Search results for: distributed sensor networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5819

Search results for: distributed sensor networks

2009 The Effect Of Leadership Style On Employee Engagment In Ethiopian Airlines

Authors: Mahlet Nigussie Worku

Abstract:

The main purpose of this study was to examine the effects of different leadership styles on employee engagement in Ethiopian Airlines head quarter located in Addis Ababa. Specific objectives of the study were stated to examine the effects of five leadership styles namely transformational, transactional, democratic, lassies fair and autocratic leadership styles on employees’ engagement. The study was conducted on 288 sample size and a simple random sampling technique was employed. The quantitative findings were presented and analyzed by table, ANOVA, bivariate correlation and regression model through SPSS software version 23. Out of 288 total distributed questionnaires 280 were returned and 8 of the returned were rejected due to missing data while the remaining 280 responses were used for data analysis. Data was analyzed using the Statistical Package for Social Sciences (SPSS). The study employed both descriptive and explanatory research design. Correlation and regression were used to analyze the relationship and its effect between leadership Style and employee’s engagement. The regression results showed that transformational, transactional and democratic leadership Styles have significant contribution for employee’s engagement. Similarly transformational, transactional land democratic leadership style had a positive and strong correlation with employee’s engagement. However lassies-fair and autocratic leadership style showed negative and insignificant effect on employee engagement. Finally, based on the findings, workable recommendations and implications for further studies were forwarded

Keywords: leadership, leadership style, employee engagement, autocratic leadership styles

Procedia PDF Downloads 79
2008 Exploring Students’ Self-Evaluation on Their Learning Outcomes through an Integrated Cumulative Grade Point Average Reporting Mechanism

Authors: Suriyani Ariffin, Nor Aziah Alias, Khairil Iskandar Othman, Haslinda Yusoff

Abstract:

An Integrated Cumulative Grade Point Average (iCGPA) is a mechanism and strategy to ensure the curriculum of an academic programme is constructively aligned to the expected learning outcomes and student performance based on the attainment of those learning outcomes that is reported objectively in a spider web. Much effort and time has been spent to develop a viable mechanism and trains academics to utilize the platform for reporting. The question is: How well do learners conceive the idea of their achievement via iCGPA and whether quality learner attributes have been nurtured through the iCGPA mechanism? This paper presents the architecture of an integrated CGPA mechanism purported to address a holistic evaluation from the evaluation of courses learning outcomes to aligned programme learning outcomes attainment. The paper then discusses the students’ understanding of the mechanism and evaluation of their achievement from the generated spider web. A set of questionnaires were distributed to a group of students with iCGPA reporting and frequency analysis was used to compare the perspectives of students on their performance. In addition, the questionnaire also explored how they conceive the idea of an integrated, holistic reporting and how it generates their motivation to improve. The iCGPA group was found to be receptive to what they have achieved throughout their study period. They agreed that the achievement level generated from their spider web allows them to develop intervention and enhance the programme learning outcomes before they graduate.

Keywords: learning outcomes attainment, iCGPA, programme learning outcomes, spider web, iCGPA reporting skills

Procedia PDF Downloads 211
2007 Deep Well Grounded Magnetite Anode Chains Retrieval and Installation for Raslanuf Complex Impressed Current Cathodic Protection System Rectification

Authors: Mohamed Ahmed Khali

Abstract:

Numbers of deep well anode ground beds (GBs) have been retrieved due to un operated anode chains. New identical magnetite anode chains(MAC) have been installed at Raslanuf complex impressed current Cathodic protection(ICCP) system, distributed at different plants(Utility, ethylene and polyethylene). All problems associated with retrieving and installation of MACs have been discussed, rectified and presented. All GB associated severely corroded wellhead casings were well maintained and/ or replaced by new fabricated and modified ones. The main cause of wellhead casings internal corrosion was discussed, and the conducted remedy action to overcome future corrosion problem is presented. All GB connected anode junction boxes (AJBs) and shunts were closely inspected, maintained, and necessary replacement/and or modification were carried out on shunts. All damaged GB concrete foundations (CF) have been inspected and completely replaced. All GB associated Transformer-Rectifiers units (TRUs) were subjected to through inspection, and necessary maintenance has been performed on each individual TRU. After completion of all MACs and TRU maintenance activities, each cathodic protection station (CPS) has been re-operated. An alternative current (AC), direct current (DC), voltage and structure to soil potential (S/P) measurements have been conducted, recorded, and all obtained test results are presented. DC current outputs has been adjusted, and DC current outputs of each MAC has been recorded for each GB AJB.

