Search results for: user safety
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5321

Search results for: user safety

1571 'I'm in a Very Safe Place': Webcam Sex Workers in Aotearoa, New Zealand and Their Perceptions of Danger and Risk

Authors: Madeline V. Henry

Abstract:

Sex work is a contested subject in academia. Many authors now argue that the practice should be recognized as a legitimate and rationally chosen form of labor, and that decriminalization is necessary to ensure the safety of sex workers and reduce their stigmatization. However, a prevailing argument remains that the work is inherently violent and oppressive and that all sex workers are directly or indirectly coerced into participating in the industry. This argument has been complicated by the recent proliferation of computer-mediated technologies that allow people to conduct sex work without the need to be physically co-present with customers or pimps. One example of this is the practice of ‘camming’, wherein ‘webcam models’ stream themselves stripping and/or performing autoerotic stimulation in an online chat-room for payment. In this presentation, interviews with eight ‘camgirls’ (aged 22-34) will be discussed. Their talk has been analyzed using Foucauldian discourse analysis, focusing on common discursive threads in relation to the work and their subjectivities. It was found that the participants demonstrated appreciation for the lack of physical danger they were in, but emphasized the unique and significant dangers of online-based sex work (their images and videos being recorded and shared without their consent, for example). Participants also argued that their largest concerns were based around stigma, which they claimed remained prevalent despite the decriminalized legal model in Aotearoa/New Zealand (which has been in place for over 14 years). Overall, this project seeks to challenge commonplace academic approaches to sex work, adding further research to support sex workers’ rights and highlighting new issues to consider in a digital environment.

Keywords: camming, sex work, stigma, risk

Procedia PDF Downloads 141
1570 Livable City as a New Approach for Sustainable Urban Planning

Authors: Nora Mohammed Rehan Hussien

Abstract:

Cities all over the world face daunting urban challenges that have increased in scope in recent years. The biggest challenge includes issues of urban planning, housing, safety aspects, scarcity of land for development and traffic congestion. So every city in the world aspires to adopt the strategy of ‘Livable City’ which guarantees the cities urbanization manner that preserves the environment, and achieve the greatest benefit from the resources and achieve a good standard of living. Essentially, a livable city should possess basic yet unique attributes to welcome people from all strata of society without marginalizing any particular group. Most of these cities began to move towards sustainability and livability to enhance quality and performance of urban services, to reduce costs and resources consumption, to engage more affectivity and actively with its citizens, and to describe the quality of life and the characteristics of cities that make them livable. From here came the idea of the research which is creating ‘A framework of livable and sustainable city’ as a sustainable approach that must follow to achieve the principle of sustainable livability. From this point of view the research deals with one of the most successful case studies all over the world in’ livable cities system’ (Vienna) to know how to explore and understand the issues and challenges in becoming a full- livable and creative city through analyzing the criteria, principles and strategy of livable city then deducing the framework towards this concept. Finally, it suggests a set of recommendations help for applying the concept of livable city.

Keywords: quality of life, livability & livable city, sustainability, sustainable city

Procedia PDF Downloads 270
1569 Wireless Information Transfer Management and Case Study of a Fire Alarm System in a Residential Building

Authors: Mohsen Azarmjoo, Mehdi Mehdizadeh Koupaei, Maryam Mehdizadeh Koupaei, Asghar Mahdlouei Azar

Abstract:

The increasing prevalence of wireless networks in our daily lives has made them indispensable. The aim of this research is to investigate the management of information transfer in wireless networks and the integration of renewable solar energy resources in a residential building. The focus is on the transmission of electricity and information through wireless networks, as well as the utilization of sensors and wireless fire alarm systems. The research employs a descriptive approach to examine the transmission of electricity and information on a wireless network with electric and optical telephone lines. It also investigates the transmission of signals from sensors and wireless fire alarm systems via radio waves. The methodology includes a detailed analysis of security, comfort conditions, and costs related to the utilization of wireless networks and renewable solar energy resources. The study reveals that it is feasible to transmit electricity on a network cable using two pairs of network cables without the need for separate power cabling. Additionally, the integration of renewable solar energy systems in residential buildings can reduce dependence on traditional energy carriers. The use of sensors and wireless remote information processing can enhance the safety and efficiency of energy usage in buildings and the surrounding spaces.

Keywords: renewable energy, intelligentization, wireless sensors, fire alarm system

Procedia PDF Downloads 38
1568 Non-Physician Medical Worker Experience during the COVID-19 Pandemic

Authors: William Mahony, L. Jacqueline Hirth, Richard Rupp, Sandra Gonzalez, Roger Zoorob

Abstract:

Background: The impact of the COVID-19 pandemic on physicians has been considered by many researchers, but less is known about non-physician healthcare workers. The aim of this study is to examine the association of COVID-19 safety training and communication with stress. Methods: A 91-item online survey was distributed, starting January 2, 2021, to non-physician healthcare workers, including physician assistants, nurse practitioners, and medical assistants (MAs) in the United States through email and social media. A $1 donation was made to the Red Cross for each completed survey. The survey consisted of demographics, occupational questions, and perceived stress (perceived stress scale, PSS). Items on the PSS were combined for an overall score and categorized according to the severity of perceived stress. Chi-square tests were performed for bivariate analyses of categorical variables. Results: Of the 284 participants consenting to complete the survey, 197 participants completed the full survey. MAs made up most of the sample at 79%. Among all respondents, 47% had moderate PSS scores (scored between 14 and 26), and 51% had severe PSS scores (scored between 27 and 40). Unvaccinated participants reported statistically significantly lower levels of perceived stress (p = 0.002). Performing tasks outside of typical job responsibilities was not associated with PSS scores (p = .667). Discussion: Non-physician healthcare workers demonstrated a high level of perceived stress overall. The association between vaccination status and perceived stress should be examined in order to evaluate whether vaccination levels could be improved with further education about the virus and associated risks.

