Search results for: information use behaviour
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12391

Search results for: information use behaviour

8731 Mixed Effects Models for Short-Term Load Forecasting for the Spanish Regions: Castilla-Leon, Castilla-La Mancha and Andalucia

Authors: C. Senabre, S. Valero, M. Lopez, E. Velasco, M. Sanchez

Abstract:

This paper focuses on an application of linear mixed models to short-term load forecasting. The challenge of this research is to improve a currently working model at the Spanish Transport System Operator, programmed by us, and based on linear autoregressive techniques and neural networks. The forecasting system currently forecasts each of the regions within the Spanish grid separately, even though the behavior of the load in each region is affected by the same factors in a similar way. A load forecasting system has been verified in this work by using the real data from a utility. In this research it has been used an integration of several regions into a linear mixed model as starting point to obtain the information from other regions. Firstly, the systems to learn general behaviors present in all regions, and secondly, it is identified individual deviation in each regions. The technique can be especially useful when modeling the effect of special days with scarce information from the past. The three most relevant regions of the system have been used to test the model, focusing on special day and improving the performance of both currently working models used as benchmark. A range of comparisons with different forecasting models has been conducted. The forecasting results demonstrate the superiority of the proposed methodology.

Keywords: short-term load forecasting, mixed effects models, neural networks, mixed effects models

Procedia PDF Downloads 189
8730 Forecasting Future Society to Explore Promising Security Technologies

Authors: Jeonghwan Jeon, Mintak Han, Youngjun Kim

Abstract:

Due to the rapid development of information and communication technology (ICT), a substantial transformation is currently happening in the society. As the range of intelligent technologies and services is continuously expanding, ‘things’ are becoming capable of communicating one another and even with people. However, such “Internet of Things” has the technical weakness so that a great amount of such information transferred in real-time may be widely exposed to the threat of security. User’s personal data are a typical example which is faced with a serious security threat. The threats of security will be diversified and arose more frequently because next generation of unfamiliar technology develops. Moreover, as the society is becoming increasingly complex, security vulnerability will be increased as well. In the existing literature, a considerable number of private and public reports that forecast future society have been published as a precedent step of the selection of future technology and the establishment of strategies for competitiveness. Although there are previous studies that forecast security technology, they have focused only on technical issues and overlooked the interrelationships between security technology and social factors are. Therefore, investigations of security threats in the future and security technology that is able to protect people from various threats are required. In response, this study aims to derive potential security threats associated with the development of technology and to explore the security technology that can protect against them. To do this, first of all, private and public reports that forecast future and online documents from technology-related communities are collected. By analyzing the data, future issues are extracted and categorized in terms of STEEP (Society, Technology, Economy, Environment, and Politics), as well as security. Second, the components of potential security threats are developed based on classified future issues. Then, points that the security threats may occur –for example, mobile payment system based on a finger scan technology– are identified. Lastly, alternatives that prevent potential security threats are proposed by matching security threats with points and investigating related security technologies from patent data. Proposed approach can identify the ICT-related latent security menaces and provide the guidelines in the ‘problem – alternative’ form by linking the threat point with security technologies.

Keywords: future society, information and communication technology, security technology, technology forecasting

Procedia PDF Downloads 468
8729 Study on the Effect of Pre-Operative Patient Education on Post-Operative Outcomes

Authors: Chaudhary Itisha, Shankar Manu

Abstract:

Patient satisfaction represents a crucial aspect in the evaluation of health care services. Preoperative teaching provides the patient with pertinent information concerning the surgical process and the intended surgical procedure as well as anticipated patient behavior (anxiety, fear), expected sensation, and the probable outcomes. Although patient education is part of Accreditation protocols, it is not uniform at most places. The aim of this study was to try to assess the benefit of preoperative patient education on selected post-operative outcome parameters; mainly, post-operative pain scores, requirement of additional analgesia, return to activity of daily living and overall patient satisfaction, and try to standardize few education protocols. Dependent variables were measured before and after the treatment on a study population of 302 volunteers. Educational intervention was provided by the Investigator in the preoperative period to the study group through personal counseling. An information booklet contained detailed information was also provided. Statistical Analysis was done using Chi square test, Mann Whitney u test and Fischer Exact Test on a total of 302 subjects. P value <0.05 was considered as level of statistical significance and p<0.01 was considered as highly significant. This study suggested that patients who are given a structured, individualized and elaborate preoperative education and counseling have a better ability to cope up with postoperative pain in the immediate post-operative period. However, there was not much difference when the patients have had almost complete recovery. There was no difference in the requirement of additional analgesia among the two groups. There is a positive effect of preoperative counseling on expected return to the activities of daily living and normal work schedule. However, no effect was observed on the activities in the immediate post-operative period. There is no difference in the overall satisfaction score among the two groups of patients. Thus this study concludes that there is a positive benefit as suggested by the results for pre-operative patient education. Although the difference in various parameters studied might not be significant over a long term basis, they definitely point towards the benefits of preoperative patient education. 

Keywords: patient education, post-operative pain, postoperative outcomes, patient satisfaction

Procedia PDF Downloads 339
8728 BIM Data and Digital Twin Framework: Preserving the Past and Predicting the Future

Authors: Mazharuddin Syed Ahmed

Abstract:

This research presents a framework used to develop The Ara Polytechnic College of Architecture Studies building “Kahukura” which is Green Building certified. This framework integrates the development of a smart building digital twin by utilizing Building Information Modelling (BIM) and its BIM maturity levels, including Levels of Development (LOD), eight dimensions of BIM, Heritage-BIM (H-BIM) and Facility Management BIM (FM BIM). The research also outlines a structured approach to building performance analysis and integration with the circular economy, encapsulated within a five-level digital twin framework. Starting with Level 1, the Descriptive Twin provides a live, editable visual replica of the built asset, allowing for specific data inclusion and extraction. Advancing to Level 2, the Informative Twin integrates operational and sensory data, enhancing data verification and system integration. At Level 3, the Predictive Twin utilizes operational data to generate insights and proactive management suggestions. Progressing to Level 4, the Comprehensive Twin simulates future scenarios, enabling robust “what-if” analyses. Finally, Level 5, the Autonomous Twin, represents the pinnacle of digital twin evolution, capable of learning and autonomously acting on behalf of users.