Keywords: magnatite anode, deep well, ground bed, cathodic protection, transformer rectifies, impreced current, junction box

Procedia PDF Downloads 117
2006 Effects of Auxetic Antibacterial Zwitterion Carboxylate and Sulfate Copolymer Hydrogels for Diabetic Wound Healing Application

Authors: Udayakumar Vee, Franck Quero

Abstract:

Zwitterionic polymers generally have been viewed as a new class of antimicrobial and non-fouling materials. They offer a broad versatility for chemical modification and hence great freedom for accurate molecular design, which bear an equimolar number of homogenously distributed anionic and cationic groups along their polymer chains. This study explores the effectiveness of the auxetic zwitterion carboxylate/sulfonate hydrogel in the diabetic-induced mouse model. A series of silver metal-doped auxetic zwitterion carboxylate/sulfonate/vinylaniline copolymer hydrogels is designed via a 3D printer. Zwitterion monomers have been characterized by FT-IR and NMR techniques. The effect of changing the monomers and different loading ratios of Ag over zwitterion on the final hydrogel materials' antimicrobial properties and biocompatibility will be investigated in detail. The synthesized auxetic hydrogel has been characterized using a wide range of techniques to help establish the relationship between molecular level and macroscopic properties of these materials, including mechanical and antibacterial and biocompatibility and wound healing ability. This work's comparative studies and results provide new insights and guide us in choosing a better auxetic structured material for a broad spectrum of wound healing applications in the animal model. We expect this approach to provide a versatile and robust platform for biomaterial design that could lead to promising treatments for wound healing applications.

Keywords: auxetic, zwitterion, carboxylate, sulfonate, polymer, wound healing

Procedia PDF Downloads 146
2005 Role of Pakistani Physicians in the Pharmacotherapy of Obesity

Authors: Sadia Suri Kashif, Raheeda Fatima, Maqsood Ahmed Khan

Abstract:

Purpose of the study: The objective of this research was to determine the perception of Pakistani physicians (whether primary care, specialists or residents) in Karachi, being one of the largest and highly populated cities of Pakistan, regarding clinical approaches towards diet, exercise, and therapy in obese patients. This research determines their understanding of obesity and employability of obesity management in their daily practices. Research methodology: This is a questionnaire-based survey. A minimum of 300 questionnaires (N=300) were distributed and filled by practicing physicians in a random selection of medical setups in Karachi. Randomly 246 physicians responded to the survey. The survey tested their views regarding weight management, importance of general awareness and their strategies to control weight. Results: In the first part of survey the physicians responded to almost 66% regarding the seriousness of obesity management with advising diet modification, physical exercise and decreasing calorie intake; 57% failed to employ Body Mass Index and Waist Hip Ratio as weight measurement tools in their daily practice; 50% disagreed on using pharmacotherapy as an option; 67% were not sure about the proper dosage and indication of anti-obesity medication while almost same disagreed on using surgical options for management of obesity; 83.3% physicians agreed on the increased obesity pandemic in Pakistan. Conclusion: The findings indicate that there is a gap between awareness and knowledge among Pakistani practicing physicians regarding pharmacotherapy for obesity. There is a need to frequently update latest guidelines to help manage this condition, which is becoming more prevalent in our country day by day. Physicians should be obligated to use updated knowledge for managing obesity.

Keywords: obesity, physicians, BMI, weight management, obesity awareness

Procedia PDF Downloads 175
2004 Water Supply and Utility Management to Address Urban Sanitation Issues

Authors: Akshaya P., Priyanjali Prabhkaran

Abstract:

The paper examines the formulation of strategies to develop a comprehensive model of city level water utility management to addressing urban sanitation issues. The water is prime life sustaining natural resources and nature’s gifts to all living beings on the earth multiple urban sanitation issues are addressed in the supply of water in a city. Many of these urban sanitation issues are linked to population expansion and economic inequity. Increased usage of water and the development caused water scarcity. The lack of water supply results increases the chance of unhygienic situations in the cities. In this study, the urban sanitation issues are identified with respect to water supply and utility management. The study compared based on their best practices and initiatives. From this, best practices and initiatives identify suitable sustainable measures to address water supply issues in the city level. The paper concludes with the listed provision that should be considered suitable measures for water supply and utility management in city level to address the urban sanitation issues.

Keywords: water, benchmarking water supply, water supply networks, water supply management

Procedia PDF Downloads 114
2003 Preserving Digital Arabic Text Integrity Using Blockchain Technology

Authors: Zineb Touati Hamad, Mohamed Ridda Laouar, Issam Bendib

Abstract:

With the massive development of technology today, the Arabic language has gained a prominent position among the languages most used for writing articles, expressing opinions, and also for citing in many websites, defying its growing sensitivity in terms of structure, language skills, diacritics, writing methods, etc. In the context of the spread of the Arabic language, the Holy Quran represents the most prevalent Arabic text today in many applications and websites for citation purposes or for the reading and learning rituals. The Quranic verses / surahs are published quickly and without cost, which may cause great concern to ensure the safety of the content from tampering and alteration. To protect the content of texts from distortion, it is necessary to refer to the original database and conduct a comparison process to extract the percentage of distortion. The disadvantage of this method is that it takes time, in addition to the lack of any guarantee on the integrity of the database itself as it belongs to one central party. Blockchain technology today represents the best way to maintain immutable content. Blockchain is a distributed database that stores information in blocks linked to each other through encryption, where the modification of each block can be easily known. To exploit these advantages, we seek in this paper to justify the use of this technique in preserving the integrity of Arabic texts sensitive to change by building a decentralized framework to authenticate and verify the integrity of the digital Quranic verses/surahs spread on websites.

