was 68.43% while 31.25% were errors. The same set of data were then tested with other models, i.e. Naive Bayes and Zero R. The results showed that J-48 method could predict more accurately. So, the researcher applied the decision tree in writing the program used to introduce the product to new customers to persuade customers’ decision making in purchasing the insurance package that meets the new customers’ needs as much as possible.Keywords: decision tree, data mining, customers, life insurance pay package
Procedia PDF Downloads 42838877 Comparison of Conjunctival Autograft versus Amniotic Membrane Transplantation for Pterygium Surgery
Authors: Luksanaporn Krungkraipetch
Abstract:
Currently, surgery is the only known effective treatment for pterygium. In certain groups, the probability of recurrence after basic sclera excision is very significant. Tissue grafting is substantially more time-consuming and challenging than keeping the sclera uncovered, but it reduces the chance of recurrence. Conjunctival autograft surgery is older than amniotic membrane graft surgery. The purpose of this study was to compare pterygium surgery with conjunctival autograft against an amniotic membrane transplant. In the study, a randomized controlled trial was used. Four cases were ruled out (two for failing to meet inclusion criteria and the other for refusing to participate). Group I (n = 40) received the intervention, whereas Group II (n = 40) served as the control. Both descriptive and inferential statistical approaches were used, including data analysis and data analysis statistics. The descriptive statistics analysis covered basic pterygium surgery information as well as the risk of recurrent pterygium. As an inferential statistic, the chi-square was used. A p-value of 0.05 is statistically significant. The findings of this investigation were the majority of patients in Group I were female (70.0%), aged 41–60 years, had no underlying disease (95.0%), and had nasal pterygium (97.5%). The majority of Group II patients were female (60.0%), aged 41–60 years, had no underlying disease (97.5%) and had nasal pterygium (97.5%). Group I had no recurrence of pterygium after surgery, but Group II had a 7.5% recurrence rate. Typically, the recurrence time is twelve months. The majority of pterygium recurrences occur in females (83.3%), between the ages of 41 and 60 (66.7%), with no underlying disease. The recurrence period is typically six months (60%) and a nasal pterygium site (83.3%). Pterygium recurrence after surgery is associated with nasal location (p =.002). 16.7% of pterygium surgeries result in complications; one woman with nasal pterygium underwent autograft surgery six months later. The presence of granulation tissue at the surgical site is a mild complication. A pterygium surgery recurrence rate comparison of conjunctival autograft and amniotic membrane transplantation revealed that conjunctival autograft had a higher recurrence rate than amniotic membrane transplantation (p =.013).Keywords: pterygium, pterygium surgery, conjunctival autograft, amniotic membrane transplantation
Procedia PDF Downloads 7038876 The Metaproteomic Analysis of HIV Uninfected Exposed Infants’ Gut Microbiome to Help Understand Their Poor Health Statuses in An African Cohort
Authors: Tara Miller, Tariq Ganief, Jonathan Blackburn
Abstract:
Millions of babies are still born to HIV-infected mothers each year despite the ramped-up HAART use. However, these infants are HIV uninfected but exposed, which is now a growing population that has weakened immune systems and poorer outcomes. Due to HIV exposure and possible ARV exposure during pregnancy and breastfeeding, these infants are believed to have altered immune responses and microbiomes when compared to their healthy counterparts. The gut microbiome roles an important role in infant development, specifically in the immune system. Research has shown these HIV-exposed, uninfected infants have weaker immune responses to their neonate vaccines, and in developing countries, this leaves them vulnerable to opportunistic disease. By gaining a deeper understanding of the gut microbiome and the products of the microbes via metaproteomic analysis, we can hopefully understand and improve the immune system and health of these infants. To investigate the metaproteome of the infants’ guts, mass spectrometry will be used, followed by data analysis using DIA-NN. The hypothesized results are that the HIV-exposed, uninfected infants have an altered microbiome compared to their healthy counterparts. Additionally, the differences found are hypothesized to be involved with inflammation which would contribute to the poor health of the infants.Keywords: HIV, mass spectrometry, metaproteomics, microbiome