Keywords: building information modelling, circular economy integration, digital twin, predictive analytics

Procedia PDF Downloads 43
8727 Data Management System for Environmental Remediation

Authors: Elizaveta Petelina, Anton Sizo

Abstract:

Environmental remediation projects deal with a wide spectrum of data, including data collected during site assessment, execution of remediation activities, and environmental monitoring. Therefore, an appropriate data management is required as a key factor for well-grounded decision making. The Environmental Data Management System (EDMS) was developed to address all necessary data management aspects, including efficient data handling and data interoperability, access to historical and current data, spatial and temporal analysis, 2D and 3D data visualization, mapping, and data sharing. The system focuses on support of well-grounded decision making in relation to required mitigation measures and assessment of remediation success. The EDMS is a combination of enterprise and desktop level data management and Geographic Information System (GIS) tools assembled to assist to environmental remediation, project planning, and evaluation, and environmental monitoring of mine sites. EDMS consists of seven main components: a Geodatabase that contains spatial database to store and query spatially distributed data; a GIS and Web GIS component that combines desktop and server-based GIS solutions; a Field Data Collection component that contains tools for field work; a Quality Assurance (QA)/Quality Control (QC) component that combines operational procedures for QA and measures for QC; Data Import and Export component that includes tools and templates to support project data flow; a Lab Data component that provides connection between EDMS and laboratory information management systems; and a Reporting component that includes server-based services for real-time report generation. The EDMS has been successfully implemented for the Project CLEANS (Clean-up of Abandoned Northern Mines). Project CLEANS is a multi-year, multimillion-dollar project aimed at assessing and reclaiming 37 uranium mine sites in northern Saskatchewan, Canada. The EDMS has effectively facilitated integrated decision-making for CLEANS project managers and transparency amongst stakeholders.

Keywords: data management, environmental remediation, geographic information system, GIS, decision making

Procedia PDF Downloads 161
8726 Geographical Information System for Sustainable Management of Water Resources

Authors: Vakhtang Geladze, Nana Bolashvili, Nino Machavariani, Tamazi Karalashvili, Nino Chikhradze, Davit Kartvelishvili

Abstract:

Fresh water deficit is one of the most important global problems today. In the countries with scarce water resources, they often become a reason of armed conflicts. The peaceful settlement of relations connected with management and water consumption issues within and beyond the frontiers of the country is an important guarantee of the region stability. The said problem is urgent in Georgia as well because of its water objects are located at the borders and the transit run-off that is 12% of the total one. Fresh water resources are the major natural resources of Georgia. Despite of this, water supply of population at its Eastern part is an acute issue. Southeastern part of the country has been selected to carry out the research. This region is notable for deficiency of water resources in the country. The region tends to desertification which aggravates fresh water problem even more and presumably may lead to migration of local population from the area. The purpose of study was creation geographical information system (GIS) of water resources. GIS contains almost all layers of different content (water resources, springs, channels, hydrological stations, population water supply, etc.). The results of work provide an opportunity to identify the resource potential of the mentioned region, control and manage it, carry out monitoring and plan regional economy.

Keywords: desertification, GIS, irrigation, water resources

Procedia PDF Downloads 693
8725 Evaluation of UI for 3D Visualization-Based Building Information Applications

Authors: Monisha Pattanaik

Abstract:

In scenarios where users have to work with large amounts of hierarchical data structures combined with visualizations (For example, Construction 3d Models, Manufacturing equipment's models, Gantt charts, Building Plans), the data structures have a high density in terms of consisting multiple parent nodes up to 50 levels and their siblings to descendants, therefore convey an immediate feeling of complexity. With customers moving to consumer-grade enterprise software, it is crucial to make sophisticated features made available to touch devices or smaller screen sizes. This paper evaluates the UI component that allows users to scroll through all deep density levels using a slider overlay on top of the hierarchy table, performing several actions to focus on one set of objects at any point in time. This overlay component also solves the problem of excessive horizontal scrolling of the entire table on a fixed pane for a hierarchical table. This component can be customized to navigate through parents, only siblings, or a specific component of the hierarchy only. The evaluation of the UI component was done by End Users of application and Human-Computer Interaction (HCI) experts to test the UI component's usability with statistical results and recommendations to handle complex hierarchical data visualizations.

Keywords: building information modeling, digital twin, navigation, UI component, user interface, usability, visualization

Procedia PDF Downloads 138
8724 An Ecological Systems Approach to Risk and Protective Factors of Sibling Conflict for Children in the United Kingdom

Authors: C. A. Bradley, D. Patsios, D. Berridge

Abstract:

This paper presents evidence to better understand the risk and protective factors related to sibling conflict and the patterns of association between sibling conflict and negative adjustment outcomes by incorporating additional familial and societal factors within statistical models of risk and adjustment. It was conducted through the secondary analysis of a large representative cross-sectional dataset of children in the UK. The original study includes proxy interviews for young children and self-report interviews for adolescents. The study applies an ecological systems framework for the analyses. Hierarchical regression models assess risk and protective factors and adjustment outcomes associated with sibling conflict. Interactions reveal differential effect between contextual risk factors and the social context of influence. The general pattern of findings suggested that, although factors affecting likelihood of experiencing sibling conflict were often determined by child age, some remained consistent across childhood. These factors were often conditional on each other, reinforcing the importance of an ecological framework. Across both age-groups, sibling conflict was associated with siblings closer in age; male sibling groups; most advantaged socio-economic group; and exposure to community violence, such as witnessing violent assault or robbery. The study develops the evidence base on the influence of ethnicity and socio-economic group on sibling conflict by exploring interactions between social context. It also identifies key new areas of influence – such as family structure, disability, and community violence in exacerbating or reducing risk of conflict. The study found negative associations between sibling conflict and young children’s mental well-being and adolescents' mental well-being and anti-social behaviour, but also more context specific associations – such as sibling conflict moderating the negative impact of adversity and high risk experiences for young children such as parental violence toward the child.