Keywords: arabic text, authentication, blockchain, integrity, quran, verification

Procedia PDF Downloads 170
2002 Antibacterial Zwitterion Carboxylate and Sulfonate Copolymer Auxetic Hydrogels for Diabetic Wound Healing Application

Authors: Udayakumar Veerabagu, Franck Quero

Abstract:

Zwitterion carboxylate and sulfonate polymers generally have been viewed as a new class of antimicrobial and non-fouling materials. They offer a broad versatility for chemical modification and hence great freedom for accurate molecular design, which bear an equimolar number of homogenously distributed anionic and cationic groups along their polymer chains. This study explores the effectiveness of the auxetic zwitterion carboxylate/sulfonate hydrogel in the diabetic-induced mouse model. A series of silver metal-doped auxetic zwitterion carboxylate/sulfonate/vinylaniline copolymer hydrogels is designed via a 3D printer. Zwitterion monomers have been characterized by FT-IR and NMR techniques. The effect of changing the monomers and different loading ratios of Ag over zwitterion on the final hydrogel materials' antimicrobial properties and biocompatibility will be investigated in detail. The synthesized auxetic hydrogel has been characterized using a wide range of techniques to help establish the relationship between molecular level and macroscopic properties of these materials, including mechanical and antibacterial and biocompatibility and wound healing ability. This work's comparative studies and results provide new insights and guide us in choosing a better auxetic structured material for a broad spectrum of wound healing applications in the animal model. We expect this approach to provide a versatile and robust platform for biomaterial design that could lead to promising treatments for wound healing applications.

Keywords: auxetic, zwitterion, carboxylate, sulfonate, polymer, wound healing

Procedia PDF Downloads 161
2001 Naturally Occurring Abietic Acid for Liquid Crystalline Epoxy Curing Agents

Authors: Rasha A.Ibrahim El-Ghazawy, Ashraf M. El-Saeed, Heusin El-Shafey, M. Abdel-Raheim, Maher A. El-Sockary

Abstract:

Two thermotropic liquid crystalline curing agents based on abietic acid with different mesogens (LCC1 and LCC2) were synthesized for producing thermally stable liquid crystal networks suitable for high performance epoxy coatings. Differential scanning calorimetry (DSC) and polarized optical microscope (POM) was used to identify the liquid crystal phase transformation temperatures and texture, respectively. POM micro graphs for both LCCs revealing cholesteric texture. A multifunctional epoxy resin with two abietic acid moieties was also synthesized. Dynamic mechanical (DMA) and thermogravimetric (TGA) analyses show that the fully bio-based cured epoxies by either LCCs possess high glass transition temperature (Tg), high modulus (G`) and improved thermal stability. The chemical structure of the synthesized LCCs and epoxy resin was investigated through FTIR and 1HNMR spectroscopic techniques.

Keywords: abietic acid, dynamic mechanical analysis, epoxy resin, liquid crystal, thermo gravimetric analysis

Procedia PDF Downloads 367
2000 Simulation-Based Validation of Safe Human-Robot-Collaboration

Authors: Titanilla Komenda

Abstract:

Human-machine-collaboration defines a direct interaction between humans and machines to fulfil specific tasks. Those so-called collaborative machines are used without fencing and interact with humans in predefined workspaces. Even though, human-machine-collaboration enables a flexible adaption to variable degrees of freedom, industrial applications are rarely found. The reasons for this are not technical progress but rather limitations in planning processes ensuring safety for operators. Until now, humans and machines were mainly considered separately in the planning process, focusing on ergonomics and system performance respectively. Within human-machine-collaboration, those aspects must not be seen in isolation from each other but rather need to be analysed in interaction. Furthermore, a simulation model is needed that can validate the system performance and ensure the safety for the operator at any given time. Following on from this, a holistic simulation model is presented, enabling a simulative representation of collaborative tasks – including both, humans and machines. The presented model does not only include a geometry and a motion model of interacting humans and machines but also a numerical behaviour model of humans as well as a Boole’s probabilistic sensor model. With this, error scenarios can be simulated by validating system behaviour in unplanned situations. As these models can be defined on the basis of Failure Mode and Effects Analysis as well as probabilities of errors, the implementation in a collaborative model is discussed and evaluated regarding limitations and simulation times. The functionality of the model is shown on industrial applications by comparing simulation results with video data. The analysis shows the impact of considering human factors in the planning process in contrast to only meeting system performance. In this sense, an optimisation function is presented that meets the trade-off between human and machine factors and aids in a successful and safe realisation of collaborative scenarios.

Keywords: human-machine-system, human-robot-collaboration, safety, simulation

Procedia PDF Downloads 364
1999 Reduction of Energy Consumption Using Smart Home Techniques in the Household Sector

Authors: Ahmed Al-Adaileh, Souheil Khaddaj

Abstract:

Outcomes of exhaustion of natural resources started influencing each spirit on this planet. Energy is an essential factor in this aspect. To restore the circumstance to the appropriate track, all attempts must focus on two fundamental branches: producing electricity from clean and renewable reserves and decreasing the overall unnecessary consumption of energy. The focal point of this paper will be on lessening the power consumption in the household's segment. This paper is an attempt to give a clear understanding of a framework called Reduction of Energy Consumption in Household Sector (RECHS) and how it should help householders to reduce their power consumption by substituting their household appliances, turning-off the appliances when stand-by modus is detected, and scheduling their appliances operation periods. Technically, the framework depends on utilizing Z-Wave compatible plug-ins which will be connected to the usual house devices to gauge and control them remotely and semi-automatically. The suggested framework underpins numerous quality characteristics, for example, integrability, scalability, security and adaptability.

