Search results for: fitness center users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4790

Search results for: fitness center users

1010 Digital Media Use and Access among Rural Youth in South Africa: The Prospects for Female Empowerment

Authors: Fulufhelo Oscar Makananise

Abstract:

Digital technologies have played a significant role in bridging the information gap between the haves and the have nots in society. In developing countries such as South Africa, historically marginalised groups such as women in rural communities have an opportunity to use digital technologies to network among themselves as well as interact with their government, thereby enhancing prospects for poverty eradication, political participation, community development and democracy. However, the extent to which these goals can be achieved in a developing context through harnessing digital technologies is not quite clear, particularly given the fact that access to these technologies is not evenly distributed and the fact that women’s access to digital technologies is hampered by factors that go beyond the question of infrastructure. Informed by the technological dependency theory, this paper is about how female youth in rural South Africa are deploying digital media tools for socio-economic empowerment. In particular, the study investigated the extent to which female youth in Limpopo province, South Africa access and use digital media platforms and gadgets and the extent to which those technologies are breaking down barriers that stand in the way of female youth empowerment. Data were gathered using a self-administered questionnaire disseminated to selected 100 female youth in Limpopo Province, South Africa. The data were analysed using SPSS version 9, and the results were analysed using descriptive statistics. The paper argues that wider and constant access to digital media by female youth in rural areas is indicative of the great potential for empowering female youth in rural areas through harnessing digital media. The study established that the majority of female youth had access to digital media technologies and used them to share valuable information among themselves. The study further established that female youth are active users of digital media in South Africa, which is the significant driver for socio-economic empowerment.

Keywords: digital technologies, empowerment, female youth, South Africa, survey, technological dependency

Procedia PDF Downloads 129
1009 Big Data Analysis on the Development of Jinan’s Consumption Centers under the Influence of E-Commerce

Authors: Hang Wang, Xiaoming Gao

Abstract:

The rapid development of e-commerce has significantly transformed consumer behavior and urban consumption patterns worldwide. This study explores the impact of e-commerce on the development and spatial distribution of consumption centers, with a particular focus on Jinan City, China. Traditionally, urban consumption centers are defined by physical commercial spaces, such as shopping malls and markets. However, the rise of e-commerce has introduced a shift towards virtual consumption hubs, with a corresponding impact on physical retail locations. Utilizing Gaode POI (Point of Interest) data, this research aims to provide a comprehensive analysis of the spatial distribution of consumption centers in Jinan, comparing e-commerce-driven virtual consumption hubs with traditional physical consumption centers. The study methodology involves gathering and analyzing POI data, focusing on logistics distribution for e-commerce activities and mobile charging point locations to represent offline consumption behavior. A spatial clustering technique is applied to examine the concentration of commercial activities and to identify emerging trends in consumption patterns. The findings reveal a clear differentiation between e-commerce and physical consumption centers in Jinan. E-commerce activities are dispersed across a wider geographic area, correlating closely with residential zones and logistics centers, while traditional consumption hubs remain concentrated around historical and commercial areas such as Honglou and the old city center. Additionally, the research identifies an ongoing transition within Jinan’s consumption landscape, with online and offline retail coexisting, though at different spatial and functional levels. This study contributes to urban planning by providing insights into how e-commerce is reshaping consumption behaviors and spatial structures in cities like Jinan. By leveraging big data analytics, the research offers a valuable tool for urban designers and planners to adapt to the evolving demands of digital commerce and to optimize the spatial layout of city infrastructure to better serve the needs of modern consumers.

Keywords: big data, consumption centers, e-commerce, urban planning, jinan

Procedia PDF Downloads 10
1008 Bulk Modification of Poly(Dimethylsiloxane) for Biomedical Applications

Authors: A. Aslihan Gokaltun, Martin L. Yarmush, Ayse Asatekin, O. Berk Usta

Abstract:

In the last decade microfabrication processes including rapid prototyping techniques have advanced rapidly and achieved a fairly matured stage. These advances encouraged and enabled the use of microfluidic devices by a wider range of users with applications in biological separations, and cell and organoid cultures. Accordingly, a significant current challenge in the field is controlling biomolecular interactions at interfaces and the development of novel biomaterials to satisfy the unique needs of the biomedical applications. Poly(dimethylsiloxane) (PDMS) is by far the most preferred material in the fabrication of microfluidic devices. This can be attributed its favorable properties, including: (1) simple fabrication by replica molding, (2) good mechanical properties, (3) excellent optical transparency from 240 to 1100 nm, (4) biocompatibility and non-toxicity, and (5) high gas permeability. However, high hydrophobicity (water contact angle ~108°±7°) of PDMS often limits its applications where solutions containing biological samples are concerned. In our study, we created a simple, easy method for modifying the surface chemistry of PDMS microfluidic devices through the addition of surface-segregating additives during manufacture. In this method, a surface segregating copolymer is added to precursors for silicone and the desired device is manufactured following the usual methods. When the device surface is in contact with an aqueous solution, the copolymer self-organizes to expose its hydrophilic segments to the surface, making the surface of the silicone device more hydrophilic. This can lead to several improved performance criteria including lower fouling, lower non-specific adsorption, and better wettability. Specifically, this approach is expected to be useful for the manufacture of microfluidic devices. It is also likely to be useful for manufacturing silicone tubing and other materials, biomaterial applications, and surface coatings.

Keywords: microfluidics, non-specific protein adsorption, PDMS, PEG, copolymer

Procedia PDF Downloads 262
1007 Higher Education Leadership and Creating Sites of Institutional Belonging: A Global Case Study

Authors: Lisa M. Coleman

Abstract:

The focus on disability, LGBTQ+, and internationalization has certainly been the subject of much research and programmatic across higher education. Many universities have entered into global partnerships with varying success and challenges across the various areas, including laws and policies. Attentiveness to the specific nuances of global inclusion, diversity, equity, belonging, and access (GIDBEA) and the leadership to support these efforts is crucial to the development of longstanding success across the programs. There have been a number of shifts related to diversification across student and alumni bodies. These shifts include but are not limited to how people identify gender, race, and sexuality (and the intersections across such identities), as well as trends across emerging and diverse disability communities. NYU is the most international campus in the United States, with the most campuses and sites outside of its county of origin and the most international students and exchange programs than any other university. As a result, the ongoing work related to GIDEBA is at the center of much of the leadership, administrative, and research efforts. Climate assessment work across NYU’s diverse global campus landscape will serve as the foundation to exemplify best practices related to data collection and dissemination, community and stakeholder engagement, and effective implementation of innovative strategies to close gap areas as identified. The data (quantitative and qualitative) and related research findings represent data collected from close to 22,000 stakeholders across the NYU campuses. The case study centers on specific methodological considerations, data integrity, stakeholder engagement from across student-faculty, staff, and alumni constituencies, and tactics to advance specific GIDBEA initiatives related to navigating shifting landscapes. Design thinking, incubation, and co-creation strategies have been employed to expand, leverage, actualize, and implement GIDBEA strategies that are – concrete, measurable, differentiated, and specific to global sites and regions and emerging trends.

