Search results for: Asia Mohammed Asiri
1321 Tracking Trajectory of a Cable-Driven Robot for Lower Limb Rehabilitation
Authors: Hachmia Faqihi, Maarouf Saad, Khalid Benjelloun, Mohammed Benbrahim, M. Nabil Kabbaj
Abstract:
This paper investigates and presents a cable-driven robot to lower limb rehabilitation use in sagittal plane. The presented rehabilitation robot is used for a trajectory tracking in joint space. The paper covers kinematic and dynamic analysis, which reveals the tensionability of the used cables as being the actuating source to provide a rehabilitation exercises of the human leg. The desired trajectory is generated to be used in the control system design in joint space. The obtained simulation results is showed to be efficient in this kind of application.Keywords: cable-driven multi-body system, computed-torque controller, lower limb rehabilitation, tracking trajectory
Procedia PDF Downloads 3881320 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime
Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim
Abstract:
Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.Keywords: construction industry, cybercrime, information and communication technology adoption, risk
Procedia PDF Downloads 5101319 Security Analysis of SIMSec Protocol
Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci
Abstract:
Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.Keywords: End-to-end encryption, key exchange, SIM card, smart card
Procedia PDF Downloads 2841318 Development of an Elastic Functionally Graded Interphase Model for the Micromechanics Response of Composites
Authors: Trevor Sabiston, Mohsen Mohammadi, Mohammed Cherkaoui, Kaan Inal
Abstract:
A new micromechanics framework is developed for long fibre reinforced composites using a single fibre surrounded by a functionally graded interphase and matrix as a representative unit cell. The unit cell is formulated to represent any number of aligned fibres by a single fibre. Using this model the elastic response of long fibre composites is predicted in all directions. The model is calibrated to experimental results and shows very good agreement in the elastic regime. The differences between the proposed model and existing models are discussed.Keywords: computational mechanics, functionally graded interphase, long fibre composites, micromechanics
Procedia PDF Downloads 3191317 Seat Assignment Model for Student Admissions Process at Saudi Higher Education Institutions
Authors: Mohammed Salem Alzahrani
Abstract:
In this paper, student admission process is studied to optimize the assignment of vacant seats with three main objectives. Utilizing all vacant seats, satisfying all program of study admission requirements and maintaining fairness among all candidates are the three main objectives of the optimization model. Seat Assignment Method (SAM) is used to build the model and solve the optimization problem with help of Northwest Coroner Method and Least Cost Method. A closed formula is derived for applying the priority of assigning seat to candidate based on SAM.Keywords: admission process model, assignment problem, Hungarian Method, Least Cost Method, Northwest Corner Method, SAM
Procedia PDF Downloads 5001316 Enhancing Water Purification with Angiosperm Xylem Filters
Authors: Yinan Zhou
Abstract:
One in four people in the world still lack access to clean drinking water, and there is a current lack of cost-effective ways for water-scarce regions to access it. This study seeks to investigate the solutions to water filtration in rural China as well as test the feasibility of using angiosperms as xylem candidates. Four angiosperms that are found in China and around Asia were subject to three tests to test their filtration capacity: ink water filtration, creek water filtration, and microparticle filtration. Analysis of the experiments demonstrated that Celtis Sinensis was able to produce one of the clearest solutions, filter out large debris and bacteria, and reject microparticles almost completely. Celtis Sinensis proves that angiosperm xylem filters are also competent filter candidates and, due to their availability in China, can be used as a nearby source of water filtration. Further research should be done on scaling production to a larger scale and also on the filtration of viruses.Keywords: xylem filter, water quality, China, angiosperms, bacteria
Procedia PDF Downloads 71315 Human Smuggling and Turkey
Authors: Perihan Hazel Kaya, Mustafa Göktuğ Kaya
Abstract:
Turkey has been a busy destination for immigration and it will always be as it is the geographical and cultural exit door of the East and the entrance door of the West. Among these immigrations, we can see the victims of human trafficking, human smuggling, refugees and those who came here to work and live. Human smuggling, which is one of the movements of illegal immigration, is the specific subject of this work. The fact that our country lies on the transportation destinations between the continents of Asia, Europe and Africa, the crime of human smuggling is highly committed in our country. The aim of the victims of human smuggling is to go to a more developed country to have higher standards of living, to get a better job and to escape from the economic and social instability of their countries. The human smuggling, which has gathered pace due to the improvements in communication and transportation, is not a regional issue and has become one of the most important problems for almost all countries. Accordingly, the reasons, methods and extent of human smuggling will be dealt firstly. Later, it will be studied why Turkey is preffered in human smuggling. Finally, statistical data will be given to show how much human smuggling has gone far in Turkey and the study will be finished with that what is being done and what can be done to prevent it.Keywords: human smuggling, immigration, immigrator, human trafficking, Turkey
Procedia PDF Downloads 4061314 A New Protocol Ensuring Users' Privacy in Pervasive Environment
Authors: Mohammed Nadir Djedid, Abdallah Chouarfia
Abstract:
Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.Keywords: pervasive systems, identification, authentication, privacy
Procedia PDF Downloads 4821313 Restoring Ecosystem Balance in Arid Regions: A Case Study of a Royal Nature Reserve in the Kingdom of Saudi Arabia
Authors: Talal Alharigi, Kawther Alshlash, Mariska Weijerman
Abstract:
The government of Saudi Arabia has developed an ambitious “Vision 2030”, which includes a Green Initiative (i.e., the planting of 10 billion trees) and the establishment of seven Royal Reserves as protected areas that comprise 13% of the total land area. The main objective of the reserves is to restore ecosystem balance and reconnect people with nature. Two royal reserves are managed by The Imam Abdulaziz bin Mohammed Royal Reserve Development Authority, including Imam Abdulaziz bin Mohammed Royal Reserve and King Khalid Royal Reserve. The authority has developed a management plan to enhance the habitat through seed dispersal and the planting of 10 million trees, and to restock wildlife that was once abundant in these arid ecosystems (e.g., oryx, Nubian ibex, gazelles, red-necked ostrich). Expectations are that with the restoration of the native vegetation, soil condition and natural hydrologic processes will improve and lead to further enhancement of vegetation and, over time, an increase in biodiversity of flora and fauna. To evaluate the management strategies in reaching these expectations, a comprehensive monitoring and evaluation program was developed. The main objectives of this program are to (1) monitor the status and trends of indicator species, (2) improve desert ecosystem understanding, (3) assess the effects of human activities, and (4) provide science-based management recommendations. Using a random stratified survey design, a diverse suite of survey methods will be implemented, including belt and quadrant transects, camera traps, GPS tracking devices, and drones. Data will be gathered on biotic parameters (plant and animal diversity, density, and distribution) and abiotic parameters (humidity, temperature, precipitation, wind, air, soil quality, vibrations, and noise levels) to meet the goals of the monitoring program. This case study intends to provide a detailed overview of the management plan and monitoring program of two royal reserves and outlines the types of data gathered which can be made available for future research projects.Keywords: camera traps, desert ecosystem, enhancement, GPS tracking, management evaluation, monitoring, planting, restocking, restoration
Procedia PDF Downloads 1181312 An Overview and Analysis of ChatGPT 3.5/4.0
Authors: Sarah Mohammed, Huda Allagany, Ayah Barakat, Muna Elyas
Abstract:
This paper delves into the history and development of ChatGPT, tracing its evolution from its inception by OpenAI to its current state, and emphasizing its design improvements and strategic partnerships. It also explores the performance and applicability of ChatGPT versions 3.5 and 4 in various contexts, examining its capabilities and limitations in producing accurate and relevant responses. Utilizing a quantitative approach, user satisfaction, speed of response, learning capabilities, and overall utility in academic performance were assessed through surveys and analysis tools. Findings indicate that while ChatGPT generally delivers high accuracy and speed in responses, the need for clarification and more specific user instructions persists. The study highlights the tool's increasing integration across different sectors, showcasing its potential in educational and professional settings.Keywords: artificial intelligence, chat GPT, analysis, education
Procedia PDF Downloads 511311 Autonomous Quantum Competitive Learning