Keywords: smart energy management systems, internet of things, wireless mesh networks, microservices, cloud computing, big data

Procedia PDF Downloads 202
1998 A Blockchain-Based Protection Strategy against Social Network Phishing

Authors: Francesco Buccafurri, Celeste Romolo

Abstract:

Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.

Keywords: phishing, social networks, information sharing, blockchain

Procedia PDF Downloads 335
1997 Key External Causes of Poor Performance of Engineering and Technical Departments within Governmental Construction Projects in Saudi Arabia

Authors: Alaa A. Al-Harthi, Abdulrahman S. Bageis, Bingunath Ingirige

Abstract:

Poor levels of performance and low productivity were highlighted by many previous studies as a major cause of failure in the Saudi construction industry. This paper provides recommendations to address key external indicators that led to poor levels of performance and low productivity in Engineering and Technical Departments (ETDs) within the Saudi governmental agencies. The ETDs are client’s representative on behalf of the Saudi Ministries. This paper represents a part of an investigation which contained external and internal challenges that led to occurrence of the research problem. The paper is focusing on the external challenges which contain 14 indicators. These 14 external indicators had been examined carefully through comprehensive review of the literature then have been tested through quantitative and qualitative methods. 400 questionnaires were distributed to dozens of different bodies. The actual response rate was 47% completed responses. Four semi-structured interviews were conducted with senior practitioners from the Public Construction Sector. The finding showed that the 14 external indicators directly and/or indirectly influence the Public Construction Sector. It was noticed significantly that these indicators have prevented the ETDs from performing properly. It was also found that the 14 external indicators were constant with all kinds of Government Construction Projects in the Saudi context. Addressing the 14 external indicators requires to be planned over the long run which is responsible by relevant Saudi governmental authorities under the umbrella of the Saudi Council of Ministers. The study recommends that Project Management Office (PMO) should be considered in order to improve the performance of the ETDs.

Keywords: construction projects' performance, low engineering productivity, public construction sector

Procedia PDF Downloads 606
1996 E-Marketing Strategy a Competitive Advantage among Commercial Bank Branches in Bauchi State

Authors: Sagir Abubakar

Abstract:

The electronic means of transaction has provided an opportunity especially for commercial banks to entice more customers that will subsequently boost their return on investment. It moves them from traditional marketing into digital marketing and gives them a competitive advantage over others in the same industry. The paper, therefore, examined the competitive advantage of the electronic marketing strategy among commercial banks branches in Bauchi state. The main objective of the study was to determine the impact of e-marketing strategy as a competitive advantage among commercial banks branches in Bauchi state and to evaluate the level of enlightenment campaign offered by the commercial banks branches to their customers on e-marketing. The study obtained data from the staff of the five (s) selected banks branches as the respondents to answer the questionnaire. The research is a quantitative research, where the data where obtained using questionnaire. 100 questionnaires were distributed and analyzed using SPSS’s regression analysis. The research among other findings discovered that the e-marketing has led to a significant improvement in the banking industry and is expected to continue because of the improvement in the ICT sector. It was also found out that most customers are not aware of the electronic products offered by commercial banks branches in Bauchi state. Some of factors affecting the adoption of e-marketing by banks as indicated from the findings include: top management commitment, government policy on ICT and availability of ICT personnel. The study recommended that commercial banks branches should engage in enlightenment campaign about the existing of their e- products/services, management should place an incentive in order to raise the interest of customers to patronize the products/services online.

Keywords: e-marketing strategy, competitive advantage, banks, Bauchi State

Procedia PDF Downloads 487
1995 Resilience Assessment of Mountain Cities from the Perspective of Disaster Prevention: Taking Chongqing as an Example

Authors: Yun Ma, Jiajun Lu

Abstract:

President Xi Jinping has clearly stated the need to more effectively advance the process of urbanization centered on people, striving to shape cities into spaces that are healthier, safer, and more livable. However, during the development and construction of mountainous cities, numerous uncertain disruptive factors have emerged, one after another, posing severe challenges to the city's overall development. Therefore, building resilient cities and creating high-quality urban ecosystems and safety systems have become the core and crux of achieving sustainable urban development. This paper takes the central urban area of Chongqing as the research object and establishes an urban resilience assessment indicator system from four dimensions: society, economy, ecology, and infrastructure. It employs the entropy weight method and TOPSIS model to assess the urban resilience level of the central urban area of Chongqing from 2019 to 2022. The results indicate that i. the resilience level of the central urban area of Chongqing is unevenly distributed, showing a spatial pattern of "high in the middle and low around"; it also demonstrates differentiation across different dimensions; ii. due to the impact of the COVID-19 pandemic, the overall resilience level of the central urban area of Chongqing has declined significantly, with low recovery capacity and slow improvement in urban resilience. Finally, based on the four selected dimensions, this paper proposes optimization strategies for urban resilience in mountainous cities, providing a basis for Chongqing to build a safe and livable new city.