Procedia PDF Downloads 9138875 Eliminating Injury in the Work Place and Realizing Vision Zero Using Accident Investigation and Analysis as Method: A Case Study
Authors: Ramesh Kumar Behera, Md. Izhar Hassan
Abstract:
Accident investigation and analysis are useful to identify deficiencies in plant, process, and management practices and formulate preventive strategies for injury elimination. In India and other parts of the world, industrial accidents are investigated to know the causes and also to fulfill legal compliances. However, findings of investigation are seldom used appropriately to strengthen Occupational Safety and Health (OSH) in expected lines. The mineral rich state of Odisha in eastern coast of India; known as a hub for Iron and Steel industries, witnessed frequent accidents during 2005-2009. This article based on study of 982 fatal ‘factory-accidents’ occurred in Odisha during the period 2001-2016, discusses the ‘turnaround-story’ resulting in reduction of fatal accident from 122 in 2009 to 45 in 2016. This paper examines various factors causing incidents; accident pattern in steel and chemical sector; role of climate and harsh weather conditions on accident causation. Software such as R, SQL, MS-Excel and Tableau were used for analysis of data. It is found that maximum fatality is caused due to ‘fall from height’ (24%); steel industries are relatively more accident prone; harsh weather conditions of summer increase chances of accident by 20%. Further, the study suggests that enforcement of partial work-restriction around lunch time during peak summer, screening and training of employees reduce accidents due to fall from height. The study indicates that learning from accident investigation and analysis can be used as a method to reduce work related accidents in the journey towards ‘Vision Zero’.Keywords: accident investigation and analysis, fatal accidents in India, fall from height, vision zero
Procedia PDF Downloads 15538874 Analysis of Secondary School Students' Perceptions about Information Technologies through a Word Association Test
Authors: Fetah Eren, Ismail Sahin, Ismail Celik, Ahmet Oguz Akturk
Abstract:
The aim of this study is to discover secondary school students’ perceptions related to information technologies and the connections between concepts in their cognitive structures. A word association test consisting of six concepts related to information technologies is used to collect data from 244 secondary school students. Concept maps that present students’ cognitive structures are drawn with the help of frequency data. Data are analyzed and interpreted according to the connections obtained as a result of the concept maps. It is determined students associate most with these concepts—computer, Internet, and communication of the given concepts, and associate least with these concepts—computer-assisted education and information technologies. These results show the concepts, Internet, communication, and computer, are an important part of students’ cognitive structures. In addition, students mostly answer computer, phone, game, Internet and Facebook as the key concepts. These answers show students regard information technologies as a means for entertainment and free time activity, not as a means for education.Keywords: word association test, cognitive structure, information technology, secondary school
Procedia PDF Downloads 41338873 The Impact of a Sustainable Solar System on the Growth of Strawberry Plants in an Agricultural Greenhouse
Authors: Ilham Ihoume, Rachid Tadili, Nora Arbaoui
Abstract:
This study examines the effects of a solar-based heating system, in a north-south oriented agricultural greenhouse on the development of strawberry plants during winter. This system relies on the circulation of water as a heat transfer fluid in a closed circuit installed on the greenhouse roof to store heat during the day and release it inside at night. A comparative experimental study was conducted in two greenhouses, one experimental with the solar heating system and the other for control without any heating system. Both greenhouses are located on the terrace of the Solar Energy and Environment Laboratory of the Mohammed V University in Rabat, Morocco. The devel-oped heating system consists of a copper coil inserted in double glazing and placed on the roof of the greenhouse, a water pump circulator, a battery, and a photovoltaic solar panel to power the electrical components. This inexpen-sive and environmentally friendly system allows the greenhouse to be heated during the winter and improves its microclimate system. This improvement resulted in an increase in the air temperature inside the experimental green-house by 6 °C and 8 °C, and a reduction in its relative humidity by 23% and 35% compared to the control greenhouse and the ambient air, respectively, throughout the winter. For the agronomic performance, it was observed that the production was 17 days earlier than in the control greenhouse.Keywords: sustainability, solar energy, thermal energy storage., greenhouse heating