Keywords: COVID-19, SARS-Cov-2, nursing, public health

Procedia PDF Downloads 160
1567 The Concerns and Recommendations of Informal and Professional Caregivers for COVID-19 Policy for Homecare and Long-Term Care For People with Dementia: A Qualitative Study

Authors: Hanneke J. A. Smaling, Mandy Visser

Abstract:

One way to reduce the risk of COVID-19 infection is by preventing close interpersonal contact with distancing measures. These social distancing measures presented challenges to the health and wellbeing of people with dementia and their informal and professional caregivers. This study describes the concerns and recommendations of informal and professional caregivers for COVID-19 policy for home care and long-term care for people with dementia during the first and second COVID-19 wave in the Netherlands. In this qualitative interview study, 20 informal caregivers and 20 professional caregivers from home care services and long-term care participated. Interviews were analyzed using an inductive thematic analysis approach. Both informal and professional caregivers worried about getting infected or infecting others with COVID-19, the consequences of the distancing measures, and quality of care. There was a general agreement that policy in the second wave was better informed compared to the first wave. At an organizational level, the policy was remarkably flexible. Recommendations were given for dementia care (need to offer meaningful activities, improve the organization of care, more support for informal caregivers), policy (national vs. locally organization, social isolation measures, visitor policy), and communication. Our study contributes to the foundation of future care decisions by (inter)national policymakers, politicians, and healthcare organizations during the course of the COVID-19 pandemic, underlining the need for balance between safety and autonomy for people with dementia.

Keywords: covid-19, dementia, home care, long-term care, policy

Procedia PDF Downloads 118
1566 Self-Marketing on Line Person-to-Person Social Media

Authors: Chih-Ping Chen

Abstract:

Today, technology does not necessitate change; rather, social media has afforded a new arena and digital tools for users/individuals to be symbolized and marketed in meaningful exchanges of digital identities. We argue that these symbolic interactions may afford individuals the ability to create and present less restricted Line person-to-person (P2P) chats than would be possible in face-to-face communications. Individuals can select flexible influence strategies to market themselves, which enables them to create and present their digital identities and impressions in alternative ways within a dynamic sociocultural context. Therefore, this paper aims to explore the novel phenomenon of how individuals market themselves to manage their digital identities and impressions to connect with other users through the symbolic interactions created by new digital tools (e.g., stickers). A netnographic approach was developed by applying a triangulated methodology consisting of user self-diary reports, in-depth interviews, and observations. Totally, 20 participants (10 females and 10 males) were of Taiwanese origin, and their ages ranged from 20–47 years old. The findings of this research showed that individuals on Line P2P social media where traditional cultural gender norms have shifted. Both male and female participants market their modern digital identities by adopting a combination of flexible influence tactics/strategies when using digital stickers. Some findings showed that their influence tactics/strategies often flouted Taiwanese cultural gender norms or skirted traditional rules to fit individual or P2P needs. Finally, these findings potentially contributed to the literature regarding the consumer culture theory and symbolic interaction theory in digital marketing and social media fields.

Keywords: Consumer culture theory, Digital sticker, Self-marketing, Impression, Symbolic interaciton

Procedia PDF Downloads 66
1565 Fabrication of a Potential Point-of-Care Device for Hemoglobin A1c: A Lateral Flow Immunosensor

Authors: Shu Hwang Ang, Choo Yee Yu, Geik Yong Ang, Yean Yean Chan, Yatimah Binti Alias, And Sook Mei Khor

Abstract:

With the high prevalence of Type 2 diabetes mellitus across the world, the morbidities and mortalities associated with Type 2 diabetes have significant impact on the production line for a nation. With routine scheduled clinical visits to manage Type 2 diabetes, diabetic patients with hectic lifestyles can have low clinical compliance. Hence, it often decreases the effectiveness of diabetic management personalized for each diabetic patient. Here, we report a useful developed point-of-care (POC) device that detect glycated hemoglobin (HbA1c, biomarker for long-term Type 2 diabetic management). In fact, the established POC devices certified to be used in clinical setting are not only expensive ($ 8 to $10 per test), they also require skillful practitioners to perform sampling and interpretation. As a paper-based biosensor, the developed HbA1c biosensor utilized lateral flow principle to offer an alternative for cost-effective (approximately $2 per test) and end-user friendly device for household testing. Requiring as little as 2 L of finger-picked blood, the test can be performed at the household with just simple dilution and washings. With visual interpretation of numbers of test lines shown on the developed biosensor, it can be interpreted as easy as a urine pregnancy test, aided with scale of intensity provided. In summary, the developed HbA1c immunosensor has been tested to have high selectivity towards HbA1c, and is stable with reasonably good performance in clinical testing. Therefore, our developed HbA1c immunosensor has high potential to be an effective diabetic management tool to increase patient compliance and thus contain the progression of the diabetes.

Keywords: blood, glycated hemoglobin (HbA1c), lateral flow, type 2 diabetes mellitus

Procedia PDF Downloads 513
1564 Evaluation of Turbulence Prediction over Washington, D.C.: Comparison of DCNet Observations and North American Mesoscale Model Outputs

Authors: Nebila Lichiheb, LaToya Myles, William Pendergrass, Bruce Hicks, Dawson Cagle

Abstract:

Atmospheric transport of hazardous materials in urban areas is increasingly under investigation due to the potential impact on human health and the environment. In response to health and safety concerns, several dispersion models have been developed to analyze and predict the dispersion of hazardous contaminants. The models of interest usually rely on meteorological information obtained from the meteorological models of NOAA’s National Weather Service (NWS). However, due to the complexity of the urban environment, NWS forecasts provide an inadequate basis for dispersion computation in urban areas. A dense meteorological network in Washington, DC, called DCNet, has been operated by NOAA since 2003 to support the development of urban monitoring methodologies and provide the driving meteorological observations for atmospheric transport and dispersion models. This study focuses on the comparison of wind observations from the DCNet station on the U.S. Department of Commerce Herbert C. Hoover Building against the North American Mesoscale (NAM) model outputs for the period 2017-2019. The goal is to develop a simple methodology for modifying NAM outputs so that the dispersion requirements of the city and its urban area can be satisfied. This methodology will allow us to quantify the prediction errors of the NAM model and propose adjustments of key variables controlling dispersion model calculation.