Keywords: mountainous urban areas, central urban area of chongqing, entropy weight method, TOPSIS model, ArcGIS

Procedia PDF Downloads 14
1994 An Integrated Approach to the Carbonate Reservoir Modeling: Case Study of the Eastern Siberia Field

Authors: Yana Snegireva

Abstract:

Carbonate reservoirs are known for their heterogeneity, resulting from various geological processes such as diagenesis and fracturing. These complexities may cause great challenges in understanding fluid flow behavior and predicting the production performance of naturally fractured reservoirs. The investigation of carbonate reservoirs is crucial, as many petroleum reservoirs are naturally fractured, which can be difficult due to the complexity of their fracture networks. This can lead to geological uncertainties, which are important for global petroleum reserves. The problem outlines the key challenges in carbonate reservoir modeling, including the accurate representation of fractures and their connectivity, as well as capturing the impact of fractures on fluid flow and production. Traditional reservoir modeling techniques often oversimplify fracture networks, leading to inaccurate predictions. Therefore, there is a need for a modern approach that can capture the complexities of carbonate reservoirs and provide reliable predictions for effective reservoir management and production optimization. The modern approach to carbonate reservoir modeling involves the utilization of the hybrid fracture modeling approach, including the discrete fracture network (DFN) method and implicit fracture network, which offer enhanced accuracy and reliability in characterizing complex fracture systems within these reservoirs. This study focuses on the application of the hybrid method in the Nepsko-Botuobinskaya anticline of the Eastern Siberia field, aiming to prove the appropriateness of this method in these geological conditions. The DFN method is adopted to model the fracture network within the carbonate reservoir. This method considers fractures as discrete entities, capturing their geometry, orientation, and connectivity. But the method has significant disadvantages since the number of fractures in the field can be very high. Due to limitations in the amount of main memory, it is very difficult to represent these fractures explicitly. By integrating data from image logs (formation micro imager), core data, and fracture density logs, a discrete fracture network (DFN) model can be constructed to represent fracture characteristics for hydraulically relevant fractures. The results obtained from the DFN modeling approaches provide valuable insights into the East Siberia field's carbonate reservoir behavior. The DFN model accurately captures the fracture system, allowing for a better understanding of fluid flow pathways, connectivity, and potential production zones. The analysis of simulation results enables the identification of zones of increased fracturing and optimization opportunities for reservoir development with the potential application of enhanced oil recovery techniques, which were considered in further simulations on the dual porosity and dual permeability models. This approach considers fractures as separate, interconnected flow paths within the reservoir matrix, allowing for the characterization of dual-porosity media. The case study of the East Siberia field demonstrates the effectiveness of the hybrid model method in accurately representing fracture systems and predicting reservoir behavior. The findings from this study contribute to improved reservoir management and production optimization in carbonate reservoirs with the use of enhanced and improved oil recovery methods.

Keywords: carbonate reservoir, discrete fracture network, fracture modeling, dual porosity, enhanced oil recovery, implicit fracture model, hybrid fracture model

Procedia PDF Downloads 81
1993 Gradient-Based Reliability Optimization of Integrated Energy Systems Under Extreme Weather Conditions: A Case Study in Ningbo, China

Authors: Da LI, Peng Xu

Abstract:

Recent extreme weather events, such as the 2021 European floods and North American heatwaves, have exposed the vulnerability of energy systems to both extreme demand scenarios and potential physical damage. Current integrated energy system designs often overlook performance under these challenging conditions. This research, focusing on a regional integrated energy system in Ningbo, China, proposes a distinct design method to optimize system reliability during extreme events. A multi-scenario model was developed, encompassing various extreme load conditions and potential system damages caused by severe weather. Based on this model, a comprehensive reliability improvement scheme was designed, incorporating a gradient approach to address different levels of disaster severity through the integration of advanced technologies like distributed energy storage. The scheme's effectiveness was validated through Monte Carlo simulations. Results demonstrate significant enhancements in energy supply reliability and peak load reduction capability under extreme scenarios. The findings provide several insights for improving energy system adaptability in the face of climate-induced challenges, offering valuable references for building reliable energy infrastructure capable of withstanding both extreme demands and physical threats across a spectrum of disaster intensities.

Keywords: extreme weather events, integrated energy systems, reliability improvement, climate change adaptation

Procedia PDF Downloads 33
1992 Sensing of Cancer DNA Using Resonance Frequency

Authors: Sungsoo Na, Chanho Park

Abstract:

Lung cancer is one of the most common severe diseases driving to the death of a human. Lung cancer can be divided into two cases of small-cell lung cancer (SCLC) and non-SCLC (NSCLC), and about 80% of lung cancers belong to the case of NSCLC. From several studies, the correlation between epidermal growth factor receptor (EGFR) and NSCLCs has been investigated. Therefore, EGFR inhibitor drugs such as gefitinib and erlotinib have been used as lung cancer treatments. However, the treatments result showed low response (10~20%) in clinical trials due to EGFR mutations that cause the drug resistance. Patients with resistance to EGFR inhibitor drugs usually are positive to KRAS mutation. Therefore, assessment of EGFR and KRAS mutation is essential for target therapies of NSCLC patient. In order to overcome the limitation of conventional therapies, overall EGFR and KRAS mutations have to be monitored. In this work, the only detection of EGFR will be presented. A variety of techniques has been presented for the detection of EGFR mutations. The standard detection method of EGFR mutation in ctDNA relies on real-time polymerase chain reaction (PCR). Real-time PCR method provides high sensitive detection performance. However, as the amplification step increases cost effect and complexity increase as well. Other types of technology such as BEAMing, next generation sequencing (NGS), an electrochemical sensor and silicon nanowire field-effect transistor have been presented. However, those technologies have limitations of low sensitivity, high cost and complexity of data analyzation. In this report, we propose a label-free and high-sensitive detection method of lung cancer using quartz crystal microbalance based platform. The proposed platform is able to sense lung cancer mutant DNA with a limit of detection of 1nM.