Keywords: disability, LGBTQ+, DEI, research, case studies

Procedia PDF Downloads 102
1006 Kidney Stones in Individuals Living with Diabetes Mellitus at King Abdul-Aziz Medical City - Tertiary Care Center, Jeddah, Saudi Arabia: A Retrospective Cohort Study

Authors: Suhaib Radi, Ibrahim Basem Nafadi, Abdullah Ahmed Alsulami, Nawaf Faisal Halabi, Abdulrhman Abdullah Alsubhi, Sami Wesam Maghrabi, Waleed Saad Alshehri

Abstract:

Background: Kidney stones greatly affect individuals. The range of these effects regarding multiple kidney stone factors (size, presence of obstruction, and modality of treatment) in stone formers with and without diabetes has not been well explored in the literature to the best of the author's knowledge. Our goal is to investigate this unexplored correlation between diabetes and kidney stones by conducting a Cohort retrospective study to precisely evaluate the effects of this condition and the existence of complications in adult individuals with diabetes in Saudi Arabia in comparison to a non-diabetic control group. Methodology: This is a retrospective cohort study aiming to evaluate the range of effects of kidney stones in stone formers in a group of adults diagnosed with type 2 diabetes mellitus and adults without diabetes between 2017 and 2019 in Jeddah, Saudi Arabia. An IRB approval has been granted for this study. The data was analyzed using SPSS. The data was collected from the 1st of December 2022 until the 1st of March 2023. Results: A total of 254 individuals diagnosed with kidney stones were included, 127 of whom were adult individuals with type 2 diabetes, and 127 were non-diabetics. Our study shows that the individuals affected with diabetes were more likely to have larger kidney stones in comparison to individuals without diabetes (13.12 mm vs. 10.53 mm, p-value = 0.03). Moreover, individuals with hypertension and dyslipidemia also had significantly larger stones. On the other hand, no significant difference was found in the presence of obstruction and modality of treatment between the two groups. Conclusion: This study done in Saudi Arabia found that individuals with kidney stones who concurrently had diabetes formed larger kidney stones, and they were also found to have other comorbidities such as HTN, dyslipidemia, obesity, and renal disease. The significance of these findings could assist in the future of primary and secondary prevention of renal stones.

Keywords: kidney stone, type 2 DM, metabolic syndrome, lithotripsy

Procedia PDF Downloads 106
1005 The Difference of Menstrual Cycle Profile and Urinary Luteinizing Hormone Changes In Polycystic Ovary Syndrome And Healthy Women

Authors: Ning Li, Jiacheng Zhang, Zheng Yang, Sylvia Kang

Abstract:

Introduction: Polycystic ovary syndrome (PCOS) is a common physiological symptom in women of reproductive age. Women with PCOS may have infrequent or prolonged menstrual periods and excess male hormone (androgen) levels. Mira analyzes the cycle profiles and the luteinizing hormone (LH) changes in urine, closely related to the fertility level of healthy women and PCOS women. From the difference between the two groups, Mira helps to understand the physiological state of PCOS women and their hormonal changes in the menstrual cycle. Methods: In this study, data from 1496 cycles and information from 342 women belonging to two groups (181 PCOS and 161 Healthy) were collected and analyzed. Women test their luteinizing hormone (LH) in urine daily with Mira fertility test wand and Mira analyzer, from the day after the menstruation to the starting day of the next menstruation. All the collected data meets Mira’s user agreement and users’ identification was removed. The cycle length, LH peak, and other cycle information of the PCOS group were compared with the Healthy group. Results: The average cycle length of PCOS women is 41 days and of the Healthy women is 33 days. 91.4% of cycle length is within 40 days for the Healthy group, while it decreases to 71.9% for the PCOS group. This means PCOS women have a longer menstrual cycle and more variation during the cycle. With more variation, the ovulation prediction becomes more difficult for the PCOS group. The deviation between the LH surge day and the predicted ovulation day, calculated by the starting day of the next menstruation minus 14 days, is greater in the PCOS group compared with the Healthy group. Also, 46.96% of PCOS women have an irregular cycle, and only 19.25% of healthy women show an irregular cycle. Conclusion: PCOS women have longer menstrual cycles and more variation during the menstrual cycles. The traditional ovulation prediction is not suitable for PCOS women.

Keywords: menstrual cycle, PCOS, urinary luteinizing hormone, Mira

Procedia PDF Downloads 175
1004 Identifying the Factors that Influence Water-Use Efficiency in Agriculture: Case Study in a Spanish Semi-Arid Region

Authors: Laura Piedra-Muñoz, Ángeles Godoy-Durán, Emilio Galdeano-Gómez, Juan C. Pérez-Mesa

Abstract:

The current agricultural system in some arid and semi-arid areas is not sustainable in the long term. In southeast Spain, groundwater is the main water source and is overexploited, while alternatives like desalination are still limited. The Water Plan for the Mediterranean Basins 2015-2020 indicates a global deficit of 73.42 hm3 and an overexploitation of the aquifers of 205.58hm3. In order to solve this serious problem, two major actions can be taken: increasing available water, and/or improving the efficiency of its use. This study focuses on the latter. The main aim of this study is to present the major factors related to water usage efficiency in farming. It focuses on Almería province, southeast Spain, one of the most arid areas of the country, and in particular on family farms as the main direct managers of water use in this zone. Many of these farms are among the most water efficient in Spanish agriculture, but this efficiency is not generalized throughout the sector. This work conducts a comprehensive assessment of water performance in this area, using on-farm water-use, structural, socio-economic and environmental information. Two statistical techniques are used: descriptive analysis and cluster analysis. Thus, two groups are identified: the least and the most efficient farms regarding water usage. By analyzing both the common characteristics within each group and the differences between the groups with a one-way ANOVA analysis, several conclusions can be reached. The main differences between the two clusters center on the extent to which innovation and new technologies are used in irrigation. The most water efficient farms are characterized by more educated farmers, a greater degree of innovation, new irrigation technology, specialized production and awareness of water issues and environmental sustainability. The research shows that better practices and policies can have a substantial impact on achieving a more sustainable and efficient use of water. The findings of this study can be extended to farms in similar arid and semi-arid areas and contribute to foster appropriate policies to improve the efficiency of water usage in the agricultural sector.

Keywords: cluster analysis, family farms, Spain, water-use efficiency

Procedia PDF Downloads 284
1003 Safety Profile of Anti-Retroviral Medicine in South Africa Based on Reported Adverse Drug Reactions

Authors: Sarah Gounden, Mukesh Dheda, Boikhutso Tlou, Elizabeth Ojewole, Frasia Oosthuizen

Abstract:

Background: Antiretroviral therapy (ART) has been effective in the reduction of mortality and resulted in an improvement in the prognosis of HIV-infected patients. However, treatment with antiretrovirals (ARVs) has led to the development of many adverse drug reactions (ADRs). It is, therefore, necessary to determine the safety profile of these medicines in a South African population in order to ensure safe and optimal medicine use. Objectives: The aim of this study was to quantify ADRs experienced with the different ARVs currently used in South Africa, to determine the safety profile of ARV medicine in South Africa based on reported ADRs, and to determine the ARVs with the lowest risk profile based on specific patient populations. Methodology: This was a quantitative study. Individual case safety reports for the period January 2010 – December 2013 were obtained from the National Pharmacovigilance Center; these reports contained information on ADRs, ARV medicine, and patient demographics. Data was analysed to find associations that may exist between ADRs experienced, ARV medicines used and patient demographics. Results: A total of 1916 patient reports were received of which 1534 met the inclusion criteria for the study. The ARV with the lowest risk of ADRs were found to be lamivudine (0.51%, n=12), followed by lopinavir/ritonavir combination (0.8%, n=19) and abacavir (0.64%, n=15). A higher incidence of ADRs was observed in females compared to males. The age group 31–50 years and the weight group 61–80 kg had the highest incidence of ADRs reported. Conclusion: This study found that the safest ARVs to be used in a South African population are lamivudine, abacavir, and the lopinavir/ritonavir combination. Gender differences play a significant role in the occurrence of ADRs and both anatomical and physiological differences account for this. An increased BMI (body mass index) in both men and women showed an increase in the incidence of ADRs associated with ARV therapy.