Keywords: meteorological data, Washington D.C., DCNet data, NAM model

Procedia PDF Downloads 217
1563 A Randomized Comparative Evaluation of Efficacy of Ultrasound Guided Costoclavicular and Supraclavicular Approaches of Brachial Plexus Block for Upper Limb Surgeries

Authors: Anshul, Rajni Kalia, Sachin Kumar

Abstract:

Introduction: The costoclavicular approach, a modification to the infraclavicular approach, has been described for anesthesia for upper limb surgeries. Material And Methods: In this randomized and single-blind study, fourty patients undergoing emergency/elective upper limb surgery were allocated to two groups. Group C and S received ultrasound-guided Costoclavicular block and Supraclavicular block, respectively, with 20 ml 0.5 % ropivacaine with 8 mg dexamethasone under strict asepsis. The primary outcome assessed was the total duration of sensory and motor block in the postoperative period. Secondary outcomes were to compare the time taken to perform the procedure, block characteristics in terms of onset of motor and sensory blockade, the efficacy of analgesia with respect to the time of administration of the first rescue analgesic dose with both the blocks and note the side effects pertaining to either of the blocks. Results: The mean total duration of sensory and motor blockade was longer in group C vs. group S (p=0.002 and 0.024, respectively). The mean duration to perform a block in group S was more than in group C (p=0.012). The mean onset of sensory and motor Blockade Time in group S was more than in group C (p<0.001 and <0.001, respectively). The mean duration to perform a block in group S was more than in group C (p=0.012). Conclusion: The costoclavicular approach is better than supraclavicular in terms of rapid execution, faster onset of sensory-motor blockade, prolonged postoperative analgesia and similar PONV and safety profile.

Keywords: costoclavicular, supraclavicular, ropivacaine, dexamethasone

Procedia PDF Downloads 53
1562 Laser Shock Peening of Additively Manufactured Nickel-Based Superalloys

Authors: Michael Munther, Keivan Davami

Abstract:

One significant roadblock for additively manufactured (AM) parts is the buildup of residual tensile stresses during the fabrication process. These residual stresses are formed due to the intense localized thermal gradients and high cooling rates that cause non-uniform material expansion/contraction and mismatched strain profiles during powder-bed fusion techniques, such as direct metal laser sintering (DMLS). The residual stresses adversely affect the fatigue life of the AM parts. Moreover, if the residual stresses become higher than the material’s yield strength, they will lead to acute geometric distortion. These are limiting the applications and acceptance of AM components for safety-critical applications. Herein, we discuss laser shock peening method as an advanced technique for the manipulation of the residual stresses in AM parts. An X-ray diffraction technique is used for the measurements of the residual stresses before and after the laser shock peening process. Also, the hardness of the structures is measured using a nanoindentation technique. Maps of nanohardness and modulus are obtained from the nanoindentation, and a correlation is made between the residual stresses and the mechanical properties. The results indicate that laser shock peening is able to induce compressive residual stresses in the structure that mitigate the tensile residual stresses and increase the hardness of AM IN718, a superalloy, almost 20%. No significant changes were observed in the modulus after laser shock peening. The results strongly suggest that laser shock peening can be used as an advanced post-processing technique to optimize the service lives of critical components for various applications.

Keywords: additive manufacturing, Inconel 718, laser shock peening, residual stresses

Procedia PDF Downloads 112
1561 Qualitative and Quantitative Methods in Multidisciplinary Fields Collection Development

Authors: Hui Wang

Abstract:

Traditional collection building approaches are limited in breadth and scope and are not necessarily suitable for multidisciplinary fields development in the institutes of the Chinese Academy of Sciences. The increasing of multidisciplinary fields researches require a viable approach to collection development in these libraries. This study uses qualitative and quantitative analysis to assess collection. The quantitative analysis consists of three levels of evaluation, which including realistic demand, potential demand and trend demand analysis. For one institute, three samples were separately selected from the object institute, more than one international top institutes in highly relative research fields and future research hotspots. Each sample contains an appropriate number of papers published in recent five years. Several keywords and the organization names were reasonably combined to search in commercial databases and the institutional repositories. The publishing information and citations in the bibliographies of these papers were selected to build the dataset. One weighted evaluation model and citation analysis were used to calculate the demand intensity index of every journal and book. Principal Investigator selector and database traffic provide a qualitative evidence to describe the demand frequency. The demand intensity, demand frequency and academic committee recommendations were comprehensively considered to recommend collection development. The collection gaps or weaknesses were ascertained by comparing the current collection and the recommend collection. This approach was applied in more than 80 institutes’ libraries in Chinese Academy of Sciences in the past three years. The evaluation results provided an important evidence for collections building in the second year. The latest user survey results showed that the updated collection’s capacity to support research in a multidisciplinary subject area have increased significantly.