Procedia PDF Downloads 3738872 The Effect of Fetal Movement Counting on Maternal Antenatal Attachment
Authors: Esra Güney, Tuba Uçar
Abstract:
Aim: This study has been conducted for the purpose of determining the effects of fetal movement counting on antenatal maternal attachment. Material and Method: This research was conducted on the basis of the real test model with the pre-test /post-test control groups. The study population consists of pregnant women registered in the six different Family Health Centers located in the central Malatya districts of Yeşilyurt and Battalgazi. When power analysis is done, the sample size was calculated for each group of at least 55 pregnant women (55 tests, 55 controls). The data were collected by using Personal Information Form and MAAS (Maternal Antenatal Attachment Scale) between July 2015-June 2016. Fetal movement counting training was given to pregnant women by researchers in the experimental group after the pre-test data collection. No intervention was applied to the control group. Post-test data for both groups were collected after four weeks. Data were evaluated with percentage, chi-square arithmetic average, chi-square test and as for the dependent and independent group’s t test. Result: In the MAAS, the pre-test average of total scores in the experimental group is 70.78±6.78, control group is also 71.58±7.54 and so there was no significant difference in mean scores between the two groups (p>0.05). MAAS post-test average of total scores in the experimental group is 78.41±6.65, control group is also is 72.25±7.16 and so the mean scores between groups were found to have statistically significant difference (p<0.05). Conclusion: It was determined that fetal movement counting increases the maternal antenatal attachments.Keywords: antenatal maternal attachment, fetal movement counting, pregnancy, midwifery
Procedia PDF Downloads 27238871 Repairing Broken Trust: The Influence of Positive Induced Emotion and Gender
Authors: Zach Banzon, Marina Caculitan, Gianne Laisac, Stephanie Lopez, Marguerite Villegas
Abstract:
The role of incidental positive emotions and gender on people’s trust decisions have been established by existing research. The aim of this experiment is to address the gap in the literature by examining whether these factors will have a similar effect on trust behavior even after the experience of betrayal. A total of 144 undergraduate students participated in a trust game involving the anonymous interaction of a participant and a transgressor. Of these participants, only 125 (63 males and 62 females) were included in the data analyses. A story was used to prime incidental positive emotions or emotions originally unrelated to the trustee. Recovered trust was measured by relating the proportion of the money passed before and after betrayal. Data was analyzed using two-way analysis of variance having two levels for gender (male, female) and two for priming (with, without), with trust propensity scores entered as a covariate. It was predicted that trust recovery will be more apparent in females than in males but the data obtained was not significantly different between the genders. Induced positive emotions, however, had a statistically significant effect on trust behavior even after betrayal. No significant interaction effect was found between induced positive emotion and gender. The experiment provides evidence that the manipulation of situational variables, to a certain extent, can facilitate the reparation of trust.Keywords: gender effect, positive emotions, trust game, trust recovery
Procedia PDF Downloads 27138870 Structural Performance Evaluation of Power Boiler for the Pressure Release Valve in Consideration of the Thermal Expansion
Authors: Young-Hun Lee, Tae-Gwan Kim, Jong-Kyu Kim, Young-Chul Park
Abstract:
In this study, Spring safety valve Heat - structure coupled analysis was carried out. Full analysis procedure and performing thermal analysis at a maximum temperature, them to the results obtained through to give an additional load and the pressure on the valve interior, and Disc holder Heat-Coupled structure Analysis was carried out. Modeled using a 3D design program Solidworks, For the modeling of the safety valve was used 3D finite element analysis program ANSYS. The final result to be obtained through the Analysis examined the stability of the maximum displacement and the maximum stress to the valve internal components occurring in the high-pressure conditions.Keywords: finite element method, spring safety valve, gap, stress, strain, deformation