Keywords: adverse drug reaction, antiretrovirals, HIV/AIDS, pharmacovigilance, South Africa

Procedia PDF Downloads 347
1002 Development of Personal Protection Equipment for Dental Surgeon

Authors: Thi. A. D. Tran, Matthieu Arnold, Dominique Adolphe, Laurence Schcher, Guillaume Reys

Abstract:

During daily oral health cares, dental surgeons are in contact with numerous potentially infectious germs from patients' saliva and blood. In order to take into account these risks, a product development process has been unrolled to propose to the dental surgeon a personal protection equipment that is suitable with their expectations in terms of images, protection and comfort. After a consumer study, to evaluate how the users wear the garment and their expectations, specifications have been carried out and technical solutions have been developed in order to answer to the maximum of the desiderata. Thermal studies and comfort studies have been performed. The obtained results lead to define the technical solutions concerning the design of the new scrub. Three main functions have been investigated, the ergonomic aspect, the protection and the thermal comfort. In terms of ergonomic aspect, instrumented garments have been worn and pressure measurements have been done. The results highlight that a raglan shape for the sleeves has to be selected for a better dynamic comfort. Moreover, spray tests helped us to localize the potential contamination area and therefore protection devices have been placed on the garment. Concerning the thermal comfort, an I-R study was conducted in consulting room under the real working conditions; the heating zones have been detected. Based on these results, solutions have been proposed and implemented in a new gown. This new gown is currently composed of three different parts; a protective layer placed in the chest area to avoid contamination; a breathable layer placed in the back and in the armpits and a normal PET/Cotton fabric for the rest of the gown. Through the fitting tests conducted in hospital, it was obtained that the new design was highly appreciated. Some points can nevertheless be further improved. A final product will be produced based on necessary improvements.

Keywords: comfort, dentists, garment, thermal

Procedia PDF Downloads 307
1001 Static Application Security Testing Approach for Non-Standard Smart Contracts

Authors: Antonio Horta, Renato Marinho, Raimir Holanda

Abstract:

Considered as an evolution of the Blockchain, the Ethereum platform, besides allowing transactions of its cryptocurrency named Ether, it allows the programming of decentralised applications (DApps) and smart contracts. However, this functionality into blockchains has raised other types of threats, and the exploitation of smart contracts vulnerabilities has taken companies to experience big losses. This research intends to figure out the number of contracts that are under risk of being drained. Through a deep investigation, more than two hundred thousand smart contracts currently available in the Ethereum platform were scanned and estimated how much money is at risk. The experiment was based in a query run on Google Big Query in July 2022 and returned 50,707,133 contracts published on the Ethereum platform. After applying the filtering criteria, the experimentgot 430,584 smart contracts to download and analyse. The filtering criteria consisted of filtering out: ERC20 and ERC721 contracts, contracts without transactions, and contracts without balance. From this amount of 430,584 smart contracts selected, only 268,103 had source codes published on Etherscan, however, we discovered, using a hashing process, that there were contracts duplication. Removing the duplicated contracts, the process ended up with 20,417 source codes, which were analysed using the open source SAST tool smartbugswith oyente and securify algorithms. In the end, there was nearly $100,000 at risk of being drained from the potentially vulnerable smart contracts. It is important to note that the tools used in this study may generate false positives, which may interfere with the number of vulnerable contracts. To address this point, our next step in this research is to develop an application to test the contract in a parallel environment to verify the vulnerability. Finally, this study aims to alert users and companies about the risk on not properly creating and analysing their smart contracts before publishing them into the platform. As any other application, smart contracts are at risk of having vulnerabilities which, in this case, may result in direct financial losses.

Keywords: blockchain, reentrancy, static application security testing, smart contracts

Procedia PDF Downloads 86
1000 Mobile App Architecture in 2023: Build Your Own Mobile App

Authors: Mounir Filali

Abstract:

Companies use many innovative ways to reach their customers to stay ahead of the competition. Along with the growing demand for innovative business solutions is the demand for new technology. The most noticeable area of demand for business innovations is the mobile application industry. Recently, companies have recognized the growing need to integrate proprietary mobile applications into their suite of services; Companies have realized that developing mobile apps gives them a competitive edge. As a result, many have begun to rapidly develop mobile apps to stay ahead of the competition. Mobile application development helps companies meet the needs of their customers. Mobile apps also help businesses to take advantage of every potential opportunity to generate leads that convert into sales. Mobile app download growth statistics with the recent rise in demand for business-related mobile apps, there has been a similar rise in the range of mobile app solutions being offered. Today, companies can use the traditional route of the software development team to build their own mobile applications. However, there are also many platform-ready "low-code and no-code" mobile apps available to choose from. These mobile app development options have more streamlined business processes. This helps them be more responsive to their customers without having to be coding experts. Companies must have a basic understanding of mobile app architecture to attract and maintain the interest of mobile app users. Mobile application architecture refers to the buildings or structural systems and design elements that make up a mobile application. It also includes the technologies, processes, and components used during application development. The underlying foundation of all applications consists of all elements of the mobile application architecture, developing a good mobile app architecture requires proper planning and strategic design. The technology framework or platform on the back end and user-facing side of a mobile application is part of the mobile architecture of the application. In-application development Software programmers loosely refer to this set of mobile architecture systems and processes as the "technology stack".