Keywords: cancer DNA, resonance frequency, quartz crystal microbalance, lung cancer

Procedia PDF Downloads 238
1991 Academic Achievement Differences in Grandiose and Vulnerable Narcissists and the Mediating Effects of Self-Esteem and Self-Efficacy

Authors: Amber Dummett, Efstathia Tzemou

Abstract:

Narcissism is a personality trait characterized by selfishness, entitlement, and superiority. Narcissism is split into two subtypes, grandiose narcissism (GN) and vulnerable narcissism (VN). Grandiose narcissists are extraverted and arrogant, while vulnerable narcissists are introverted and insecure. This study investigates the psychological mechanisms that lead to differences in academic achievement (AA) between grandiose and vulnerable narcissists, specifically the mediating effects of self-esteem and self-efficacy. While narcissism is considered to be a negative trait, one of the Dark Triads, GN, has been found to have some benefits; therefore, this study considers if better AA is one of them. Moreover, further research into VN is essential to fully compare and contrast it with GN. We hypothesize that grandiose narcissists achieve higher marks due to having high self-esteem and self-efficacy. In comparison, we hypothesize that vulnerable narcissists underperform and achieve lower marks due to having low self-esteem and self-efficacy. Two online surveys were distributed to undergraduate university students. The first was a collection of scales measuring the mentioned dimensions and semester one AA, and the second investigated end of year AA. Sequential mediation analyses were conducted using the gathered data. Our analysis shows that neither self-esteem nor self-efficacy mediates the relationship between GN and AA. GN positively predicts self-esteem but has no relationship with self-efficacy. Self-esteem does not mediate the relationship between VN and AA. VN has a negative indirect effect on AA via self-efficacy, and VN negatively predicts self-esteem. Self-efficacy positively predicts AA. GN does not affect AA through the mediation of self-esteem and then self-efficacy, and neither does VN in this way. Overall, having grandiose or vulnerable narcissistic traits does not affect students’ AA. However, being highly efficacious does lead to academic success; therefore, universities should employ methods to improve the self-efficacy of their students.

Keywords: academic achievement, grandiose narcissism, self-efficacy, self-esteem, vulnerable narcissism

Procedia PDF Downloads 206
1990 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection

Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim

Abstract:

As internet continues to expand its usage with an enormous number of applications, cyber-threats have significantly increased accordingly. Thus, accurate detection of malicious traffic in a timely manner is a critical concern in today’s Internet for security. One approach for intrusion detection is to use Machine Learning (ML) techniques. Several methods based on ML algorithms have been introduced over the past years, but they are largely limited in terms of detection accuracy and/or time and space complexity to run. In this work, we present a novel method for intrusion detection that incorporates a set of supervised learning algorithms. The proposed technique provides high accuracy and outperforms existing techniques that simply utilizes a single learning method. In addition, our technique relies on partial flow information (rather than full information) for detection, and thus, it is light-weight and desirable for online operations with the property of early identification. With the mid-Atlantic CCDC intrusion dataset publicly available, we show that our proposed technique yields a high degree of detection rate over 99% with a very low false alarm rate (0.4%).

Keywords: intrusion detection, supervised learning, traffic classification, computer networks

Procedia PDF Downloads 356
1989 Harnessing the Potential of Renewable Energy Sources to Reduce Fossil Energy Consumption in the Wastewater Treatment Process

Authors: Hen Friman

Abstract:

Various categories of aqueous solutions are discharged within residential, institutional, commercial, and industrial structures. To safeguard public health and preserve the environment, it is imperative to subject wastewater to treatment processes that eliminate pathogens (such as bacteria and viruses), nutrients (such as nitrogen and phosphorus), and other compounds. Failure to address untreated sewage accumulation can result in an array of adverse consequences. Israel exemplifies a special case in wastewater management. Appropriate wastewater treatment significantly benefits sectors such as agriculture, tourism, horticulture, and industry. Nevertheless, untreated sewage in settlements lacking proper sewage collection or transportation networks remains an ongoing and substantial threat. Notably, the process of wastewater treatment entails substantial energy consumption. Consequently, this study explores the integration of solar energy as a renewable power source within the wastewater treatment framework. By incorporating renewable energy sources into the process, costs can be minimized, and decentralized facilities can be established even in areas lacking adequate infrastructure for traditional treatment methods.