Authors: Mohammed A. Zidan, Alaa Sagheer, Nasser Metwally
Abstract:
Real-time learning is an important goal that most of artificial intelligence researches try to achieve it. There are a lot of problems and applications which require low cost learning such as learn a robot to be able to classify and recognize patterns in real time and real-time recall. In this contribution, we suggest a model of quantum competitive learning based on a series of quantum gates and additional operator. The proposed model enables to recognize any incomplete patterns, where we can increase the probability of recognizing the pattern at the expense of the undesired ones. Moreover, these undesired ones could be utilized as new patterns for the system. The proposed model is much better compared with classical approaches and more powerful than the current quantum competitive learning approaches.Keywords: competitive learning, quantum gates, quantum gates, winner-take-all
Procedia PDF Downloads 4721310 Effects of the Ambient Temperature and the Defect Density on the Performance the Solar Cell (HIT)
Authors: Bouzaki Mohammed Moustafa, Benyoucef Boumediene, Benouaz Tayeb, Benhamou Amina
Abstract:
The ambient temperature and the defects density in the Hetero-junction with Intrinsic Thin layers solar cells (HIT) strongly influence their performances. In first part, we presented the bands diagram on the front/back simulated solar cell based on a-Si: H / c-Si (p)/a-Si:h. In another part, we modeled the following layers structure: ZnO/a-Si:H(n)/a-Si:H(i)/c-Si(p)/a-Si:H(p)/Ag where we studied the effect of the ambient temperature and the defects density in the gap of the crystalline silicon layer on the performance of the heterojunction solar cell with intrinsic layer (HIT).Keywords: heterojunction solar cell, solar cell performance, bands diagram, ambient temperature, defect density
Procedia PDF Downloads 5081309 Enhancing Human Security Through Conmprehensive Counter-terrorism Measures
Authors: Alhaji Khuzaima Mohammed Osman, Zaeem Sheikh Abdul Wadudi Haruna
Abstract:
This article aims to explore the crucial link between counter-terrorism efforts and the preservation of human security. As acts of terrorism continue to pose significant threats to societies worldwide, it is imperative to develop effective strategies that mitigate risks while safeguarding the rights and well-being of individuals. This paper discusses key aspects of counter-terrorism and human security, emphasizing the need for a comprehensive approach that integrates intelligence, prevention, response, and resilience-building measures. By highlighting successful case studies and lessons learned, this article provides valuable insights for policymakers, law enforcement agencies, and practitioners in their quest to address terrorism and foster human security.Keywords: human security, risk mitigation, terrorist activities, civil liberties
Procedia PDF Downloads 881308 Engaging with Security and State from a Gendered Lens in the South Asian Context: Indian State’s Construction of Internal Security and State Responses
Authors: Pooja Bakshi
Abstract:
In the following paper, an attempt would be made to engage with the relationship between the state and the imperatives of security from a gendered lens. This will be juxtaposed with the feminist engagement with International Law. Theorizations from the literature on South Asian politics and Global politics would be applied to the manner in which the Indian state has defined and proposed to deal with concerns of internal security pertaining to the ‘Left Wing Extremism’ in 2010-2011. It would be argued that the state needs to be disaggregated into the legislature, executive and the judiciary; since there are times when some institutional parts of the state provide space for progressive democratic engagement whilst other institutions don’t. The specific contours of violence faced by women and children at the hands of the state, in the above-mentioned discourse would also be examined. In the end, implications of the security state discourse on debates in International Law would be elaborated.Keywords: feminist engagement, human rights, state response to left extremism, security studies in South Asia
Procedia PDF Downloads 4941307 Material Selection for Footwear Insole Using Analytical Hierarchal Process
Authors: Mohammed A. Almomani, Dina W. Al-Qudah
Abstract:
Product performance depends on the type and quality of its building material. Successful product must be made using high quality material, and using the right methods. Many foot problems took place as a result of using poor insole material. Therefore, selecting a proper insole material is crucial to eliminate these problems. In this study, the analytical hierarchy process (AHP) is used to provide a systematic procedure for choosing the best material adequate for this application among three material alternatives (polyurethane, poron, and plastzote). Several comparison criteria are used to build the AHP model including: density, stiffness, durability, energy absorption, and ease of fabrication. Poron was selected as the best choice. Inconsistency testing indicates that the model is reasonable, and the materials alternative ranking is effective.Keywords: AHP, footwear insole, insole material, materials selection