Keywords: citation analysis, collection assessment, collection development, quantitative analysis

Procedia PDF Downloads 194
1560 Engineered Reactor Components for Durable Iron Flow Battery

Authors: Anna Ivanovskaya, Alexandra E. L. Overland, Swetha Chandrasekaran, Buddhinie S. Jayathilake

Abstract:

Iron-based redox flow batteries (IRFB) are promising for grid-scale storage because of their low-cost and environmental safety. Earth-abundant iron can enable affordable grid-storage to meet DOE’s target material cost <$20/kWh and levelized cost for storage $0.05/kWh. In conventional redox flow batteries, energy is stored in external electrolyte tanks and electrolytes are circulated through the cell units to achieve electrochemical energy conversions. However, IRFBs are hybrid battery systems where metallic iron deposition at the negative side of the battery controls the storage capacity. This adds complexity to the design of a porous structure of 3D-electrodes to achieve a desired high storage capacity. In addition, there is a need to control parasitic hydrogen evolution reaction which accompanies the metal deposition process, increases the pH, lowers the energy efficiency, and limits the durability. To achieve sustainable operation of IRFBs, electrolyte pH, which affects the solubility of reactants and the rate of parasitic reactions, needs to be dynamically readjusted. In the present study we explore the impact of complexing agents on maintaining solubility of the reactants and find the optimal electrolyte conditions and battery operating regime, which are specific for IRFBs with additives, and demonstrate the robust operation.

Keywords: flow battery, iron-based redox flow battery, IRFB, energy storage, electrochemistry

Procedia PDF Downloads 64
1559 First and Second Analysis on the Reheat Organic Rankine Cycle

Authors: E. Moradimaram, H. Sayehvand

Abstract:

In recent years the increasing use of fossil fuels has led to various environmental problems including urban pollution, ozone layer depletion and acid rains. Moreover, with the increased number of industrial centers and higher consumption of these fuels, the end point of the fossil energy reserves has become more evident. Considering the environmental pollution caused by fossil fuels and their limited availability, renewable sources can be considered as the main substitute for non-renewable resources. One of these resources is the Organic Rankine Cycles (ORCs). These cycles while having high safety, have low maintenance requirements. Combining the ORCs with other systems, such as ejector and reheater will increase overall cycle efficiency. In this study, ejector and reheater are used to improve the thermal efficiency (ηth), exergy efficiency (η_ex) and net output power (w_net); therefore, the ORCs with reheater (RORCs) are proposed. A computational program has been developed to calculate the thermodynamic parameters required in Engineering Equations Solver (EES). In this program, the analysis of the first and second law in RORC is conducted, and a comparison is made between them and the ORCs with Ejector (EORC). R245fa is selected as the working fluid and water is chosen as low temperature heat source with a temperature of 95 °C and a mass transfer rate of 1 kg/s. The pressures of the second evaporator and reheater are optimized in terms of maximum exergy efficiency. The environment is at 298.15 k and at 101.325 kpa. The results indicate that the thermodynamic parameters in the RORC have improved compared to EORC.

Keywords: Organic Rankine Cycle (ORC), Organic Rankine Cycle with Reheater (RORC), Organic Rankine Cycle with Ejector (EORC), exergy efficiency

Procedia PDF Downloads 149
1558 Performance Measurement by Analytic Hierarchy Process in Performance Based Logistics

Authors: M. Hilmi Ozdemir, Gokhan Ozkan

Abstract:

Performance Based Logistics (PBL) is a strategic approach that enables creating long-term and win-win relations among stakeholders in the acquisition. Contrary to the traditional single transactions, the expected value is created by the performance of the service pertaining to the strategic relationships in this approach. PBL motivates all relevant stakeholders to focus on their core competencies to produce the desired outcome in a collective way. The desired outcome can only be assured with a cost effective way as long as it is periodically measured with the right performance parameters. Thus, defining these parameters is a crucial step for the PBL contracts. In performance parameter determination, Analytic Hierarchy Process (AHP), which is a multi-criteria decision making methodology for complex cases, was used within this study for a complex system. AHP has been extensively applied in various areas including supply chain, inventory management, outsourcing, and logistics. This methodology made it possible to convert end-user’s main operation and maintenance requirements to sub criteria contained by a single performance parameter. Those requirements were categorized and assigned weights by the relevant stakeholders. Single performance parameter capable of measuring the overall performance of a complex system is the major outcome of this study. The parameter deals with the integrated assessment of different functions spanning from training, operation, maintenance, reporting, and documentation that are implemented within a complex system. The aim of this study is to show the methodology and processes implemented to identify a single performance parameter for measuring the whole performance of a complex system within a PBL contract. AHP methodology is recommended as an option for the researches and the practitioners who seek for a lean and integrated approach for performance assessment within PBL contracts. The implementation of AHP methodology in this study may help PBL practitioners from methodological perception and add value to AHP in becoming prevalent.

Keywords: analytic hierarchy process, performance based logistics, performance measurement, performance parameters

Procedia PDF Downloads 269
1557 A Neural Network Approach for an Automatic Detection and Localization of an Open Phase Circuit of a Five-Phase Induction Machine Used in a Drivetrain of an Electric Vehicle

Authors: Saad Chahba, Rabia Sehab, Ahmad Akrad, Cristina Morel

Abstract:

Nowadays, the electric machines used in urban electric vehicles are, in most cases, three-phase electric machines with or without a magnet in the rotor. Permanent Magnet Synchronous Machine (PMSM) and Induction Machine (IM) are the main components of drive trains of electric and hybrid vehicles. These machines have very good performance in healthy operation mode, but they are not redundant to ensure safety in faulty operation mode. Faced with the continued growth in the demand for electric vehicles in the automotive market, improving the reliability of electric vehicles is necessary over the lifecycle of the electric vehicle. Multiphase electric machines respond well to this constraint because, on the one hand, they have better robustness in the event of a breakdown (opening of a phase, opening of an arm of the power stage, intern-turn short circuit) and, on the other hand, better power density. In this work, a diagnosis approach using a neural network for an open circuit fault or more of a five-phase induction machine is developed. Validation on the simulator of the vehicle drivetrain, at reduced power, is carried out, creating one and more open circuit stator phases showing the efficiency and the reliability of the new approach to detect and to locate on-line one or more open phases of a five-induction machine.