Procedia PDF Downloads 36838869 An Exploratory Study on Experiences of Menarche and Menstruation among Adolescent Girls
Authors: Bhawna Devi, Girishwar Misra, Rajni Sahni
Abstract:
Menarche and menstruation is a nearly universal experience in adolescent girls’ lives, yet based on several observations it has been found that it is rarely explicitly talked about, and remains poorly understood. By menarche, girls are likely to have been influenced not only by cultural stereotypes about menstruation, but also by information acquired through significant others. Their own expectations about menstruation are likely to influence their reports of menarcheal experience. The aim of this study is to examine how girls construct meaning around menarche and menstruation in social interactions and specific contexts along with conceptualized experiences which is ‘owned’ by individual girls. Twenty adolescent girls from New Delhi (India), between the ages of 12 to 19 years (mean age = 15.1) participated in the study. Semi-structured interviews were conducted to capture the nuances of menarche and menstrual experiences of these twenty adolescent girls. Thematic analysis was used to analyze the data. From the detailed analysis of transcribed data main themes that emerged were- Menarche: A Trammeled Sky to Fly, Menarche as Flashbulb Memory, Hidden Secret: Shame and Fear, Hallmark of Womanhood, Menarche as Illness. Therefore, the finding unfolds that menarche and menstruation were largely constructed as embarrassing, shameful and something to be hidden, specifically within the school context and in general when they are outside of their home. Menstruation was also constructed as illness that programmed ‘feeling of weaknesses’ into them. The production and perpetuation of gender-related difference narratives was also evident. Implications for individuals, as well as for the subjugation of girls and women, are discussed, and it is argued that current negative representations of, and practices in relation to, menarche and menstruation need to be challenged.Keywords: embarrassment, gender-related difference, hidden secret, illness, menarche and menstruation
Procedia PDF Downloads 14338868 Investigation of the Acoustic Properties of Recycled Felt Panels and Their Application in Classrooms and Multi-Purpose Halls
Authors: Ivanova B. Natalia, Djambova Т. Svetlana, Hristev S. Ivailo
Abstract:
The acoustic properties of recycled felt panels have been investigated using various methods. Experimentally, the sound insulation of the panels has been evaluated for frequencies in the range of 600 Hz to 4000 Hz, utilizing a small-sized acoustic chamber. Additionally, the sound absorption coefficient for the frequency range of 63 Hz to 4000 Hz was measured according to the EN ISO 354 standard in a laboratory reverberation room. This research was deemed necessary after conducting reverberation time measurements of a university classroom following the EN ISO 3382-2 standard. The measurements indicated values of 2.86 s at 500 Hz, 3.23 s at 1000 Hz, and 2.53 s at 2000 Hz, which significantly exceeded the requirements set by the national regulatory framework (0.6s) for such premises. For this reason, recycled felt panels have been investigated in the laboratory, showing very good acoustic properties at high frequencies. To enhance performance in the low frequencies, the influence of the distance of the panel spacing was examined. Furthermore, the sound insulation of the panels was studied to expand the possibilities of their application, both for the acoustic treatment of educational and multifunctional halls and for sound insulation purposes (e.g., a suspended ceiling with an air gap passing from room to room). As a conclusion, a theoretical acoustic design of the classroom has been carried out with suggestions for improvements to achieve the necessary acoustic and aesthetic parameters for such rooms.Keywords: acoustic panels, recycled felt, sound absorption, sound insulation, classroom acoustics
Procedia PDF Downloads 9038867 Multi-scale Spatial and Unified Temporal Feature-fusion Network for Multivariate Time Series Anomaly Detection
Authors: Hang Yang, Jichao Li, Kewei Yang, Tianyang Lei
Abstract:
Multivariate time series anomaly detection is a significant research topic in the field of data mining, encompassing a wide range of applications across various industrial sectors such as traffic roads, financial logistics, and corporate production. The inherent spatial dependencies and temporal characteristics present in multivariate time series introduce challenges to the anomaly detection task. Previous studies have typically been based on the assumption that all variables belong to the same spatial hierarchy, neglecting the multi-level spatial relationships. To address this challenge, this paper proposes a multi-scale spatial and unified temporal feature fusion network, denoted as MSUT-Net, for multivariate time series anomaly detection. The proposed model employs a multi-level modeling approach, incorporating both temporal and spatial modules. The spatial module is designed to capture the spatial characteristics of multivariate time series data, utilizing an adaptive graph structure learning model to identify the multi-level spatial relationships between data variables and their attributes. The temporal module consists of a unified temporal processing module, which is tasked with capturing the temporal features of multivariate time series. This module is capable of simultaneously identifying temporal dependencies among different variables. Extensive testing on multiple publicly available datasets confirms that MSUT-Net achieves superior performance on the majority of datasets. Our method is able to model and accurately detect systems data with multi-level spatial relationships from a spatial-temporal perspective, providing a novel perspective for anomaly detection analysis.Keywords: data mining, industrial system, multivariate time series, anomaly detection
Procedia PDF Downloads 1538866 The Fantasy of the Media and the Sexual World of Adolescents: The Relationship between Viewing Sexual Content on Television and Sexual Behaviour of Adolescents
Authors: Ifeanyi Adigwe
Abstract:
The influence of television on adolescents is prevalent and widespread because television is a powerful sex educator for adolescents. This study examined the relationship between viewing sexual content on television and sexual behaviour of adolescents in public senior secondary schools in Lagos, Nigeria. The study employed a survey research design with a structured questionnaire as instrument. The multi-stage sampling technique was adopted. Firstly, purposive sampling was adopted in selecting 3 educational districts namely: Agege, Maryland, and Agboju. These educational districts were chosen for convenience and its wide coverage area of public senior secondary schools in Lagos State. Secondly, the researcher adopted systematic sampling to select the schools. The schools were listed in alphabetical order in each district and every 10th school were selected, yielding 13 schools altogether. A total of 501 copies of questionnaire were administered to the students and a total 491 copies of the questionnaire were retrieved. Only 453 copies of the questionnaire met the inclusion criteria and were used for analysis. Data were analyzed using descriptive statistics, Pearson Correlation, Principal components analysis, and regression analysis. Results of correlation analysis showed a positive and significant relationship between adolescent sexual belief and their preference for sexual content in television (r =0.117, N =453, p=0.13), viewing sexual content on television and adolescent sexual behavior, (r =-0.112, N =453, p<0.05), adolescent television preference and their preference for sexual content in television (r =0.328, N =453, p<0.05), adolescent television preference and adolescent’s sexual behavior (r=0.093, N =453, p<0.05). However, a negative but significant relationship exists between adolescent’s sexual knowledge and their sexual behavior (r=-122, N=453, p=0.0009). Pearson’s correlation between adolescents’ sexual knowledge and sexual behavior shows that there is a positive significant but strong relationship between adolescent’s sexual knowledge and their sexual behavior (r=0.967, N=453, p<0.05). The results also show that adolescent’s preference for sexual content in television informs them about their sexuality, development and sexual health. The descriptive and inferential analysis of data revealed that the interaction among adolescent sexual belief, knowledge and adolescents’ preference of sexual in television and its resultant effect on adolescent sexual behavior is apparent because sexual belief and norms about sex of an adolescent can induce his television preference of sexual content on television. The study concludes that exposure to sexual content in television can impact on adolescent sexual behaviour. There is no doubt that the actual outcome of television viewing and adolescent sexual behavior remains controversial because adolescent sexual behavior is multifaceted and multi-dimensional. Since behavior is learned overtime, the frequency of exposure and nature of sexual content viewed overtime induces and hastens sexual activity.Keywords: adolescent sexual behavior, Nigeria, sexual belief, sexual content, sexual knowledge, television preference
Procedia PDF Downloads 39238865 Dividend Policy in Family Controlling Firms from a Governance Perspective: Empirical Evidence in Thailand
Authors: Tanapond S.