Keywords: adjustment, conflict, ecological systems, family systems, risk and protective factors, sibling

Procedia PDF Downloads 107
8723 Evaluation of Massive Open Online Course in a Rural Marginalized Area: Case Study of Alice Community, Eastern Cape, South Africa

Authors: Dare Ebenezer Fatumo, Olusesan Emmanuel Adelabu

Abstract:

Online learning has taken another dimension through the introduction of Massive Open Online Courses (MOOCs), it has also become an important resource base for teaching and learning. This research aimed at investigating the use of Massive Open Online Course in a rural marginalized area. The survey research design of descriptive nature was adopted to evaluate the awareness and usage of Massive Open Online Course (MOOCs) in Alice community, Eastern Cape, South Africa. This study also employed quantitative approach by using self-structured questionnaire to evoke information from the respondents. The data collected were analyzed by Statistical Package for Social Sciences (SPSS). The findings revealed amongst others the efficacy of Massive Open Online Course (MOOCs) in fostering teaching and learning in rural marginalized areas. This study concludes that MOOCs is a veritable medium for busy or less privileged individual to acquire a degree or certification. Therefore, the study recommends MOOCs platform to be fully embraced by people in rural marginalized areas, awareness programs about its usefulness should be propagated across the municipalities nationwide.

Keywords: distance learning, information and communication technology, massive open online course, online learning, teaching and learning

Procedia PDF Downloads 179
8722 Using Business Intelligence Capabilities to Improve the Quality of Decision-Making: A Case Study of Mellat Bank

Authors: Jalal Haghighat Monfared, Zahra Akbari

Abstract:

Today, business executives need to have useful information to make better decisions. Banks have also been using information tools so that they can direct the decision-making process in order to achieve their desired goals by rapidly extracting information from sources with the help of business intelligence. The research seeks to investigate whether there is a relationship between the quality of decision making and the business intelligence capabilities of Mellat Bank. Each of the factors studied is divided into several components, and these and their relationships are measured by a questionnaire. The statistical population of this study consists of all managers and experts of Mellat Bank's General Departments (including 190 people) who use commercial intelligence reports. The sample size of this study was 123 randomly determined by statistical method. In this research, relevant statistical inference has been used for data analysis and hypothesis testing. In the first stage, using the Kolmogorov-Smirnov test, the normalization of the data was investigated and in the next stage, the construct validity of both variables and their resulting indexes were verified using confirmatory factor analysis. Finally, using the structural equation modeling and Pearson's correlation coefficient, the research hypotheses were tested. The results confirmed the existence of a positive relationship between decision quality and business intelligence capabilities in Mellat Bank. Among the various capabilities, including data quality, correlation with other systems, user access, flexibility and risk management support, the flexibility of the business intelligence system was the most correlated with the dependent variable of the present research. This shows that it is necessary for Mellat Bank to pay more attention to choose the required business intelligence systems with high flexibility in terms of the ability to submit custom formatted reports. Subsequently, the quality of data on business intelligence systems showed the strongest relationship with quality of decision making. Therefore, improving the quality of data, including the source of data internally or externally, the type of data in quantitative or qualitative terms, the credibility of the data and perceptions of who uses the business intelligence system, improves the quality of decision making in Mellat Bank.

Keywords: business intelligence, business intelligence capability, decision making, decision quality

Procedia PDF Downloads 112
8721 Geographic Information System-Based Identification of Road Traffic Crash Hotspots on Rural Roads in Oman

Authors: Mohammed Bakhit Kashoob, Mohammed Salim Al-Maashani, Ahmed Abdullah Al-Marhoon

Abstract:

The use of Geographic Information System (GIS) tools in the analysis of traffic crash data can help to identify locations or hotspots with high instances or risk of traffic crashes. The identification of traffic crash hotspots can effectively improve road safety measures. Mapping of road traffic crash hotspots can help the concerned authorities to give priority and take targeted measures and improvements to the road structure at these locations to reduce traffic crashes and fatalities. In Oman, there are countless rural roads that have more risks for traveling vehicles compared to urban roads. The likelihood of traffic crashes as well as fatality rate may increase with the presence of risks that are associated with the rural type of community. In this paper, the traffic crash hotspots on rural roads in Oman are specified using spatial analysis methods in GIS and traffic crash data. These hotspots are ranked based on the frequency of traffic crash occurrence (i.e., number of traffic crashes) and the rate of fatalities. The result of this study presents a map visualization of locations on rural roads with high traffic crashes and high fatalities rates.

Keywords: road safety, rural roads, traffic crash, GIS tools

Procedia PDF Downloads 149
8720 Regulation on the Protection of Personal Data Versus Quality Data Assurance in the Healthcare System Case Report

Authors: Elizabeta Krstić Vukelja

Abstract:

Digitization of personal data is a consequence of the development of information and communication technologies that create a new work environment with many advantages and challenges, but also potential threats to privacy and personal data protection. Regulation (EU) 2016/679 of the European Parliament and of the Council is becoming a law and obligation that should address the issues of personal data protection and information security. The existence of the Regulation leads to the conclusion that national legislation in the field of virtual environment, protection of the rights of EU citizens and processing of their personal data is insufficiently effective. In the health system, special emphasis is placed on the processing of special categories of personal data, such as health data. The healthcare industry is recognized as a particularly sensitive area in which a large amount of medical data is processed, the digitization of which enables quick access and quick identification of the health insured. The protection of the individual requires quality IT solutions that guarantee the technical protection of personal categories. However, the real problems are the technical and human nature and the spatial limitations of the application of the Regulation. Some conclusions will be drawn by analyzing the implementation of the basic principles of the Regulation on the example of the Croatian health care system and comparing it with similar activities in other EU member states.