Keywords: renewable energy, solar energy, innovative, wastewater treatment

Procedia PDF Downloads 114
1988 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 152
1987 Analysing Causal Effect of London Cycle Superhighways on Traffic Congestion

Authors: Prajamitra Bhuyan

Abstract:

Transport operators have a range of intervention options available to improve or enhance their networks. But often such interventions are made in the absence of sound evidence on what outcomes may result. Cycling superhighways were promoted as a sustainable and healthy travel mode which aims to cut traffic congestion. The estimation of the impacts of the cycle superhighways on congestion is complicated due to the non-random assignment of such intervention over the transport network. In this paper, we analyse the causal effect of cycle superhighways utilising pre-innervation and post-intervention information on traffic and road characteristics along with socio-economic factors. We propose a modeling framework based on the propensity score and outcome regression model. The method is also extended to doubly robust set-up. Simulation results show the superiority of the performance of the proposed method over existing competitors. The method is applied to analyse a real dataset on the London transport network, and the result would help effective decision making to improve network performance.

Keywords: average treatment effect, confounder, difference-in-difference, intelligent transportation system, potential outcome

Procedia PDF Downloads 246
1986 Identification of Flooding Attack (Zero Day Attack) at Application Layer Using Mathematical Model and Detection Using Correlations

Authors: Hamsini Pulugurtha, V.S. Lakshmi Jagadmaba Paluri

Abstract:

Distributed denial of service attack (DDoS) is one altogether the top-rated cyber threats presently. It runs down the victim server resources like a system of measurement and buffer size by obstructing the server to supply resources to legitimate shoppers. Throughout this text, we tend to tend to propose a mathematical model of DDoS attack; we discuss its relevancy to the choices like inter-arrival time or rate of arrival of the assault customers accessing the server. We tend to tend to further analyze the attack model in context to the exhausting system of measurement and buffer size of the victim server. The projected technique uses an associate in nursing unattended learning technique, self-organizing map, to make the clusters of identical choices. Lastly, the abstract applies mathematical correlation and so the standard likelihood distribution on the clusters and analyses their behaviors to look at a DDoS attack. These systems not exclusively interconnect very little devices exchanging personal data, but to boot essential infrastructures news standing of nuclear facilities. Although this interconnection brings many edges and blessings, it to boot creates new vulnerabilities and threats which might be conversant in mount attacks. In such sophisticated interconnected systems, the power to look at attacks as early as accomplishable is of paramount importance.

Keywords: application attack, bandwidth, buffer correlation, DDoS distribution flooding intrusion layer, normal prevention probability size

Procedia PDF Downloads 228
1985 Notions of Social Justice and Educational Globalization: Evaluations of Israeli Teachers and Students across Sectors

Authors: Clara Sabbagh, Nura Resh

Abstract:

The study delves into students’ and teachers’ notions of social justice (social justice judgments or SJJ), examining how they are shaped by both educational globalization and local (nation-state) conditions. Using the Israeli school setting as a case study, we discuss the status of hegemonic Zionism and two influential perspectives of educational globalization – world culture and the post-colonial critique of neo-liberalism – and derive competing hypotheses about the notions of social justice embedded in them. Against this background, we investigate how SJJ are affected by generation – Israeli teachers and students – and by educational sectors that mirror the society’s major divide: Jewish and Israeli Arab. In order to examine these issues, we used a representative sample of 2000 Israeli students, as well as a sample of 800 social studies teachers. We applied MANOVA repeated-measure for examining to what extent SSJ are dependent upon the type of resource that is distributed (repeated measures) and generational (teachers vs students) and sectorial (Jewish vs. Arab) group variables. As expected, findings revealed that the local context does matter. In other words, rather than being consistent with any of the three perspectives above, findings suggest that respondents elaborate the intersection between global and local traditions by creating various forms of mingled notions of social justice. In other words, Israeli (Jewish and Arab) teachers and students can be conceived as agents who play an important role in recreating national heritages and who differently interpret the ways educational globalization impacts their lives.

Keywords: educational globalization, social justice, teachers, Israel, Arab

Procedia PDF Downloads 230
1984 Multiple Identity Construction among Multilingual Minorities: A Quantitative Sociolinguistic Case Study

Authors: Stefanie Siebenhütter

Abstract:

This paper aims to reveal criterions involved in the process of identity-forming among multilingual minority language speakers in Northeastern Thailand and in the capital Bangkok. Using sociolinguistic interviews and questionnaires, it is asked which factors are important for speakers and how they define their identity by their interactions socially as well as linguistically. One key question to answer is how sociolinguistic factors may force or diminish the process of forming social identity of multilingual minority speakers. However, the motivation for specific language use is rarely overt to the speaker’s themselves as well as to others. Therefore, identifying the intentions included in the process of identity construction is to approach by scrutinizing speaker’s behavior and attitudes. Combining methods used in sociolinguistics and social psychology allows uncovering the tools for identity construction that ethnic Kui uses to range themselves within a multilingual setting. By giving an overview of minority speaker’s language use in context of the specific border near multilingual situation and asking how speakers construe identity within this spatial context, the results exhibit some of the subtle and mostly unconscious criterions involved in the ongoing process of identity construction.