Keywords: electric vehicle drivetrain, multiphase drives, induction machine, control, open circuit (OC) fault diagnosis, artificial neural network

Procedia PDF Downloads 180
1556 Cracks Detection and Measurement Using VLP-16 LiDAR and Intel Depth Camera D435 in Real-Time

Authors: Xinwen Zhu, Xingguang Li, Sun Yi

Abstract:

Crack is one of the most common damages in buildings, bridges, roads and so on, which may pose safety hazards. However, cracks frequently happen in structures of various materials. Traditional methods of manual detection and measurement, which are known as subjective, time-consuming, and labor-intensive, are gradually unable to meet the needs of modern development. In addition, crack detection and measurement need be safe considering space limitations and danger. Intelligent crack detection has become necessary research. In this paper, an efficient method for crack detection and quantification using a 3D sensor, LiDAR, and depth camera is proposed. This method works even in a dark environment, which is usual in real-world applications. The LiDAR rapidly spins to scan the surrounding environment and discover cracks through lasers thousands of times per second, providing a rich, 3D point cloud in real-time. The LiDAR provides quite accurate depth information. The precision of the distance of each point can be determined within around  ±3 cm accuracy, and not only it is good for getting a precise distance, but it also allows us to see far of over 100m going with the top range models. But the accuracy is still large for some high precision structures of material. To make the depth of crack is much more accurate, the depth camera is in need. The cracks are scanned by the depth camera at the same time. Finally, all data from LiDAR and Depth cameras are analyzed, and the size of the cracks can be quantified successfully. The comparison shows that the minimum and mean absolute percentage error between measured and calculated width are about 2.22% and 6.27%, respectively. The experiments and results are presented in this paper.

Keywords: LiDAR, depth camera, real-time, detection and measurement

Procedia PDF Downloads 201
1555 Saving Energy through Scalable Architecture

Authors: John Lamb, Robert Epstein, Vasundhara L. Bhupathi, Sanjeev Kumar Marimekala

Abstract:

In this paper, we focus on the importance of scalable architecture for data centers and buildings in general to help an enterprise achieve environmental sustainability. The scalable architecture helps in many ways, such as adaptability to the business and user requirements, promotes high availability and disaster recovery solutions that are cost effective and low maintenance. The scalable architecture also plays a vital role in three core areas of sustainability: economy, environment, and social, which are also known as the 3 pillars of a sustainability model. If the architecture is scalable, it has many advantages. A few examples are that scalable architecture helps businesses and industries to adapt to changing technology, drive innovation, promote platform independence, and build resilience against natural disasters. Most importantly, having a scalable architecture helps industries bring in cost-effective measures for energy consumption, reduce wastage, increase productivity, and enable a robust environment. It also helps in the reduction of carbon emissions with advanced monitoring and metering capabilities. Scalable architectures help in reducing waste by optimizing the designs to utilize materials efficiently, minimize resources, decrease carbon footprints by using low-impact materials that are environmentally friendly. In this paper we also emphasize the importance of cultural shift towards the reuse and recycling of natural resources for a balanced ecosystem and maintain a circular economy. Also, since all of us are involved in the use of computers, much of the scalable architecture we have studied is related to data centers.

Keywords: scalable architectures, sustainability, application design, disruptive technology, machine learning and natural language processing, AI, social media platform, cloud computing, advanced networking and storage devices, advanced monitoring and metering infrastructure, climate change

Procedia PDF Downloads 69
1554 Sustainable Accommodation Design: Improving Residential Property Shortage for Low-Income People in Nigeria

Authors: Paulinus W. Ihuah, Iyenemi Ibimina Kakulu, Victor A. Akujuru

Abstract:

The development of the residential property is very expensive in Nigeria, especially as it is observed in Port Harcourt, although it is also investment costly in the other cities of Nigeria. The costly development nature incidentally reasons to the high deficits in residential property availability and affordability for the low-income people. Therefore, the main purpose of this paper is to provide sustainable accommodation design, which should improve residential property expensiveness and shortages for the low-income people. This is achieved through investigation of the tangible requirements and needs of the end-user of the property (low-income people), which thereafter would enhance sustainable and affordable residential property accommodation design for the end-users. Both the quantitative and qualitative instruments of data collection were utilised. The quantitative instrument via questionnaires was designed to examine the real needs and r requirement of the low-income people. However, the qualitative instrument via structured interview was espoused for the gathering of professionals’ opinions on the three predicted sustainable accommodation design alternatives. The analysis employed content analysis parameters, which offered a sustainable accommodation design and designed alternatives minimises costs and environmental impacts whereas exploiting the social satisfaction in residential accommodation developments. The finding underscores that sustainable accommodation design and development is practicable in Nigeria, so that cost of residential accommodation provided through this system is cheap to the low-income people. Further, erection of multi-storey residential accommodation units such as bedsit structure by utilising the concrete frame structure and building the internal and external walls with hollow concrete blocks within areas 60-130 square meters is encouraged. This paper philosophy indicates that by using sustainable accommodation design practices in Nigeria, improvements in the costs and shortages of residential accommodation can be attained for low-income people. However, policies support the government cannot be overemphasised for proper implementation of the suggested scheme.