Keywords: regulation, healthcare system, personal dana protection, quality data assurance

Procedia PDF Downloads 39
8719 Arduino-Based Laser Communication

Authors: Simon Bambey, Edward Lim, Kai Corley-Jory, Pooya Taheri

Abstract:

The main goal of this paper is to propose a simple and low-cost microcontroller-based laser communication link. To demonstrate that laser communication is a viable and efficient means for transmitting data, a transceiver capable of transfer rates of approximately 0.7 kB/s is prototyped. The hardware used for the transceiver consists of Commercial Off-The-Shelf (COTS) lasers, photodiodes, and the Arduino Mega 2560 which is an open-source and easy-to-use microcontroller-based platform intended for making interactive projects. A graphic user interface utilizing the Meteor framework is developed to facilitate the communication between the user and transceiver. The developed transceiver prototype is capable of receiving and transmitting data at significant ranges with no loss of information. Furthermore, stable and secure communication is achieved through several mechanisms developed to manage simultaneous sending and receiving, in addition to detecting physical interruptions during transmission. The design setup is scalable and with further development can be transformed into a fiber-optic transmission system. Due to its nature, laser communication is very secure and can provide a safe and private communication link. Overall, this paper demonstrates how laser communication can be an economical, durable, and effective means of information transfer.

Keywords: Arduino microcontrollers, laser applications, user interfaces, wireless communication

Procedia PDF Downloads 302
8718 The Impact of Artificial Intelligence on Food Nutrition

Authors: Antonyous Fawzy Boshra Girgis

Abstract:

Nutrition labels are diet-related health policies. They help individuals improve food-choice decisions and reduce intake of calories and unhealthy food elements, like cholesterol. However, many individuals do not pay attention to nutrition labels or fail to appropriately understand them. According to the literature, thinking and cognitive styles can have significant effects on attention to nutrition labels. According to the author's knowledge, the effect of global/local processing on attention to nutrition labels has not been previously studied. Global/local processing encourages individuals to attend to the whole/specific parts of an object and can have a significant impact on people's visual attention. In this study, this effect was examined with an experimental design using the eye-tracking technique. The research hypothesis was that individuals with local processing would pay more attention to nutrition labels, including nutrition tables and traffic lights. An experiment was designed with two conditions: global and local information processing. Forty participants were randomly assigned to either global or local conditions, and their processing style was manipulated accordingly. Results supported the hypothesis for nutrition tables but not for traffic lights.

Keywords: nutrition, public health, SA Harvest, foodeye-tracking, nutrition labelling, global/local information processing, individual differencesmobile computing, cloud computing, nutrition label use, nutrition management, barcode scanning

Procedia PDF Downloads 42
8717 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 89
8716 The Capacity Building in the Natural Disaster Management of Thailand

Authors: Eakarat Boonreang

Abstract:

The past two decades, Thailand faced the natural disasters, for instance, Gay typhoon in 1989, tsunami in 2004, and huge flood in 2011. The disaster management in Thailand was improved both structure and mechanism for cope with the natural disaster since 2007. However, the natural disaster management in Thailand has various problems, for examples, cooperation between related an organizations have not unity, inadequate resources, the natural disaster management of public sectors not proactive, people has not awareness the risk of the natural disaster, and communities did not participate in the natural disaster management. Objective of this study is to find the methods for capacity building in the natural disaster management of Thailand. The concept and information about the capacity building and the natural disaster management of Thailand were reviewed and analyzed by classifying and organizing data. The result found that the methods for capacity building in the natural disaster management of Thailand should be consist of 1)link operation and information in the natural disaster management between nation, province, local and community levels, 2)enhance competency and resources of public sectors which relate to the natural disaster management, 3)establish proactive natural disaster management both planning and implementation, 4)decentralize the natural disaster management to local government organizations, 5)construct public awareness in the natural disaster management to community, 6)support Community Based Disaster Risk Management (CBDRM) seriously, and 7)emphasis on participation in the natural disaster management of all stakeholders.

Keywords: capacity building, Community Based Disaster Risk Management (CBDRM), Natural Disaster Management, Thailand

Procedia PDF Downloads 557
8715 Monetary Evaluation of Dispatching Decisions in Consideration of Choice of Transport

Authors: Marcel Schneider, Nils Nießen

Abstract:

Microscopic simulation programs enable the description of the two processes of railway operation and the previous timetabling. Occupation conflicts are often solved based on defined train priorities on both process levels. These conflict resolutions produce knock-on delays for the involved trains. The sum of knock-on delays is commonly used to evaluate the quality of railway operations. It is either compared to an acceptable level-of-service or the delays are evaluated economically by linearly monetary functions. It is impossible to properly evaluate dispatching decisions without a well-founded objective function. This paper presents a new approach for evaluation of dispatching decisions. It uses models of choice of transport and considers the behaviour of the end-costumers. These models evaluate the knock-on delays in more detail than linearly monetary functions and consider other competing modes of transport. The new approach pursues the coupling of a microscopic model of railway operation with the macroscopic model of choice of transport. First it will be implemented for the railway operations process, but it can also be used for timetabling. The evaluation considers the possibility to change over to other transport modes by the end-costumers. The new approach first looks at the rail-mounted and road transport, but it can also be extended to air transport. The split of the end-costumers is described by the modal-split. The reactions by the end-costumers have an effect on the revenues of the railway undertakings. Various travel purposes has different pavement reserves and tolerances towards delays. Longer journey times affect besides revenue changes also additional costs. The costs depend either on time or track and arise from circulation of workers and vehicles. Only the variable values are summarised in the contribution margin, which is the base for the monetary evaluation of the delays. The contribution margin is calculated for different resolution decisions of the same conflict. The conflict resolution is improved until the monetary loss becomes minimised. The iterative process therefore determines an optimum conflict resolution by observing the change of the contribution margin. Furthermore, a monetary value of each dispatching decision can also be determined.