Abstract:
Typically, most of the controlling firms are relate to family firms which are widespread and important for economic growth particularly in Asian Pacific region. The unique characteristics of the controlling families tend to play an important role in determining the corporate policies such as dividend policy. Given the complexity of the family business phenomenon, the empirical evidence has been unclear on how the families behind business groups influence dividend policy in Asian markets with the prevalent existence of cross-shareholdings and pyramidal structure. Dividend policy as one of an important determinant of firm value could also be implemented in order to examine the effect of the controlling families behind business groups on strategic decisions-making in terms of a governance perspective and agency problems. The purpose of this paper is to investigate the impact of ownership structure and concentration which are influential internal corporate governance mechanisms in family firms on dividend decision-making. Using panel data and constructing a unique dataset of family ownership and control through hand-collecting information from the nonfinancial companies listed in Stock Exchange of Thailand (SET) between 2000 and 2015, the study finds that family firms with large stakes distribute higher dividends than family firms with small stakes. Family ownership can mitigate the agency problems and the expropriation of minority investors in family firms. To provide insight into the distinguish between ownership rights and control rights, this study examines specific firm characteristics including the degrees of concentration of controlling shareholders by classifying family ownership in different categories. The results show that controlling families with large deviation between voting rights and cash flow rights have more power and affect lower dividend payment. These situations become worse when second blockholders are families. To the best knowledge of the researcher, this study is the first to examine the association between family firms’ characteristics and dividend policy from the corporate governance perspectives in Thailand with weak investor protection environment and high ownership concentration. This research also underscores the importance of family control especially in a context in which family business groups and pyramidal structure are prevalent. As a result, academics and policy makers can develop markets and corporate policies to eliminate agency problem.Keywords: agency theory, dividend policy, family control, Thailand
Procedia PDF Downloads 29038864 Evaluating the Accuracy of Biologically Relevant Variables Generated by ClimateAP
Authors: Jing Jiang, Wenhuan XU, Lei Zhang, Shiyi Zhang, Tongli Wang
Abstract:
Climate data quality significantly affects the reliability of ecological modeling. In the Asia Pacific (AP) region, low-quality climate data hinders ecological modeling. ClimateAP, a software developed in 2017, generates high-quality climate data for the AP region, benefiting researchers in forestry and agriculture. However, its adoption remains limited. This study aims to confirm the validity of biologically relevant variable data generated by ClimateAP during the normal climate period through comparison with the currently available gridded data. Climate data from 2,366 weather stations were used to evaluate the prediction accuracy of ClimateAP in comparison with the commonly used gridded data from WorldClim1.4. Univariate regressions were applied to 48 monthly biologically relevant variables, and the relationship between the observational data and the predictions made by ClimateAP and WorldClim was evaluated using Adjusted R-Squared and Root Mean Squared Error (RMSE). Locations were categorized into mountainous and flat landforms, considering elevation, slope, ruggedness, and Topographic Position Index. Univariate regressions were then applied to all biologically relevant variables for each landform category. Random Forest (RF) models were implemented for the climatic niche modeling of Cunninghamia lanceolata. A comparative analysis of the prediction accuracies of RF models constructed with distinct climate data sources was conducted to evaluate their relative effectiveness. Biologically relevant variables were obtained from three unpublished Chinese meteorological datasets. ClimateAPv3.0 and WorldClim predictions were obtained from weather station coordinates and WorldClim1.4 rasters, respectively, for the normal climate period of 1961-1990. Occurrence data for Cunninghamia lanceolata came from integrated biodiversity databases with 3,745 unique points. ClimateAP explains a minimum of 94.74%, 97.77%, 96.89%, and 94.40% of monthly maximum, minimum, average temperature, and precipitation variances, respectively. It outperforms WorldClim in 37 biologically relevant variables with lower RMSE values. ClimateAP achieves higher R-squared values for the 12 monthly minimum temperature variables and consistently higher Adjusted R-squared values across all landforms for precipitation. ClimateAP's temperature data yields lower Adjusted R-squared values than gridded data in high-elevation, rugged, and mountainous areas but achieves higher values in mid-slope drainages, plains, open slopes, and upper slopes. Using ClimateAP improves the prediction accuracy of tree occurrence from 77.90% to 82.77%. The biologically relevant climate data produced by ClimateAP is validated based on evaluations using observations from weather stations. The use of ClimateAP leads to an improvement in data quality, especially in non-mountainous regions. The results also suggest that using biologically relevant variables generated by ClimateAP can slightly enhance climatic niche modeling for tree species, offering a better understanding of tree species adaptation and resilience compared to using gridded data.Keywords: climate data validation, data quality, Asia pacific climate, climatic niche modeling, random forest models, tree species