Keywords: sustainable accommodation, housing design, residential property, low-income people

Procedia PDF Downloads 254
1553 dynr.mi: An R Program for Multiple Imputation in Dynamic Modeling

Authors: Yanling Li, Linying Ji, Zita Oravecz, Timothy R. Brick, Michael D. Hunter, Sy-Miin Chow

Abstract:

Assessing several individuals intensively over time yields intensive longitudinal data (ILD). Even though ILD provide rich information, they also bring other data analytic challenges. One of these is the increased occurrence of missingness with increased study length, possibly under non-ignorable missingness scenarios. Multiple imputation (MI) handles missing data by creating several imputed data sets, and pooling the estimation results across imputed data sets to yield final estimates for inferential purposes. In this article, we introduce dynr.mi(), a function in the R package, Dynamic Modeling in R (dynr). The package dynr provides a suite of fast and accessible functions for estimating and visualizing the results from fitting linear and nonlinear dynamic systems models in discrete as well as continuous time. By integrating the estimation functions in dynr and the MI procedures available from the R package, Multivariate Imputation by Chained Equations (MICE), the dynr.mi() routine is designed to handle possibly non-ignorable missingness in the dependent variables and/or covariates in a user-specified dynamic systems model via MI, with convergence diagnostic check. We utilized dynr.mi() to examine, in the context of a vector autoregressive model, the relationships among individuals’ ambulatory physiological measures, and self-report affect valence and arousal. The results from MI were compared to those from listwise deletion of entries with missingness in the covariates. When we determined the number of iterations based on the convergence diagnostics available from dynr.mi(), differences in the statistical significance of the covariate parameters were observed between the listwise deletion and MI approaches. These results underscore the importance of considering diagnostic information in the implementation of MI procedures.

Keywords: dynamic modeling, missing data, mobility, multiple imputation

Procedia PDF Downloads 154
1552 LTE Performance Analysis in the City of Bogota Northern Zone for Two Different Mobile Broadband Operators over Qualipoc

Authors: Víctor D. Rodríguez, Edith P. Estupiñán, Juan C. Martínez

Abstract:

The evolution in mobile broadband technologies has allowed to increase the download rates in users considering the current services. The evaluation of technical parameters at the link level is of vital importance to validate the quality and veracity of the connection, thus avoiding large losses of data, time and productivity. Some of these failures may occur between the eNodeB (Evolved Node B) and the user equipment (UE), so the link between the end device and the base station can be observed. LTE (Long Term Evolution) is considered one of the IP-oriented mobile broadband technologies that work stably for data and VoIP (Voice Over IP) for those devices that have that feature. This research presents a technical analysis of the connection and channeling processes between UE and eNodeB with the TAC (Tracking Area Code) variables, and analysis of performance variables (Throughput, Signal to Interference and Noise Ratio (SINR)). Three measurement scenarios were proposed in the city of Bogotá using QualiPoc, where two operators were evaluated (Operator 1 and Operator 2). Once the data were obtained, an analysis of the variables was performed determining that the data obtained in transmission modes vary depending on the parameters BLER (Block Error Rate), performance and SNR (Signal-to-Noise Ratio). In the case of both operators, differences in transmission modes are detected and this is reflected in the quality of the signal. In addition, due to the fact that both operators work in different frequencies, it can be seen that Operator 1, despite having spectrum in Band 7 (2600 MHz), together with Operator 2, is reassigning to another frequency, a lower band, which is AWS (1700 MHz), but the difference in signal quality with respect to the establishment with data by the provider Operator 2 and the difference found in the transmission modes determined by the eNodeB in Operator 1 is remarkable.

Keywords: BLER, LTE, network, qualipoc, SNR.

Procedia PDF Downloads 99
1551 Software Transactional Memory in a Dynamic Programming Language at Virtual Machine Level

Authors: Szu-Kai Hsu, Po-Ching Lin

Abstract:

As more and more multi-core processors emerge, traditional sequential programming paradigm no longer suffice. Yet only few modern dynamic programming languages can leverage such advantage. Ruby, for example, despite its wide adoption, only includes threads as a simple parallel primitive. The global virtual machine lock of official Ruby runtime makes it impossible to exploit full parallelism. Though various alternative Ruby implementations do eliminate the global virtual machine lock, they only provide developers dated locking mechanism for data synchronization. However, traditional locking mechanism error-prone by nature. Software Transactional Memory is one of the promising alternatives among others. This paper introduces a new virtual machine: GobiesVM to provide a native software transactional memory based solution for dynamic programming languages to exploit parallelism. We also proposed a simplified variation of Transactional Locking II algorithm. The empirical results of our experiments show that support of STM at virtual machine level enables developers to write straightforward code without compromising parallelism or sacrificing thread safety. Existing source code only requires minimal or even none modi cation, which allows developers to easily switch their legacy codebase to a parallel environment. The performance evaluations of GobiesVM also indicate the difference between sequential and parallel execution is significant.

Keywords: global interpreter lock, ruby, software transactional memory, virtual machine

Procedia PDF Downloads 267
1550 Evaluation of Classification Algorithms for Diagnosis of Asthma in Iranian Patients

Authors: Taha SamadSoltani, Peyman Rezaei Hachesu, Marjan GhaziSaeedi, Maryam Zolnoori

Abstract:

Introduction: Data mining defined as a process to find patterns and relationships along data in the database to build predictive models. Application of data mining extended in vast sectors such as the healthcare services. Medical data mining aims to solve real-world problems in the diagnosis and treatment of diseases. This method applies various techniques and algorithms which have different accuracy and precision. The purpose of this study was to apply knowledge discovery and data mining techniques for the diagnosis of asthma based on patient symptoms and history. Method: Data mining includes several steps and decisions should be made by the user which starts by creation of an understanding of the scope and application of previous knowledge in this area and identifying KD process from the point of view of the stakeholders and finished by acting on discovered knowledge using knowledge conducting, integrating knowledge with other systems and knowledge documenting and reporting.in this study a stepwise methodology followed to achieve a logical outcome. Results: Sensitivity, Specifity and Accuracy of KNN, SVM, Naïve bayes, NN, Classification tree and CN2 algorithms and related similar studies was evaluated and ROC curves were plotted to show the performance of the system. Conclusion: The results show that we can accurately diagnose asthma, approximately ninety percent, based on the demographical and clinical data. The study also showed that the methods based on pattern discovery and data mining have a higher sensitivity compared to expert and knowledge-based systems. On the other hand, medical guidelines and evidence-based medicine should be base of diagnostics methods, therefore recommended to machine learning algorithms used in combination with knowledge-based algorithms.