Keywords: social identity, identity construction, minority language, multilingualism, social networks, social boundaries

Procedia PDF Downloads 272
1983 Machine Learning Methods for Flood Hazard Mapping

Authors: Stefano Zappacosta, Cristiano Bove, Maria Carmela Marinelli, Paola di Lauro, Katarina Spasenovic, Lorenzo Ostano, Giuseppe Aiello, Marco Pietrosanto

Abstract:

This paper proposes a novel neural network approach for assessing flood hazard mapping. The core of the model is a machine learning component fed by frequency ratios, namely statistical correlations between flood event occurrences and a selected number of topographic properties. The proposed hybrid model can be used to classify four different increasing levels of hazard. The classification capability was compared with the flood hazard mapping River Basin Plans (PAI) designed by the Italian Institute for Environmental Research and Defence, ISPRA (Istituto Superiore per la Protezione e la Ricerca Ambientale). The study area of Piemonte, an Italian region, has been considered without loss of generality. The frequency ratios may be used as a standalone block to model the flood hazard mapping. Nevertheless, the mixture with a neural network improves the classification power of several percentage points, and may be proposed as a basic tool to model the flood hazard map in a wider scope.

Keywords: flood modeling, hazard map, neural networks, hydrogeological risk, flood risk assessment

Procedia PDF Downloads 185
1982 The Experience of Gay Men Using Dating Applications in Their Emerging Adulthood

Authors: Chuang Bing-Kai, Shih Hsiang-Ju

Abstract:

Previous studies showed that emergent adults used dating applications the most since it would satisfy their needs for intimacy. It's also found that those emergent adults were mostly non-heterosexual. What’s more, in this digital era, more and more bisexuals and homosexuals choose to establish connections with others through Internet to seek a sense of belonging. However, studies rarely focused on gay men in their emergent adulthood to explore their experiences of dating applications. The purpose of this study was to explore the experience of gay men using dating applications in their emerging adulthood and to understand their self-presentations and the process of it among different relationships while interacting with others upon using dating applications. The semi-structured interview was conducted with those gay men who aged from 18 to 29, felt attracted to people with same gender physically and mentally, considered themselves homosexual from their subjective understanding and had been using dating applications for more than half a year. Research invitations were distributed with the assistance of social media platforms and LGBTQ+ friends in the community. This study adopted a qualitative research approach and applied hermeneutic phenomenology as the method to analyze the transcripts transcribed from the recorded audio, and to explore their using experiences and self-presentations while interacting with others while using dating apps. It’s expected to find out that there are four stages in the self-presentation process including establishing personal identity, self-exploration and experimentation, exploring shared interest and values, developing and maintaining connections. Plus, gay men’s motives to use dating apps play an important role in this process and thus influence how they position the apps in their life. Through this study, professional workers can better understand gay men’s considerations and strategies in their self-presentation process as well as the impact of using motives.

Keywords: dating applications, emerging adulthood, gay men, hermeneutic phenomenology

Procedia PDF Downloads 54
1981 Impact of Television on the Coverage of Lassa Fever Disease in Nigeria

Authors: H. Shola Adeosun, F. Ajoke Adebiyi

Abstract:

This study appraises the impact of television on the coverage of Lassa Fever disease. The objectives of the study are to find out whether television is an effective tool for raising awareness about Lassa fever shapes the perception of members of the public. The research work was based on the theoretical foundation of Agenda – setting and reinforcement theory. Survey research method was adopted in the study to elicit data from the residents of Obafemi Owode Local Government, area of Ogun state. Questionnaire and oral interview were adopted as a tool for data gathering. Simple random sampling techniques were used to draw a sample for this study. Out of filled 400 questionnaires distributed to the respondents. 37 of them were incorrectly filled and returned at the stipulated time. This is about (92.5% Tables, percentages, and figures were used to analyse and interpret the data and hypothesis formulation for this study revealed that Lassa fever diseases with higher media coverage were considered more serious and more representative of a disease and estimated to have lower incidents, than diseases less frequently found in the media. Thus, 92% of the respondents agree that they have access to television coverage of Lassa fever disease led to exaggerated perceptions of personal vulnerability. It, therefore, concludes that there is a need for relevant stakeholders to ensure better community health education and improved housing conditions in southwestern Nigeria, with an emphasis on slum areas and that Nigeria need to focus on the immediate response, while preparing for the future because a society or community is all about the people who inhabit. Therefore every effort must be geared towards their society and survival.

Keywords: impact, television, coverage, Lassa fever disease

Procedia PDF Downloads 215
1980 Vehicle Detection and Tracking Using Deep Learning Techniques in Surveillance Image

Authors: Abe D. Desta

Abstract:

This study suggests a deep learning-based method for identifying and following moving objects in surveillance video. The proposed method uses a fast regional convolution neural network (F-RCNN) trained on a substantial dataset of vehicle images to first detect vehicles. A Kalman filter and a data association technique based on a Hungarian algorithm are then used to monitor the observed vehicles throughout time. However, in general, F-RCNN algorithms have been shown to be effective in achieving high detection accuracy and robustness in this research study. For example, in one study The study has shown that the vehicle detection and tracking, the system was able to achieve an accuracy of 97.4%. In this study, the F-RCNN algorithm was compared to other popular object detection algorithms and was found to outperform them in terms of both detection accuracy and speed. The presented system, which has application potential in actual surveillance systems, shows the usefulness of deep learning approaches in vehicle detection and tracking.

Keywords: artificial intelligence, computer vision, deep learning, fast-regional convolutional neural networks, feature extraction, vehicle tracking

Procedia PDF Downloads 132