Keywords: mobile applications, development, architecture, technology

Procedia PDF Downloads 92
999 The Effect of Artificial Intelligence on Petroleum Industry and Production

Authors: Mina Shokry Hanna Saleh Tadros

Abstract:

The centrality of the Petroleum Industry in the world energy is undoubted. The world economy almost runs and depends on petroleum. Petroleum industry is a multi-trillion industry; it turns otherwise poor and underdeveloped countries into wealthy nations and thrusts them at the center of international diplomacy. Although these developing nations lack the necessary technology to explore and exploit petroleum resources they are not without help as developed nations, represented by their multinational corporations are ready and willing to provide both the technical and managerial expertise necessary for the development of this natural resource. However, the exploration of these petroleum resources comes with, sometimes, grave, concomitant consequences. These consequences are especially pronounced with respect to the environment. From the British Petroleum Oil rig explosion and the resultant oil spillage and pollution in New Mexico, United States to the Mobil Oil spillage along Egyptian coast, the story and consequence is virtually the same. Egypt’s delta Region produces Nigeria’s petroleum which accounts for more than ninety-five percent of Nigeria’s foreign exchange earnings. Between 1999 and 2007, Egypt earned more than $400 billion from petroleum exports. Nevertheless, petroleum exploration and exploitation has devastated the Delta environment. From oil spillage which pollutes the rivers, farms and wetlands to gas flaring by the multi-national corporations; the consequences is similar-a region that has been devastated by petroleum exploitation. This paper thus seeks to examine the consequences and impact of petroleum pollution in the Egypt Delta with particular reference on the right of the people of Niger Delta to a healthy environment. The paper further seeks to examine the relevant international, regional instrument and Nigeria’s municipal laws that are meant to protect the result of the people of the Egypt Delta and their enforcement by the Nigerian State. It is quite worrisome that the Egypt Delta Region and its people have suffered and are still suffering grave violations of their right to a healthy environment as a result of petroleum exploitation in their region. The Egypt effort at best is half-hearted in its protection of the people’s right.

Keywords: crude oil, fire, floating roof tank, lightning protection systemenvironment, exploration, petroleum, pollutionDuvernay petroleum system, oil generation, oil-source correlation, Re-Os

Procedia PDF Downloads 72
998 Privacy Preservation Concerns and Information Disclosure on Social Networks: An Ongoing Research

Authors: Aria Teimourzadeh, Marc Favier, Samaneh Kakavand

Abstract:

The emergence of social networks has revolutionized the exchange of information. Every behavior on these platforms contributes to the generation of data known as social network data that are processed, stored and published by the social network service providers. Hence, it is vital to investigate the role of these platforms in user data by considering the privacy measures, especially when we observe the increased number of individuals and organizations engaging with the current virtual platforms without being aware that the data related to their positioning, connections and behavior is uncovered and used by third parties. Performing analytics on social network datasets may result in the disclosure of confidential information about the individuals or organizations which are the members of these virtual environments. Analyzing separate datasets can reveal private information about relationships, interests and more, especially when the datasets are analyzed jointly. Intentional breaches of privacy is the result of such analysis. Addressing these privacy concerns requires an understanding of the nature of data being accumulated and relevant data privacy regulations, as well as motivations for disclosure of personal information on social network platforms. Some significant points about how user's online information is controlled by the influence of social factors and to what extent the users are concerned about future use of their personal information by the organizations, are highlighted in this paper. Firstly, this research presents a short literature review about the structure of a network and concept of privacy in Online Social Networks. Secondly, the factors of user behavior related to privacy protection and self-disclosure on these virtual communities are presented. In other words, we seek to demonstrates the impact of identified variables on user information disclosure that could be taken into account to explain the privacy preservation of individuals on social networking platforms. Thirdly, a few research directions are discussed to address this topic for new researchers.

Keywords: information disclosure, privacy measures, privacy preservation, social network analysis, user experience

Procedia PDF Downloads 278
997 Use Cloud-Based Watson Deep Learning Platform to Train Models Faster and More Accurate

Authors: Susan Diamond

Abstract:

Machine Learning workloads have traditionally been run in high-performance computing (HPC) environments, where users log in to dedicated machines and utilize the attached GPUs to run training jobs on huge datasets. Training of large neural network models is very resource intensive, and even after exploiting parallelism and accelerators such as GPUs, a single training job can still take days. Consequently, the cost of hardware is a barrier to entry. Even when upfront cost is not a concern, the lead time to set up such an HPC environment takes months from acquiring hardware to set up the hardware with the right set of firmware, software installed and configured. Furthermore, scalability is hard to achieve in a rigid traditional lab environment. Therefore, it is slow to react to the dynamic change in the artificial intelligent industry. Watson Deep Learning as a service, a cloud-based deep learning platform that mitigates the long lead time and high upfront investment in hardware. It enables robust and scalable sharing of resources among the teams in an organization. It is designed for on-demand cloud environments. Providing a similar user experience in a multi-tenant cloud environment comes with its own unique challenges regarding fault tolerance, performance, and security. Watson Deep Learning as a service tackles these challenges and present a deep learning stack for the cloud environments in a secure, scalable and fault-tolerant manner. It supports a wide range of deep-learning frameworks such as Tensorflow, PyTorch, Caffe, Torch, Theano, and MXNet etc. These frameworks reduce the effort and skillset required to design, train, and use deep learning models. Deep Learning as a service is used at IBM by AI researchers in areas including machine translation, computer vision, and healthcare. 

Keywords: deep learning, machine learning, cognitive computing, model training

Procedia PDF Downloads 204
996 Using ePortfolios to Mapping Social Work Graduate Competencies

Authors: Cindy Davis

Abstract:

Higher education is changing globally and there is increasing pressure from professional social work accreditation bodies for academic programs to demonstrate how students have successfully met mandatory graduate competencies. As professional accreditation organizations increase their demand for evidence of graduate competencies, strategies to document and recording learning outcomes becomes increasingly challenging for academics and students. Studies in higher education have found support for the pedagogical value of ePortfolios, a flexible personal learning space that is owned by the student and include opportunity for assessment, feedback and reflection as well as a virtual space to store evidence of demonstration of professional competencies and graduate attributes. Examples of institutional uses of ePortfolios include e-administration of a diverse student population, assessment of student learning, and the demonstration of graduate attributes attained and future student career preparation. The current paper presents a case study on the introduction of ePortfolios for social work graduates in Australia as part of an institutional approach to technology-enhanced learning and e-learning. Social work graduates were required to submit an ePortfolio hosted on PebblePad. The PebblePad platform was selected because it places the student at the center of their learning whilst providing powerful tools for staff to structure, guide and assess that learning. The ePortofolio included documentation and evidence of how the student met each graduate competency as set out by the social work accreditation body in Australia (AASW). This digital resource played a key role in the process of external professional accreditation by clearly documenting and evidencing how students met required graduate competencies. In addition, student feedback revealed a positive outcome on how this resource provided them with a consolidation of their learning experiences and assisted them in obtaining employment post-graduation. There were also significant institutional factors that were key to successful implementation such as investment in the digital technology, capacity building amongst academics, and technical support for staff and students.

Keywords: accreditation, social work, teaching, technology

Procedia PDF Downloads 133
995 Context-Aware Recommender Systems Using User's Emotional State

Authors: Hoyeon Park, Kyoung-jae Kim

Abstract:

The product recommendation is a field of research that has received much attention in the recent information overload phenomenon. The proliferation of the mobile environment and social media cannot help but affect the results of the recommendation depending on how the factors of the user's situation are reflected in the recommendation process. Recently, research has been spreading attention to the context-aware recommender system which is to reflect user's contextual information in the recommendation process. However, until now, most of the context-aware recommender system researches have been limited in that they reflect the passive context of users. It is expected that the user will be able to express his/her contextual information through his/her active behavior and the importance of the context-aware recommender system reflecting this information can be increased. The purpose of this study is to propose a context-aware recommender system that can reflect the user's emotional state as an active context information to recommendation process. The context-aware recommender system is a recommender system that can make more sophisticated recommendations by utilizing the user's contextual information and has an advantage that the user's emotional factor can be considered as compared with the existing recommender systems. In this study, we propose a method to infer the user's emotional state, which is one of the user's context information, by using the user's facial expression data and to reflect it on the recommendation process. This study collects the facial expression data of a user who is looking at a specific product and the user's product preference score. Then, we classify the facial expression data into several categories according to the previous research and construct a model that can predict them. Next, the predicted results are applied to existing collaborative filtering with contextual information. As a result of the study, it was shown that the recommended results of the context-aware recommender system including facial expression information show improved results in terms of recommendation performance. Based on the results of this study, it is expected that future research will be conducted on recommender system reflecting various contextual information.