Keywords: asthma, datamining, classification, machine learning

Procedia PDF Downloads 432
1549 Fundamentals of Mobile Application Architecture

Authors: Mounir Filali

Abstract:

Companies use many innovative ways to reach their customers to stay ahead of the competition. Along with the growing demand for innovative business solutions is the demand for new technology. The most noticeable area of demand for business innovations is the mobile application industry. Recently, companies have recognized the growing need to integrate proprietary mobile applications into their suite of services; Companies have realized that developing mobile apps gives them a competitive edge. As a result, many have begun to rapidly develop mobile apps to stay ahead of the competition. Mobile application development helps companies meet the needs of their customers. Mobile apps also help businesses to take advantage of every potential opportunity to generate leads that convert into sales. Mobile app download growth statistics with the recent rise in demand for business-related mobile apps, there has been a similar rise in the range of mobile app solutions being offered. Today, companies can use the traditional route of the software development team to build their own mobile applications. However, there are also many platform-ready "low-code and no-code" mobile apps available to choose from. These mobile app development options have more streamlined business processes. This helps them be more responsive to their customers without having to be coding experts. Companies must have a basic understanding of mobile app architecture to attract and maintain the interest of mobile app users. Mobile application architecture refers to the buildings or structural systems and design elements that make up a mobile application. It also includes the technologies, processes, and components used during application development. The underlying foundation of all applications consists of all elements of the mobile application architecture; developing a good mobile app architecture requires proper planning and strategic design. The technology framework or platform on the back end and user-facing side of a mobile application is part of the mobile architecture of the application. In-application development Software programmers loosely refer to this set of mobile architecture systems and processes as the "technology stack."

Keywords: mobile applications, development, architecture, technology

Procedia PDF Downloads 90
1548 Comparative Evaluation of Pharmacologically Guided Approaches (PGA) to Determine Maximum Recommended Starting Dose (MRSD) of Monoclonal Antibodies for First Clinical Trial

Authors: Ibraheem Husain, Abul Kalam Najmi, Karishma Chester

Abstract:

First-in-human (FIH) studies are a critical step in clinical development of any molecule that has shown therapeutic promise in preclinical evaluations, since preclinical research and safety studies into clinical development is a crucial step for successful development of monoclonal antibodies for guidance in pharmaceutical industry for the treatment of human diseases. Therefore, comparison between USFDA and nine pharmacologically guided approaches (PGA) (simple allometry, maximum life span potential, brain weight, rule of exponent (ROE), two species methods and one species methods) were made to determine maximum recommended starting dose (MRSD) for first in human clinical trials using four drugs namely Denosumab, Bevacizumab, Anakinra and Omalizumab. In our study, the predicted pharmacokinetic (pk) parameters and the estimated first-in-human dose of antibodies were compared with the observed human values. The study indicated that the clearance and volume of distribution of antibodies can be predicted with reasonable accuracy in human and a good estimate of first human dose can be obtained from the predicted human clearance and volume of distribution. A pictorial method evaluation chart was also developed based on fold errors for simultaneous evaluation of various methods.

Keywords: clinical pharmacology (CPH), clinical research (CRE), clinical trials (CTR), maximum recommended starting dose (MRSD), clearance and volume of distribution

Procedia PDF Downloads 360
1547 A Static Android Malware Detection Based on Actual Used Permissions Combination and API Calls

Authors: Xiaoqing Wang, Junfeng Wang, Xiaolan Zhu

Abstract:

Android operating system has been recognized by most application developers because of its good open-source and compatibility, which enriches the categories of applications greatly. However, it has become the target of malware attackers due to the lack of strict security supervision mechanisms, which leads to the rapid growth of malware, thus bringing serious safety hazards to users. Therefore, it is critical to detect Android malware effectively. Generally, the permissions declared in the AndroidManifest.xml can reflect the function and behavior of the application to a large extent. Since current Android system has not any restrictions to the number of permissions that an application can request, developers tend to apply more than actually needed permissions in order to ensure the successful running of the application, which results in the abuse of permissions. However, some traditional detection methods only consider the requested permissions and ignore whether it is actually used, which leads to incorrect identification of some malwares. Therefore, a machine learning detection method based on the actually used permissions combination and API calls was put forward in this paper. Meanwhile, several experiments are conducted to evaluate our methodology. The result shows that it can detect unknown malware effectively with higher true positive rate and accuracy while maintaining a low false positive rate. Consequently, the AdaboostM1 (J48) classification algorithm based on information gain feature selection algorithm has the best detection result, which can achieve an accuracy of 99.8%, a true positive rate of 99.6% and a lowest false positive rate of 0.