Procedia PDF Downloads 6838863 Resilient Analysis as an Alternative to Conventional Seismic Analysis Methods for the Maintenance of a Socioeconomical Functionality of Structures
Authors: Sara Muhammad Elqudah, Vigh László Gergely
Abstract:
Catastrophic events, such as earthquakes, are sudden, short, and devastating, threatening lives, demolishing futures, and causing huge economic losses. Current seismic analyses and design standards are based on life safety levels where only some residual strength and stiffness are left in the structure leaving it beyond economical repair. Consequently, it has become necessary to introduce and implement the concept of resilient design. Resilient design is about designing for ductility over time by resisting, absorbing, and recovering from the effects of a hazard in an appropriate and efficient time manner while maintaining the functionality of the structure in the aftermath of the incident. Resilient analysis is mainly based on the fragility, vulnerability, and functionality curves where eventually a resilience index is generated from these curves, and the higher this index is, the better is the performance of the structure. In this paper, seismic performances of a simple two story reinforced concrete building, located in a moderate seismic region, has been evaluated using the conventional seismic analyses methods, which are the linear static analysis, the response spectrum analysis, and the pushover analysis, and the generated results of these analyses methods are compared to those of the resilient analysis. Results highlight that the resilience analysis was the most convenient method in generating a more ductile and functional structure from a socio-economic perspective, in comparison to the standard seismic analysis methods.Keywords: conventional analysis methods, functionality, resilient analysis, seismic performance
Procedia PDF Downloads 11638862 Assessing Supply Chain Performance through Data Mining Techniques: A Case of Automotive Industry
Authors: Emin Gundogar, Burak Erkayman, Nusret Sazak
Abstract:
Providing effective management performance through the whole supply chain is critical issue and hard to applicate. The proper evaluation of integrated data may conclude with accurate information. Analysing the supply chain data through OLAP (On-Line Analytical Processing) technologies may provide multi-angle view of the work and consolidation. In this study, association rules and classification techniques are applied to measure the supply chain performance metrics of an automotive manufacturer in Turkey. Main criteria and important rules are determined. The comparison of the results of the algorithms is presented.Keywords: supply chain performance, performance measurement, data mining, automotive
Procedia PDF Downloads 51338861 Working in Multidisciplinary Care Teams: Perspectives from Health Care and Social Service Providers
Authors: Lindy Van Vliet, Saloni Phadke, Anthea Nelson, Ann Gallant
Abstract:
Holistic and patient-centred palliative care and support require an integrated system of care that includes health and social service providers working together to ensure that patients and families have access to the care they need. The objective of this study is to further explore and understand the benefits and challenges of mobilizing multidisciplinary care teams for health care professionals and social service providers. Drawing on an interpretivist, exploratory, qualitative design, our multidisciplinary research team (medicine, nursing and social work) conducted interviews with 15 health care and social service providers in the Ottawa region. Interview data was audio-recorded, transcribed, and analyzed using a reflexive thematic analysis approach. The data deepens our understandings of the facilitators and barriers posed by multidisciplinary care teams. Three main findings emerged: First, the data highlighted the benefits of multidisciplinary care teams for both patient outcomes and quality of life and provider mental health; second, the data showed that the lack of a system-wide integrated communication system reduces the quality of patient care and increases provider stress while working in multidisciplinary care teams; finally, the data demonstrated the existence of implicit hierarchies between disciplines, this coupled with different disciplinary perspectives of palliative care provision can lead to friction and challenges within care teams. These findings will have important implications for the future of palliative care as they will help to facilitate and build stronger person-centred/relationship-centred palliative care practices by naming the challenges faced by multidisciplinary palliative care teams and providing examples of best practices.Keywords: public health palliative care, palliative care nursing, care networks, integrated health care, palliative care approach, public health, multidisciplinary work, care teams
Procedia PDF Downloads 82