Keywords: context-aware, emotional state, recommender systems, business analytics

Procedia PDF Downloads 224
994 Analyzing the Politico-Religious Order of The 'Islamic State'

Authors: Galit Truman Zinman

Abstract:

The 'Islamic State' (IS) is one of the most successful jihadist groups in the modern history. The 'Islamic State' strives to realize the idea of erasing the borders between Muslim countries and establishing a wide Islamic caliphate. The 'Islamic State' is based on religious unity and opposition to existing political order. In this paper, the main argument is that the 'Islamic State' is characterized by two significant tendencies of state-building: preservation and change. The methodology of this study is based on the process tracing method and the analysis of primary sources: decisions, announcements and speeches of religious leaders of the Islamic State, slogans, rituals and symbols, audio and video clips produced by the Al-Hayat Media Center, films distributed on YouTube, as well as the content analysis of Dabiq`s articles (IS official Journal) and nasheeds (jihadi songs). The major findings of this study indicate that in practice the 'Islamic State' uses the same socio-political functions typical to the modern state (preservation), but introduces a different religious-ideological content (change). On the one hand, there is a preservation of the principles of existing modern state. Even with the rejection of secularization, globalization, and nationalism, there is an establishment of typical modern nation-state patterns. It is still a state entity, which has an ideological infrastructure, territory, population, governance and a monopoly on the use of violence, security services, justice system, tax collection, etc. All these functions characterize the modern state, and despite the desire of the 'Islamic State' to create a new kind of state, it reminds patterns of the typical modern nation-state. As for the religious-ideological content of the new state, here we can see a tendency of great change. The 'Islamic State' aims to create an Islamic caliphate which would allow the establishment of religious law and order, under a big commitment to return civilization to a seventh-century environment. The 'Islamic State' favors the fight against Western culture and its liberal ideology. It supports the struggle for global jihad against the unbelievers. Today, despite the territorial 'contraction' and the undermining of the organization's governance in Iraq and Syria, the 'Islamic State' continues to maintain its brand among jihadist activists around the world.

Keywords: Islamic State, Islamic caliphate, modern nation-state, religious law and order

Procedia PDF Downloads 181
993 Plasma Pretreatment for Improving the Durability of Antibacterial Activity of Cotton Using ZnO Nanoparticles

Authors: Sheila Shahidi, Hootan Rezaee, Abosaeed Rashidi, Mahmood Ghoranneviss

Abstract:

Plasma treatment has an explosive increase in interest and use in industrial applications as for example in medical, biomedical, automobile, electronics, semiconductor and textile industry. A lot of intensive basic research has been performed in the last decade in the field of textiles along with technical textiles. Textile manufacturers and end-users alike have been searching for ways to improve the surface properties of natural and man-made fibers. Specifically, there is a need to improve adhesion and wettability. Functional groups may be introduced onto the fiber surface by using gas plasma treatments, improving fiber surface properties without affecting the fiber’s bulk properties. In this research work, ZnO nanoparticles (ZnO-NPs) were insitue synthesized by sonochemical method at room temperature on both untreated and plasma pretreated cotton woven fabric. Oxygen and nitrogen plasmas were used for pre-functionalization of cotton fabric. And the effect of oxygen and nitrogen pre-functionalization on adhesion properties between ZnO nanoparticles and cotton surface were studied. The results show that nanoparticles with average sizes of 20-100 nm with different morphologies have been created on the surface of samples. Synthesis of ZnO-NPs was varied in the morphological transformation by changes in zinc acetate dehydrate concentration. Characterizations were carried out using Scanning Electron Microscopy (SEM), X-ray Diffraction (XRD), Inductive coupled plasma (ICP) and Spectrophotometery. The antibacterial activities of the fabrics were assessed semi-quantitatively by the colonies count method. The results show that the finished fabric demonstrated significant antibacterial activity against S. aureus in antibacterial test. The wash fastness of both untreated and plasma pretreated samples after 30 times of washing was investigated. The results showed that the parameters of plasma reactor plays very important role for improving the antibacterial durability.

Keywords: antibacterial activity, cotton, fabric, nanoparticles, plasma

Procedia PDF Downloads 531
992 Morphometric and Radiographic Studies on the Tarsal Bones of Adult Chinkara (Gazella bennettii)

Authors: Salahud Din, Saima Masood, Hafsa Zaneb, Habib-Ur Rehman, Imad Khan, Muqader Shah

Abstract:

The present study was carried out on the gross anatomy, biometery and radiographic analysis of tarsal bones in twenty specimens of adult chinkara (Gazella bennettii). The desired bones were collected from the graveyards present in the locality of the different safari parks and zoos in Pakistan. To observe the edges and articulations between the bones, the radiographic images were acquired in craniocaudals and mediolateral views of the intact limbs. The gross and radiographic studies of the tarsus of adult Chinkara were carried out in University of Veterinary and Animal Sciences, Lahore, Pakistan. The tarsus of chinkara comprised of five bones both grossly and radiographically, settled in three transverse rows: tibial and fibular tarsal in the proximal, central and fourth fused tarsal in the middle row, the first, second and third fused tarsal in the distal row. The fibular tarsal was the largest and longest bone of the hock, situated on the lateral side and had a bulbous tuber calcis 'point of the hock' at the proximal extremity which projects upward and backward. The average maximum height and breadth for fibular tarsal was 5.61 ± 0.23 cm and 2.06 ± 0.13 cm, respectively. The tibial tarsal bones were the 2nd largest bone of the proximal row and lie on the medial side of the tarsus bears trochlea at either end. The average maximum height and breadth for tibial tarsal was 2.79 ± 0.05 cm and 1.74 ± 0.01 cm, respectively. The central and the fourth tarsals were fused to form a large bone which extends across the entire width of the tarsus and articulates with all bones of the tarsus. A nutrient foramen was present in the center of the non auricular area, more prominent on the ventral surface. The average maximum height and breadth for central and fourth fused tarsal was 1.51 ± 0.13 cm and 2.08 ± 0.07 cm, respectively. The first tarsal was a quadrilateral piece of bone placed on the poteriomedial surface of the hock. The greatest length and maximum breadth of the first tarsal was 0.94 ± 0.01 cm and 1.01 ± 0.01 cm, respectively. The second and third fused tarsal bone resembles the central but was smaller and triangular in outline. It was situated between the central above and the large metatarsal bone below. The greatest length and maximum breadth of second and third fused tarsal was 0.98 ± 0.01 cm and 1.49 ± 0.01 cm.