Keywords: choice of transport, knock-on delays, monetary evaluation, railway operations

Procedia PDF Downloads 328
8714 Epidemiological Correlates of Adherence to Anti-Hypertensive Treatment in Primary Health Care Setting of Ludhiana, Punjab

Authors: Sangeeta Girdhar, Amanat Grewal, Nahush Bansal

Abstract:

Introduction: There is an increasing burden of hypertension in India. The morbidity and mortality arising from complications are mainly due to non-adherence to medication, unhealthy dietary habits, and lack of physical activity. Non-adherence is a well-recognised factor contributing to inadequate control of high blood pressure. Adherence to pharmacotherapy for hypertension varies from 43% to 88%. Non-adherence is influenced by various socio-demographic factors. Understanding these factors is useful in managing non-adherence. Therefore, the study was planned to determine adherence among hypertensives and factors associated with non-adherence to treatment. Methodology: A cross-sectional study was conducted at Urban Health Training Centre of Dayanand Medical College and Hospital Ludhiana. Patients attending the OPD over a period of 3 months were included in the study. Prior ethical approval was obtained, and informed consent was taken from subjects. A predesigned semi-structured questionnaire was applied, which included socio-demographic profile, treatment-seeking behaviour, adherence to the antihypertensive medication, lifestyle factors (intake of alcohol, smoking, consumption of junk food, high salt intake) contributing to the development of the disease. Reasons for non-adherence to the therapy were also explored. Data was entered into excel, and SPSS 26 version was used for analysis. Results: A total of 186 individuals were interviewed. Out of these, 113 females (60.8%) and 73 males (39.2%) participated in the study. Mean age of participants was 60.9 ± 10.7 years. Adherence to anti-hypertensive treatment was found in 68.3% of the participants. It was observed that adherence was more in literate individuals as compared to illiterate (p value- 0.78). Adherence was lower among smokers (33.3%) and alcohol consumers (53.8%) as compared to non-users (69.4% and 70.6%, respectively). The predominant reasons for skipping medications were discontinuing medication when feeling well, forgetfulness and unawareness. Conclusion: There is a need to generate awareness regarding the importance of adherence to therapy among patients. Intensive health education and counselling of the patients is the need of the hour.

Keywords: hypertension, anti-hypertensive, adherence, counselling

Procedia PDF Downloads 90
8713 Reducing Support Structures in Design for Additive Manufacturing: A Neural Networks Approach

Authors: Olivia Borgue, Massimo Panarotto, Ola Isaksson

Abstract:

This article presents a neural networks-based strategy for reducing the need for support structures when designing for additive manufacturing (AM). Additive manufacturing is a relatively new and immature industrial technology, and the information to make confident decisions when designing for AM is limited. This lack of information impacts especially the early stages of engineering design, for instance, it is difficult to actively consider the support structures needed for manufacturing a part. This difficulty is related to the challenge of designing a product geometry accounting for customer requirements, manufacturing constraints and minimization of support structure. The approach presented in this article proposes an automatized geometry modification technique for reducing the use of the support structures while designing for AM. This strategy starts with a neural network-based strategy for shape recognition to achieve product classification, using an STL file of the product as input. Based on the classification, an automatic part geometry modification based on MATLAB© is implemented. At the end of the process, the strategy presents different geometry modification alternatives depending on the type of product to be designed. The geometry alternatives are then evaluated adopting a QFD-like decision support tool.

Keywords: additive manufacturing, engineering design, geometry modification optimization, neural networks

Procedia PDF Downloads 253
8712 The Relationship between Eating Disorders (Anorexia and Bulimia Nervosa) with Some of the Demographic Factors among University Students

Authors: Shima Hashemi, Firoozeh Ghazanfari

Abstract:

Introduction: Eating disorder is a psychiatric disorder that is increasingly growing. This study aimed to determine the relationship between eating disorders (anorexia and bulimia nervosa) with some of the demographic factors among Lorestan University of Medical Sciences students. Materials and Methods: This study is a cross-sectional and descriptive study that was done at Lorestan University of Medical Sciences in 2019. Four hundred fifty students were studied by stratified and cluster sampling methods. For gathering data, we use the standard questionnaire Eating Attitudes Test EAT (26). Data were analyzed using statistical software SPSS. Results: According to the results, 144 (32%) males and 305 (67.8%) females were studied. 88.7% were single, and 8.9% were married. In the anorexia nervosa group, the results showed that there was a significant meaning between demographic information, and the number of family members, marital status, BMI, level of education, family income, father and mother education, as well as in the bulimia nervosa group, there was no significant meaning with any demographic information (p>0.05). Conclusion: Anorexia and bulimia nervosa are two known types of eating disorders, and some demographic factors can be effective in causing or aggravating these disorders.

Keywords: eating disorder, anorexia nervosa, bulimia nervosa, students

Procedia PDF Downloads 97
8711 The Effectiveness of Implementing Interactive Training for Teaching Kazakh Language

Authors: Samal Abzhanova, Saule Mussabekova

Abstract:

Today, a new system of education is being created in Kazakhstan in order to develop the system of education and to satisfy the world class standards. For this purpose, there have been established new requirements and responsibilities to the instructors. Students should not be limited with providing only theoretical knowledge. Also, they should be encouraged to be competitive, to think creatively and critically. Moreover, students should be able to implement these skills into practice. These issues could be resolved through the permanent improvement of teaching methods. Therefore, a specialist who teaches the languages should use up-to-date methods and introduce new technologies. The result of the investigation suggests that an interactive teaching method is one of the new technologies in this field. This paper aims to provide information about implementing new technologies in the process of teaching language. The paper will discuss about necessity of introducing innovative technologies and the techniques of organizing interactive lessons. At the same time, the structure of the interactive lesson, conditions, principles, discussions, small group works and role-playing games will be considered. Interactive methods are carried out with the help of several types of activities, such as working in a team (with two or more group of people), playing situational or role-playing games, working with different sources of information, discussions, presentations, creative works and learning through solving situational tasks and etc.