Keywords: android, API Calls, machine learning, permissions combination

Procedia PDF Downloads 315
1546 Sphingosomes: Potential Anti-Cancer Vectors for the Delivery of Doxorubicin

Authors: Brajesh Tiwari, Yuvraj Dangi, Abhishek Jain, Ashok Jain

Abstract:

The purpose of the investigation was to evaluate the potential of sphingosomes as nanoscale drug delivery units for site-specific delivery of anti-cancer agents. Doxorubicin Hydrochloride (DOX) was selected as a model anti-cancer agent. Sphingosomes were prepared and loaded with DOX and optimized for size and drug loading. The formulations were characterized by Malvern zeta-seizer and Transmission Electron Microscopy (TEM) studies. Sphingosomal formulations were further evaluated for in-vitro drug release study under various pH profiles. The in-vitro drug release study showed an initial rapid release of the drug followed by a slow controlled release. In vivo studies of optimized formulations and free drug were performed on albino rats for comparison of drug plasma concentration. The in- vivo study revealed that the prepared system enabled DOX to have had enhanced circulation time, longer half-life and lower elimination rate kinetics as compared to free drug. Further, it can be interpreted that the formulation would selectively enter highly porous mass of tumor cells and at the same time spare normal tissues. To summarize, the use of sphingosomes as carriers of anti-cancer drugs may prove to be a fascinating approach that would selectively localize in the tumor mass, increasing the therapeutic margin of safety while reducing the side effects associated with anti-cancer agents.

Keywords: sphingosomes, anti-cancer, doxorubicin, formulation

Procedia PDF Downloads 285
1545 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 77
1544 Improvement of the Quality Services of Social Robots by Understanding Requirements of People with Dementia

Authors: Konrad Rejdak, Agnieszka Korchut, Sebastian Szklener, Urszula Skrobas, Justyna Gerlowska, Katarzyna Grabowska-Aleksandrowicz, Dorota Szczesniak-Stanczyk

Abstract:

Introduction: Neurodegenerative diseases are frequently accompanied by loss and unwanted change in functional independence, social relationships, and economic circumstances. Currently, the achievements of social robots to date is being projected to improve multidimensional quality of life among people with cognitive impairment and others. Objectives: Identification of particular human needs in context of the changes occurring in course of neurodegenerative diseases. Methods: Based on the 110 surveys performed in Medical University of Lublin from medical staff, patients, and caregivers we made prioritization of the users' needs as: high, medium, and low. The issues included in the surveys concerned four aspects: user acceptance, functional requirements, design of the robotic assistant and preferred types of human-robot interaction. Results: We received completed questionnaires: 50 from medical staff, 30 from caregivers and 30 from potential users. Above 90% of the respondents from each of the three groups, accepted robotic assistant as a potential caregiver. High priority functional capability of assistive technology was to handle emergencies in a private home like recognizing life-threatening situations and reminding about medication intake. With reference to design of the robotic assistant, the majority of the respondent would like to have an anthropomorphic appearance with positive emotionally expressive face. The most important type of human-robot interaction was voice-operated system and by touchscreen. Conclusion: The results from our study might contribute to a better understanding of the system and users’ requirements for the development of a service robot intended to support patients with dementia.

Keywords: social robot, dementia, requirements, patients needs

Procedia PDF Downloads 251
1543 The Cell Viability Study of Extracts of Bark, Flowers, Leaves and Seeds of Indian Dhak Tree, Flame of Forest

Authors: Madhavi S. Apte, Milind Bhitre

Abstract:

In pharmaceutical research and new drug development, medicinal plants have important roles. Similarly, Indian dhak tree belonging to family Fabaceae has been widely used in the traditional Indian medical system of ‘Ayurveda’ for the treatment of a variety of ailments. Hence the cell viability study was undertaken to evaluate and compare the activity of extracts of various parts like flower, bark, leaf, seed by conducting MTT assay method along with other pharmacognostical studies. The methanolic extracts of bark, flowers, leaves, and seeds were used for the study. The cell viability MTT assay was performed using the standard operating procedures. The extracts were dissolved in DMSO and serially diluted with complete medium to get the concentrations range of test concentration. DMSO concentration was kept < 0.1% in all the samples. HUVEC cells maintained in appropriate conditions were seeded in 96 well plates and treated with different concentrations of the test samples and incubated at 37°C, 5% CO₂ for 96 hours. MTT reagent was added to the wells and incubated for 4 hours; the dark blue formazan product formed by the cells was dissolved in DMSO under a safety cabinet and read at 550nm. Percentage inhibitions were calculated and plotted with the concentrations used to calculate the IC50 values. The bark, flower, leaves and seed extracts have shown the cytotoxicity activity and can be further studied for antiangiogenesis activity.

Keywords: pharmacognosy, Cell viability, MTT assay, anti-angiogenesis

Procedia PDF Downloads 275
1542 Women Students’ Management of Alcohol- Related Sexual Risk at a South African University

Authors: Shakila Singh

Abstract:

This research was conducted at a selected South African university campus with women students who drink alcohol. The purpose of the study was to examine their perspectives on the role of alcohol in their lives, their understandings about women’s vulnerability to alcohol-related sexual risk and their strategies against these. The study draws on feminist principles and practices to challenge gendered inequalities that legitimate and facilitate violence against women. Recognising the danger of focusing on risk management in ways that place the burden of responsibility entirely on young women to prevent their violation, this article focuses on women students’ agency in managing risk while taking up opportunities for self-discovery. Participation was voluntary, and a student-researcher administered an open-ended questionnaire to 55 participants. The findings suggest that young women position alcohol- use as a common activity at university, and that it gives them much pleasure. They recognise that it is riskier for women and articulate valuable strategies to manage the risk to their sexual safety when drinking. These include drinking within supportive networks, avoiding financial dependence, and managing their alcohol intake. This article argues that alcohol at university is an integral part of expressions of gender and sexuality and that risk-taking is a normal part of university students’ lives. Consequently, arguments about equality need to consider risk-taking as part of young people’s lives and promote ways of managing alcohol-related risks, rather than imagining that alcohol can be avoided entirely.

Keywords: alcohol-related sexual risk, drinking at university, managing risk, women students

Procedia PDF Downloads 76