Keywords: chinkara, morphometry, radiography, tarsal bone

Procedia PDF Downloads 167
991 The Effect of Satisfaction with the Internet on Online Shopping Attitude With TAM Approach Controlled By Gender

Authors: Velly Anatasia

Abstract:

In the last few decades extensive research has been conducted into information technology (IT) adoption, testing a series of factors considered to be essential for improved diffusion. Some studies analyze IT characteristics such as usefulness, ease of use and/or security, others focus on the emotions and experiences of users and a third group attempts to determine the importance of socioeconomic user characteristics such as gender, educational level and income. The situation is similar regarding e-commerce, where the majority of studies have taken for granted the importance of including these variables when studying e-commerce adoption, as these were believed to explain or forecast who buys or who will buy on the internet. Nowadays, the internet has become a marketplace suitable for all ages and incomes and both genders and thus the prejudices linked to the advisability of selling certain products should be revised. The objective of this study is to test whether the socioeconomic characteristics of experienced e-shoppers such as gender rally moderate the effect of their perceptions of online shopping behavior. Current development of the online environment and the experience acquired by individuals from previous e-purchases can attenuate or even nullify the effect of these characteristics. The individuals analyzed are experienced e-shoppers i.e. individuals who often make purchases on the internet. The Technology Acceptance Model (TAM) was broadened to include previous use of the internet and perceived self-efficacy. The perceptions and behavior of e-shoppers are based on their own experiences. The information obtained will be tested using questionnaires which were distributed and self-administered to respondent accustomed using internet. The causal model is estimated using structural equation modeling techniques (SEM), followed by tests of the moderating effect of socioeconomic variables on perceptions and online shopping behavior. The expected findings of this study indicated that gender moderate neither the influence of previous use of the internet nor the perceptions of e-commerce. In short, they do not condition the behavior of the experienced e-shopper.

Keywords: Internet shopping, age groups, gender, income, electronic commerce

Procedia PDF Downloads 331
990 Asymmetric Price Transmission in Rice: A Regional Analysis in Peru

Authors: Renzo Munoz-Najar, Cristina Wong, Daniel De La Torre Ugarte

Abstract:

The literature on price transmission usually deals with asymmetries related to different commodities and/or the short and long term. The role of domestic regional differences and the relationship with asymmetries within a country are usually left out. This paper looks at the asymmetry in the transmission of rice prices from the international price to the farm gate prices in four northern regions of Peru for the last period 2001-2016. These regions are San Martín, Piura, Lambayeque and La Libertad. The relevance of the study lies in its ability to assess the need for policies aimed at improving the competitiveness of the market and ensuring the benefit of producers. There are differences in planting and harvesting dates, as well as in geographic location that justify the hypothesis of the existence of differences in the price transition asymmetries between these regions. Those differences are due to at least three factors geography, infrastructure development, and distribution systems. For this, the Threshold Vector Error Correction Model and the Autoregressive Vector Model with Threshold are used. Both models, collect asymmetric effects in the price adjustments. In this way, it is sought to verify that farm prices react more to falls than increases in international prices due to the high bargaining power of intermediaries. The results of the investigation suggest that the transmission of prices is significant only for Lambayeque and La Libertad. Likewise, the asymmetry in the transmission of prices for these regions is checked. However, these results are not met for San Martin and Piura, the main rice producers nationwide. A significant price transmission is verified only in the Lambayeque and La Libertad regions. San Martin and Piura, in spite of being the main rice producing regions of Peru, do not present a significant transmission of international prices; a high degree of self-sufficient supply might be at the center of the logic for this result. An additional finding is the short-term adjustment with respect to international prices, it is higher in La Libertad compared to Lambayeque, which could be explained by the greater bargaining power of intermediaries in the last-mentioned region due to the greater technological development in the mills.

Keywords: asymmetric price transmission, rice prices, price transmission, regional economics

Procedia PDF Downloads 216
989 Four-Electron Auger Process for Hollow Ions

Authors: Shahin A. Abdel-Naby, James P. Colgan, Michael S. Pindzola

Abstract:

A time-dependent close-coupling method is developed to calculate a total, double and triple autoionization rates for hollow atomic ions of four-electron systems. This work was motivated by recent observations of the four-electron Auger process in near K-edge photoionization of C+ ions. The time-dependent close-coupled equations are solved using lattice techniques to obtain a discrete representation of radial wave functions and all operators on a four-dimensional grid with uniform spacing. Initial excited states are obtained by relaxation of the Schrodinger equation in imaginary time using a Schmidt orthogonalization method involving interior subshells. The radial wave function grids are partitioned over the cores on a massively parallel computer, which is essential due to the large memory requirements needed to store the coupled-wave functions and the long run times needed to reach the convergence of the ionization process. Total, double, and triple autoionization rates are obtained by the propagation of the time-dependent close-coupled equations in real-time using integration over bound and continuum single-particle states. These states are generated by matrix diagonalization of one-electron Hamiltonians. The total autoionization rates for each L excited state is found to be slightly above the single autoionization rate for the excited configuration using configuration-average distorted-wave theory. As expected, we find the double and triple autoionization rates to be much smaller than the total autoionization rates. Future work can be extended to study electron-impact triple ionization of atoms or ions. The work was supported in part by grants from the American University of Sharjah and the US Department of Energy. Computational work was carried out at the National Energy Research Scientific Computing Center (NERSC) in Berkeley, California, USA.

Keywords: hollow atoms, autoionization, auger rates, time-dependent close-coupling method

Procedia PDF Downloads 150
988 Salon-Associated Infections: Customer’s Knowledge and Practice Measures

Authors: Esraa Elaraby, Dania Abu Zahra, Ghidaa Maswadah, Osama Amira, Mohamed Alshoura, Nihar Dash

Abstract:

Background: Human being uses salon for a variety of purposes, from trimming of hair and shaving to a range of beauty treatments such as manicure and pedicure. Salon activities involve use of several instruments including scissors, scalpels and razors, materials such as soaps, solutions, creams and gels on human skin and body. Besides, salon customers also use chair, bed and many other common shared utensils and appliances. These salons related activities create a suitable environment for the transmission of several diseases and pathogens including hepatitis B and C, scabies, tuberculosis, staphylococcus and MRSA etc. The transmission of these pathogens can be prevented by maintenance of adequate hygiene and standard preventive measures. Aim: To assess the customer’s level of knowledge about salon-acquired infections and practices taken to prevent their transmission. Methods: A cross-sectional study was conducted among 500 participants across the Emirates. Moreover, self-administered questionnaires (in English and Arabic) were distributed through convenience sampling methods between February and April 2017. Results: The study included 500 participants of which 250 were females. The mean age of the study population was 33 years (SD=4.77). The participants were from several nationalities including 325 Arabs (Non-GCC) (66.2%), 108 Non-Arabs (22%), and 59 Arabs (GCC) (11.8%). The majority of the participants 421 (84.4%) had required knowledge about salon-associated infections with a mean knowledge score of 6/10 (60%). However, when it comes down to preventive practices, only 73 of the 500 participants (14.6%) did carry their own equipment. Thus, there was insufficient correlation between the level of knowledge and preventive practices (p=0.139) of salon-associated infections. Conclusion: People’s knowledge about the salon-associated infections among UAE residents was good, but only a small number practically took the required preventative measures towards this issue. Therefore, a public awareness program is recommended to enhance the deficiencies in knowledge and practices to prevent salon-acquired infections among the users. Up to our knowledge, this is the first study of this kind in the UAE targeting the salon customers about this important issue.