Keywords: interactive education, interactive methods, system of education, teaching a language

Procedia PDF Downloads 294
8710 Managing Risks of Civil War: Accounting Practices in Egyptian Households

Authors: Sumohon Matilal, Neveen Abdelrehim

Abstract:

The purpose of this study is to examine the way households manage the risks of civil war, using the calculative practices of accounting as a lens. As is the case with other social phenomena, accounting serves as a conduit for attributing values and rationales to crisis and in the process makes it visible and calculable. Our focus, in particular, is on the dialogue facilitated by the numerical logic of accounting between the householder and a crisis scenario, such as civil war. In other words, we seek to study how the risk of war is rationalized through household budgets, income and expenditure statements etc. and how such accounting constructs in turn shape attitudes toward earnings and spending in a wartime economy. The existing literature on war and accounting demonstrates how an accounting logic can have potentially destabilising consequences and how it is used to legitimise war. However, very few scholars have looked at the way accounting constructs are used to internalise the effects of war in an average household and the behavioural consequences that arise from such accounting. Relatedly, scholars studying household accounting have mostly focussed on the links between gender and hierarchy in relation to managing the financial affairs. Few have focused on the role of household accounts in a crisis scenario. This study intends to fill this gap. We draw upon Egypt, a country in the middle of civil war since 2011 for our purpose. We intend to carry out 15-20 semi-structured interviews with middle income households in Cairo that maintain some form of accounts to study the following issues: 1. How do people internalise the risks of civil war? What kind of accounting constructs do they use (this may take the form of simple budgets, income-expenditure notes/statements on a periodic basis, spreadsheets etc.) 2. How has civil war affected household expenditure? Are people spending more/less than before? 3. How has civil war affected household income? Are people finding it difficult/easy to survive on the pre-war income? 4. How is such accounting affecting household behaviour towards earnings and expenditure? Are families prioritising expenditure on necessities alone? Are they refraining from indulging in luxuries? Are family members doing two or three jobs to cope with difficult times? Are families increasingly turning toward borrowing? Is credit available? From whom?

Keywords: risk, accounting, war, crisis

Procedia PDF Downloads 201
8709 Management Practices and Economic Performance of Smallholder Dairy Cattle Farms in Southern Vietnam

Authors: Ngoc-Hieu Vu

Abstract:

Although dairy production in Vietnam is a relatively new agricultural activity, milk production increased remarkably in recent years. Smallholders are still the main drivers for this development, especially in the southern part of the country. However, information on the farming practices is very limited. Therefore, this study aimed to characterize husbandry practices, educational experiences, decision-making practices, constraints, income and expenses of smallholder dairy farms in Southern Vietnam. A total of 200 farms, located in the regions Ho Chi Minh (HCM, N=80 farms), Lam Dong (N=40 farms), Binh Duong (N=40 farms) and Long An (N=40 farms) were included. Between October 2013 and December 2014 farmers were interviewed twice. On average, farms owned 3.200m2, 2.000m2, and 193m2 of pasture, cropping and housing area, respectively. The number of total, milking and dry cows, heifers, and calves were 20.4, 11.6, 4.7, 3.3, and 2.9 head. The number of lactating dairy cows was higher (p<0.001) in HCM (15.5) and Lam Dong (14.7) than in Binh Duong (6.7) and Long An (10.7). Animals were mainly crossbred Holstein-Friesian (HF) cows with at least 75% HF origin (84%), whereas a higher (P<0.001) percentage of purebred HF was found in HCM and Lam Dong and crossbreds in Binh Duong and Long An. Animals were mainly raised in tie-stalls (94%) and machine-milked (80%). Farmers used their own replacement animals (76%), and both genetic and phenotypic information (67%) for selecting sires. Farmers were predominantly educated at primary school level (53%). Major constraints for dairy farming were the lack of capital (43%), diseases (17%), marketing (22%), lack of knowledge (8%) and feed (7%). Monthly profit per lactating cow was superior in Lam Dong (2,817 thousand VND) and HCM (2,798 thousand VND) compared to other regions in Long An (2,597 thousand VND), and Binh Duong (1,775 thousand VND). Regional differences may be mainly attributed to environmental factors, urbanization, and particularly governmental support and the availability of extension and financial institutions. Results from this study provide important information on farming practices of smallholders in Southern Vietnam that are useful in determining regions that need to be addressed by authorities in order to improve dairy production.

Keywords: dairy farms, milk yield, Southern Vietnam, socio-economics

Procedia PDF Downloads 465
8708 Spatial Analysis of Survival Pattern and Treatment Outcomes of Multi-Drug Resistant Tuberculosis (MDR-TB) Patients in Lagos, Nigeria

Authors: Akinsola Oluwatosin, Udofia Samuel, Odofin Mayowa

Abstract:

The study is aimed at assessing the Geographic Information System (GIS)-based spatial analysis of Survival Pattern and Treatment Outcomes of Multi-Drug Resistant Tuberculosis (MDR-TB) cases for Lagos, Nigeria, with an objective to inform priority areas for public health planning and resource allocation. Multi-drug resistant tuberculosis (MDR-TB) develops due to problems such as irregular drug supply, poor drug quality, inappropriate prescription, and poor adherence to treatment. The shapefile(s) for this study were already georeferenced to Minna datum. The patient’s information was acquired on MS Excel and later converted to . CSV file for easy processing to ArcMap from various hospitals. To superimpose the patient’s information the spatial data, the addresses was geocoded to generate the longitude and latitude of the patients. The database was used for the SQL query to the various pattern of the treatment. To show the pattern of disease spread, spatial autocorrelation analysis was used. The result was displayed in a graphical format showing the areas of dispersing, random and clustered of patients in the study area. Hot and cold spot analysis was analyzed to show high-density areas. The distance between these patients and the closest health facility was examined using the buffer analysis. The result shows that 22% of the points were successfully matched, while 15% were tied. However, the result table shows that a greater percentage of it was unmatched; this is evident in the fact that most of the streets within the State are unnamed, and then again, most of the patients are likely to supply the wrong addresses. MDR-TB patients of all age groups are concentrated within Lagos-Mainland, Shomolu, Mushin, Surulere, Oshodi-Isolo, and Ifelodun LGAs. MDR-TB patients between the age group of 30-47 years had the highest number and were identified to be about 184 in number. The outcome of patients on ART treatment revealed that a high number of patients (300) were not ART treatment while a paltry 45 patients were on ART treatment. The result shows the Z-score of the distribution is greater than 1 (>2.58), which means that the distribution is highly clustered at a significance level of 0.01.

Keywords: tuberculosis, patients, treatment, GIS, MDR-TB

Procedia PDF Downloads 152
8707 Role of Matric Suction in Mechanics behind Swelling Characteristics of Expansive Soils

Authors: Saloni Pandya, Nikhil Sharma, Ajanta Sachan

Abstract:

Expansive soils in the unsaturated state are part of vadose zone and encountered in several arid and semi-arid parts of the world. Influence of high temperature, low precipitation and alternate cycles of wetting and drying are responsible for the chemical weathering of rocks, which results in the formation of expansive soils. Shrinkage-swelling (expansive) soils cover a substantial portion of area in India. Damages caused by expansive soils to various geotechnical structures are alarming. Matric suction develops in unsaturated soil due to capillarity and surface tension phenomena. Matric suction influences the geometric arrangement of soil skeleton, which induces the volume change behaviour of expansive soil. In the present study, an attempt has been made to evaluate the role of matric suction in the mechanism behind swelling characteristics of expansive soil. Four different soils have been collected from different parts of India for the current research. Soil sample S1, S2, S3 and S4 were collected from Nagpur, Bharuch, Bharuch-Dahej highway and Ahmedabad respectively. DFSI (Differential Free Swell Index) of these soils samples; S1, S2, S3, and S4; were determined to be 134%, 104%, 70% and 30% respectively. X-ray diffraction analysis of samples exhibited that percentage of Montmorillonite mineral present in the soils reduced with the decrease in DFSI. A series of constant volume swell pressure tests and in-contact filter paper tests were performed to evaluate swelling pressure and matric suction of all four soils at 30% saturation and 1.46 g/cc dry density. Results indicated that soils possessing higher DFSI exhibited higher matric suction as compared to lower DFSI expansive soils. Significant influence of matric suction on swelling pressure of expansive soils was observed with varying DFSI values. Higher matric suction of soil might govern the water uptake in the interlayer spaces of Montmorillonite mineral present in expansive soil leading to crystalline swelling.

Keywords: differential free swell index, expansive soils, matric suction, swelling pressure

Procedia PDF Downloads 166
8706 Enhancement of Environmental Security by the Application of Wireless Sensor Network in Nigeria

Authors: Ahmadu Girgiri, Lawan Gana Ali, Mamman M. Baba

Abstract:

Environmental security clearly articulates the perfections and developments of various communities around the world irrespective of the region, culture, religion or social inclination. Although, the present state of insecurity has become serious issue devastating the peace, unity, stability and progress of man and his physical environment particularly in developing countries. Recently, measure of security and it management in Nigeria has been a bottle-neck to the effectiveness and advancement of various sectors that include; business, education, social relations, politics and above all an economy. Several measures have been considered on mitigating environment insecurity such as surveillance, demarcation, security personnel empowerment and the likes, but still the issue remains disturbing. In this paper, we present the application of new technology that contributes to the improvement of security surveillance known as “Wireless Sensor Network (WSN)”. The system is new, smart and emerging technology that provides monitoring, detection and aggregation of information using sensor nodes and wireless network. WSN detects, monitors and stores information or activities in the deployed area such as schools, environment, business centers, public squares, industries, and outskirts and transmit to end users. This will reduce the cost of security funding and eases security surveillance depending on the nature and the requirement of the deployment.

Keywords: application, environment, insecurity, sensor, wireless sensor network

Procedia PDF Downloads 263
8705 RSU Aggregated Message Delivery for VANET

Authors: Auxeeliya Jesudoss, Ashraph Sulaiman, Ratnakar Kotnana

Abstract:

V2V communication brings up several questions of scalability issues although message sharing in vehicular ad-hoc networks comprises of both Vehicle-to-Vehicle communications (V2V) and Vehicle to Infrastructure communication (V2I). It is not an easy task for a vehicle to verify all signatures of the messages sent by its neighboring vehicles in a timely manner, without resulting in message loss. Moreover, the communication overhead of a vehicle to authenticate another vehicle would increase together with the security of the system. Another issue to be addressed is the continuous mobility of vehicles which requires at least some information on the node’s own position to be revealed to the neighboring vehicles. This may facilitate the attacker to congregate information on a node’s position or its mobility patterns. In order to tackle these issues, this paper introduces a RSU aggregated message deliverance scheme called RAMeD. With RAMeD, roadside units (RSUs) are responsible for verifying the identity of the vehicles entering in its range, collect messages from genuine vehicles and to aggregate similar messages into groups before sending them to all the vehicles in its communication range. This aggregation will tremendously improve the rate of message delivery and reduce the message lose ratio by avoiding similar messages being sent to the vehicles redundantly. The proposed protocol is analyzed extensively to evaluate its merits and efficiency for vehicular communication.