Keywords: awareness, knowledge, practices, salon-associated infections

Procedia PDF Downloads 195
987 The Incidence of Cardiac Arrhythmias Using Trans-Telephonic, Portable Electrocardiography Recorder, in Out-Patients Faculty of Medicine Ramathibodi Hospital

Authors: Urasri Imsomboon, Sopita Areerob, Kanchaporn Kongchauy, Tuchapong Ngarmukos

Abstract:

Objective: The Trans-telephonic Electrocardiography (ECG) monitoring is used to diagnose of infrequent cardiac arrhythmias and improve outcome of early detection and treatment on suspected cardiac patients. The objectives of this study were to explore incidence of cardiac arrhythmia using Trans-Telephonic and to explore time to first symptomatic episode and documented cardiac arrhythmia in outpatients. Methods: Descriptive research study was conducted between February 1, 2016, and December 31, 2016. A total of 117 patients who visited outpatient clinic were purposively selected. Research instruments in this study were the personal data questionnaire and the record form of incidence of cardiac arrhythmias using Trans-Telephonic ECG recorder. Results: A total of 117 patients aged between 15-92 years old (mean age 52.7 ±17.1 years), majority of studied sample was women (64.1%). The results revealed that 387 ECGs (Average 2.88 ECGs/person, SD = 3.55, Range 0 – 21) were sent to Cardiac Monitoring Center at Coronary Care Unit. Of these, normal sinus rhythm was found mostly 46%. Top 5 of cardiac arrhythmias were documented at the time of symptoms: sinus tachycardia 43.5%, premature atrial contraction 17.7%, premature ventricular contraction 14.3%, sinus bradycardia 11.5% and atrial fibrillation 8.6%. Presenting symptom were tachycardia 94%, palpitation 83.8%, dyspnea 51.3%, chest pain 19.6%, and syncope 14.5%. Mostly activities during symptom were no activity 64.8%, sleep 55.6% and work 25.6%.The mean time until the first symptomatic episode occurred on average after 6.88 ± 7.72 days (median 3 days). The first documented cardiac arrhythmia occurred on average after 9 ± 7.92 days (median 7 day). The treatments after patients known actual cardiac arrhythmias were observe themselves 68%, continue same medications 15%, got further investigations (7 patients), and corrected causes of cardiac arrhythmias via invasive cardiac procedures (5 patients). Conclusion: Trans-telephonic: portable ECGs recorder is effective in the diagnosis of suspected symptomatic cardiac arrhythmias in outpatient clinic.

Keywords: cardiac arrhythmias, diagnosis, outpatient clinic, trans-telephonic: portable ECG recorder

Procedia PDF Downloads 189
986 Analysis of Road Network Vulnerability Due to Merapi Volcano Eruption

Authors: Imam Muthohar, Budi Hartono, Sigit Priyanto, Hardiansyah Hardiansyah

Abstract:

The eruption of Merapi Volcano in Yogyakarta, Indonesia in 2010 caused many casualties due to minimum preparedness in facing disaster. Increasing population capacity and evacuating to safe places become very important to minimize casualties. Regional government through the Regional Disaster Management Agency has divided disaster-prone areas into three parts, namely ring 1 at a distance of 10 km, ring 2 at a distance of 15 km and ring 3 at a distance of 20 km from the center of Mount Merapi. The success of the evacuation is fully supported by road network infrastructure as a way to rescue in an emergency. This research attempts to model evacuation process based on the rise of refugees in ring 1, expanded to ring 2 and finally expanded to ring 3. The model was developed using SATURN (Simulation and Assignment of Traffic to Urban Road Networks) program version 11.3. 12W, involving 140 centroid, 449 buffer nodes, and 851 links across Yogyakarta Special Region, which was aimed at making a preliminary identification of road networks considered vulnerable to disaster. An assumption made to identify vulnerability was the improvement of road network performance in the form of flow and travel times on the coverage of ring 1, ring 2, ring 3, Sleman outside the ring, Yogyakarta City, Bantul, Kulon Progo, and Gunung Kidul. The research results indicated that the performance increase in the road networks existing in the area of ring 2, ring 3, and Sleman outside the ring. The road network in ring 1 started to increase when the evacuation was expanded to ring 2 and ring 3. Meanwhile, the performance of road networks in Yogyakarta City, Bantul, Kulon Progo, and Gunung Kidul during the evacuation period simultaneously decreased in when the evacuation areas were expanded. The results of preliminary identification of the vulnerability have determined that the road networks existing in ring 1, ring 2, ring 3 and Sleman outside the ring were considered vulnerable to the evacuation of Mount Merapi eruption. Therefore, it is necessary to pay a great deal of attention in order to face the disasters that potentially occur at anytime.

Keywords: model, evacuation, SATURN, vulnerability

Procedia PDF Downloads 165
985 Improving Search Engine Performance by Removing Indexes to Malicious URLs

Authors: Durga Toshniwal, Lokesh Agrawal

Abstract:

As the web continues to play an increasing role in information exchange, and conducting daily activities, computer users have become the target of miscreants which infects hosts with malware or adware for financial gains. Unfortunately, even a single visit to compromised web site enables the attacker to detect vulnerabilities in the user’s applications and force the downloading of multitude of malware binaries. We provide an approach to effectively scan the so-called drive-by downloads on the Internet. Drive-by downloads are result of URLs that attempt to exploit their visitors and cause malware to be installed and run automatically. To scan the web for malicious pages, the first step is to use a crawler to collect URLs that live on the Internet, and then to apply fast prefiltering techniques to reduce the amount of pages that are needed to be examined by precise, but slower, analysis tools (such as honey clients or antivirus programs). Although the technique is effective, it requires a substantial amount of resources. A main reason is that the crawler encounters many pages on the web that are legitimate and needs to be filtered. In this paper, to characterize the nature of this rising threat, we present implementation of a web crawler on Python, an approach to search the web more efficiently for pages that are likely to be malicious, filtering benign pages and passing remaining pages to antivirus program for detection of malwares. Our approaches starts from an initial seed of known, malicious web pages. Using these seeds, our system generates search engines queries to identify other malicious pages that are similar to the ones in the initial seed. By doing so, it leverages the crawling infrastructure of search engines to retrieve URLs that are much more likely to be malicious than a random page on the web. The results shows that this guided approach is able to identify malicious web pages more efficiently when compared to random crawling-based approaches.