Keywords: vehicular ad-hoc networks, V2V, V2I, VANET communication, scalability, message aggregation

Procedia PDF Downloads 408
8704 The Effect of Mandatory International Financial Reporting Standards Reporting on Investors' Herding Practice: Evidence from Eu Equity Markets

Authors: Mohammed Lawal Danrimi, Ervina Alfan, Mazni Abdullah

Abstract:

The purpose of this study is to investigate whether the adoption of International Financial Reporting Standards (IFRS) encourages information-based trading and mitigates investors’ herding practice in emerging EU equity markets. Utilizing a modified non-linear model of cross-sectional absolute deviation (CSAD), we find that the hypothesis that mandatory IFRS adoption improves the information set of investors and reduces irrational investment behavior may in some cases be incorrect, and the reverse may be true. For instance, with regard to herding concerns, the new reporting benchmark has rather aggravated investors’ herding practice. However, we also find that mandatory IFRS adoption does not appear to be the only instigator of the observed herding practice; national institutional factors, particularly regulatory quality, political stability and control of corruption, also significantly contribute to investors’ herd formation around the new reporting regime. The findings would be of interest to academics, regulators and policymakers in performing a cost-benefit analysis of the so-called better reporting regime, as well as financial statement users who make decisions based on firms’ fundamental variables, treating them as significant indicators of future market movement.

Keywords: equity markets, herding, IFRS, CSAD

Procedia PDF Downloads 178
8703 Involvement of Nrf2 in Kolaviron-Mediated Attenuation of Behavioural Incompetence and Neurodegeneration in a Murine Model of Parkinson's Disease

Authors: Yusuf E. Mustapha, Inioluwa A Akindoyeni, Oluwatoyin G. Ezekiel, Ifeoluwa O. Awogbindin, Ebenezer O. Farombi

Abstract:

Background: Parkinson's disease (PD) is the most prevalent motor disorder. Available therapies are palliative with no effect on disease progression. Kolaviron (KV), a natural anti-inflammatory and antioxidant agent, has been reported to possess neuroprotective effects in Parkinsonian flies and rats. Objective: The present study investigates the neuroprotective effect of KV, focusing on the DJ1/Nrf2 signaling pathway. Methodology: All-trans retinoic acid (ATRA, 10 mg/kg, i.p.) was used to inhibit Nrf2. Murine model of PD was established with four doses of MPTP (20 mg/kg i.p.) at 2 hours interval. MPTP mice were pre-treated with either KV (200 mg/kg/day p.o), ATRA, or both conditions for seven days before PD induction. Motor behaviour was evaluated, and markers of oxidative stress/damage and its regulators were assessed with immunofluorescence and ELISA techniques. Results: MPTP-treated mice covered less distance with reduced numbers of anticlockwise rotations, heightened freezing, and prolonged immobility when compared to control. However, KV significantly attenuated these deficits. Pretreatment of MPTP mice with KV upregulated Nrf2 expression beyond MPTP level with a remarkable reduction in Keap1 expression and marked elevation of DJ-1 level, whereas co-administration with ATRA abrogated these effects. KV treatment restored MPTP-mediated depletion of endogenous antioxidant, striatal oxidative stress, oxidative damage, and inhibition of acetylcholinesterase activity. However, ATRA treatment potentiated acetylcholinesterase inhibition and attenuated the protective effect of KV on the level of nitric oxide and activities of catalase and superoxide dismutase. Conclusion: Kolaviron protects Parkinsonian mice by stabilizing and activating the Nrf2 signaling pathway. Thus, kolaviron can be explored as a pharmacological lead in PD management.

Keywords: Garcinia kola, Kolaviron, Parkinson Disease, Nrf2, behavioral incompetence, neurodegeneration

Procedia PDF Downloads 101
8702 A Review Study on the Importance and Correlation of Crisis Literacy and Media Communications for Vulnerable Marginalized People During Crisis

Authors: Maryam Jabeen

Abstract:

In recent times, there has been a notable surge in attention towards diverse literacy concepts such as media literacy, information literacy, and digital literacy. These concepts have garnered escalating interest, spurring the emergence of novel approaches, particularly in the aftermath of the Covid-19 crisis. However, amidst discussions of crises, the domain of crisis literacy remains largely uncharted within academic exploration. Crisis literacy, also referred to as disaster literacy, denotes an individual's aptitude to not only comprehend but also effectively apply information, enabling well-informed decision-making and adherence to instructions about disaster mitigation, preparedness, response, and recovery. This theoretical and descriptive study seeks to transcend foundational literacy concepts, underscoring the urgency for an in-depth exploration of crisis literacy and its interplay with the realm of media communication. Given the profound impact of the pandemic experience and the looming uncertainty of potential future crises, there arises a pressing need to elevate crisis literacy, or disaster literacy, towards heightened autonomy and active involvement within the spheres of critical disaster preparedness, recovery initiatives, and media communication domains. This research paper is part of my ongoing Ph.D. research study, which explores on a broader level the Encoding and decoding of media communications in relation to crisis literacy. The primary objective of this research paper is to expound upon a descriptive, theoretical research endeavor delving into this domain. The emphasis lies in highlighting the paramount significance of media communications in literacy of crisis, coupled with an accentuated focus on its role in providing information to marginalized populations amidst crises. In conclusion, this research bridges the gap in crisis literacy correlation to media communications exploration, advocating for a comprehensive understanding of its dynamics and its symbiotic relationship with media communications. It intends to foster a heightened sense of crisis literacy, particularly within marginalized communities, catalyzing proactive participation in disaster preparedness, recovery processes, and adept media interactions.

Keywords: covid-19, crisis literacy, crisis, marginalized, media and communications, pandemic, vulnerable people

Procedia PDF Downloads 62