Keywords: web crawler, malwares, seeds, drive-by-downloads, security

Procedia PDF Downloads 225
984 Exploring Twitter Data on Human Rights Activism on Olympics Stage through Social Network Analysis and Mining

Authors: Teklu Urgessa, Joong Seek Lee

Abstract:

Social media is becoming the primary choice of activists to make their voices heard. This fact is coupled by two main reasons. The first reason is the emergence web 2.0, which gave the users opportunity to become content creators than passive recipients. Secondly the control of the mainstream mass media outlets by the governments and individuals with their political and economic interests. This paper aimed at exploring twitter data of network actors talking about the marathon silver medalists on Rio2016, who showed solidarity with the Oromo protesters in Ethiopia on the marathon race finish line when he won silver. The aim is to discover important insight using social network analysis and mining. The hashtag #FeyisaLelisa was used for Twitter network search. The actors’ network was visualized and analyzed. It showed the central influencers during first 10 days in August, were international media outlets while it was changed to individual activist in September. The degree distribution of the network is scale free where the frequency of degrees decay by power low. Text mining was also used to arrive at meaningful themes from tweet corpus about the event selected for analysis. The semantic network indicated important clusters of concepts (15) that provided different insight regarding the why, who, where, how of the situation related to the event. The sentiments of the words in the tweets were also analyzed and indicated that 95% of the opinions in the tweets were either positive or neutral. Overall, the finding showed that Olympic stage protest of the marathoner brought the issue of Oromo protest to the global stage. The new research framework is proposed based for event-based social network analysis and mining based on the practical procedures followed in this research for event-based social media sense making.

Keywords: human rights, Olympics, social media, network analysis, social network ming

Procedia PDF Downloads 254
983 The Spatial Potential of the Croatian Adriatic Area for the Development of an Indigenous Form of Cruising Tourism - Mini Croatian Cruiser

Authors: Srećko Favro, Dora Mužinić

Abstract:

The eastern coast of the Adriatic Sea has been a significant part of the most important traffic corridors since Antiquity due to its position as the deepest indented bay of the Mediterranean and numerous bays on the coast and is-lands. The central place throughout history was occupied by the central part - Split-Dalmatia County, with its center in Antica in Salona and later in Split. Nowadays, in addition to its traffic and economic importance, this area is also important for tourism, an area where Croatia develops its economy and realizing its economic growth. Nautical tourism is the most important form of the tourist economic sector that uses the geographical features of the Croatian Adriatic water area and achieves the greatest growth based on tour-ist trends in the world (coronavirus - separation from the masses, adventure tourism - own arrangements) and thus opens up the possibility of develop-ment for other parts of the tourist economy. This will be described in the ex-ample of the business of the Split-Dalmatia County shipping company from Krilo Jesenice, which operates as a mini-cruising service provider, the lead-ing form of cruising in Croatia. The advantages that this type of tourism provides to travelers in terms of customized itineraries, high-quality services, an intimate atmosphere, and a unique experience through familiarization with local culture and tradition will be considered. Through direct primary research and analysis of available secondary research data, an attempt will be made to show how traditional Croatian mini cruisers manage to stand out in a competitive tourist environment. Their impact on the local economy, sus-tainability, and environmental protection will be considered, as well as how they are integrated into the tourist offer of other destinations in Croatia. In addition, the challenges and opportunities that arise in the maintenance and development of traditional Croatian mini cruisers will be discussed, includ-ing issues such as infrastructure, staff training, and market trends.

Keywords: croatia, adriatic, cruising, nautical tourism, mini cruise

Procedia PDF Downloads 60
982 Fungal Profile and Antifungal Susceptibility Patterns among Symptomatic Pediatrics Patients Attending Aboozar Children’s Hospital, Ahvaz, Iran

Authors: Nasrin Amirrajab, Yasaman Razavi Ghahfarokhi, Zahra Tootak, Maryam Hadian, Fatemeh Abooali Shamshiri

Abstract:

Urinary tract infections (UTIs) have been reported in children with nephrotic syndrome. However, the only causes for the infection reported to date are bacteria, but not many prior reported occurrences of fungi or yeast as causative organisms. Hence, the present study aimed to describe the epidemiology of urinary tract fungal infections in a tertiary care pediatric. A single-center cross-sectional study was conducted at the nephrology ward of Aboozar Pediatric Hospital between March 21, 2021, and April 28, 2022. Urine was collected aseptically from children, inoculated onto culture media, and incubated at 37 °C for 18–48 hours. Yeast was identified following standard procedures. Antifungal susceptibility testing was determined by the disk diffusion method according to the CLSI guideline. Descriptive statistics and logistical regressions were used to estimate the crude ratio with a 95% confidence interval. P-value < 0.05 was considered significant. Among 68 individuals referred to the mycology lab, the result of direct examination and culture of all patients approved for C.albicans. Of these, 38 individuals (55.8%) were male, and 30 (44.2%) were female. The patients' age ranges were between one month and an 18-year-old. In the study of infection intensity, the patients were classified into three levels such as few (73.5%), moderate (20.6%), and many (5.9%). In the present study, all the patients were sensitive to Posaconazole. Also, the eagle effect was found in Amphotericin B, Voriconazole, and Fluconazole with frequencies of 91.7%, 91.7%, and 83%, respectively. In addition, just 8.3% of isolates were resistant to Itraconazole. It has not shown resistance in other mentioned medicine. The patients showed an intermediate response to Itraconazole (91.7%), Fluconazole (17%), Voriconazole (8.3%), and Amphotericin B (8.3%). There is a high prevalence of yeast infections in children with suspected UTIs. Also, boys are more likely to get yeast infections, and the severity of the infection is higher than girls. The present study demonstrated the importance of diagnosing and selecting the appropriate drug for urinary tract fungal infections in hospitalized children.

Keywords: urinary tract infections, children, fungal infections, yeast, antifungal susceptibility

Procedia PDF Downloads 95
981 Seismic Isolation of Existing Masonry Buildings: Recent Case Studies in Italy

Authors: Stefano Barone

Abstract:

Seismic retrofit of buildings through base isolation represents a consolidated protection strategy against earthquakes. It consists in decoupling the ground motion from that of the structure and introducing anti-seismic devices at the base of the building, characterized by high horizontal flexibility and medium/high dissipative capacity. This allows to protect structural elements and to limit damages to non-structural ones. For these reasons, full functionality is guaranteed after an earthquake event. Base isolation is applied extensively to both new and existing buildings. For the latter, it usually does not require any interruption of the structure use and occupants evacuation, a special advantage for strategic buildings such as schools, hospitals, and military buildings. This paper describes the application of seismic isolation to three existing masonry buildings in Italy: Villa “La Maddalena” in Macerata (Marche region), “Giacomo Matteotti” and “Plinio Il Giovane” school buildings in Perugia (Umbria region). The seismic hazard of the sites is characterized by a Peak Ground Acceleration (PGA) of 0.213g-0.287g for the Life Safety Limit State and between 0.271g-0.359g for the Collapse Limit State. All the buildings are isolated with a combination of free sliders type TETRON® CD with confined elastomeric disk and anti-seismic rubber isolators type ISOSISM® HDRB to reduce the eccentricity between the center of mass and stiffness, thus limiting torsional effects during a seismic event. The isolation systems are designed to lengthen the original period of vibration (i.e., without isolators) by at least three times and to guarantee medium/high levels of energy dissipation capacity (equivalent viscous damping between 12.5% and 16%). This allows the structures to resist 100% of the seismic design action. This article shows the performances of the supplied anti-seismic devices with particular attention to the experimental dynamic response. Finally, a special focus is given to the main site activities required to isolate a masonry building.

Keywords: retrofit, masonry buildings, seismic isolation, energy dissipation, anti-seismic devices

Procedia PDF Downloads 68