Procedia PDF Downloads 3501306 Graphene Materials for Efficient Hybrid Solar Cells: A Spectroscopic Investigation
Authors: Mohammed Khenfouch, Fokotsa V. Molefe, Bakang M. Mothudi
Abstract:
Nowadays, graphene and its composites are universally known as promising materials. They show their potential in a large field of applications including photovoltaics. This study reports on the role of nanohybrids and nanosystems known as strong light harvesters in the efficiency of graphene hybrid solar cells. Our system included Graphene/ZnO/Porphyrin/P3HT layers. Moreover, the physical properties including surface/interface, optical and vibrational properties were also studied. Our investigations confirmed the interaction between the different components as well as the sensitivity of their photonics to the synthesis conditions. Remarkable energy and charge transfer were detected and deeply investigated. Hence, the optimization of the conditions will lead to the fabrication of higher conversion efficiency in graphene solar cells.Keywords: graphene, optoelectronics, nanohybrids, solar cells
Procedia PDF Downloads 1681305 Impact of Graduates’ Quality of Education and Research on ICT Adoption at Workplace
Authors: Mohammed Kafaji
Abstract:
This paper aims to investigate the influence of quality of education and quality of research, provided by local educational institutions, on the adoption of Information and Communication Technology (ICT) in managing business operations for companies in Saudi market. A model was developed and tested using data collected from 138 CEO’s of foreign companies in diverse business sectors. The data is analysed and managed using multivariate approaches through standard statistical packages. The results showed that educational quality has little contribution to the ICT adoption while research quality seems to play a more prominent role. These results are analysed in terms of business environment and market constraints and further extended to the perceived effectiveness of applied pedagogical approaches in schools and universities.Keywords: quality of education, quality of research, mediation, domestic competition, ICT adoption
Procedia PDF Downloads 4561304 Vehicle to Vehicle Communication: Collision Avoidance Scenarios
Authors: Ahmed Emad, Ahmed Salah, Abdelrahman Magdy, Omar Rashid, Mohammed Adel
Abstract:
This research paper discusses vehicle-to-vehicle technology as an important application of linear algebra. This communication technology represents an efficient and promising application to help to ensure the safety of the drivers by warning them when a crash possibility is close. The major link that combines our topic with linear algebra is the Laplacian matrix. Some main definitions used in the V2V were illustrated, such as VANET and its characteristics. The V2V technology could be applied in different applications with different traffic scenarios and various ways to warn car drivers. These scenarios were simulated programs such as MATLAB and Python to test how the V2V system would respond to the different scenarios and warn the car drivers exposed to the threat of collisions.Keywords: V2V communication, vehicle to vehicle scenarios, VANET, FCW, EEBL, IMA, Laplacian matrix
Procedia PDF Downloads 1631303 Knowing Where the Learning is a Shift from Summative to Formative Assessment
Authors: Eric Ho
Abstract:
Pedagogical approaches in Asia nowadays are imported from the West. In Confucian Heritage Culture (CHC), however, there is a dichotomy between the perceived benefits of Western pedagogies and the real classroom practices in Chinese societies. The success of Hong Kong students in large-scale international assessments has proved that both the strengths of both Western pedagogies and CHC educational approaches should be integrated for the sake of the students. University students aim to equip themselves with employability skills upon graduation. Formative assessments allow students to receive detailed, positive, and timely feedback and they can identify their strengths and weaknesses before they start working. However, there remains a question of whether university year 1 students who come from an examination-driven secondary education background are ready to respond to more formative assessments. The findings show that year 1 students are less concerned about competition in the university and more open to new teaching approaches that will allow them to improve as professionals in their major study areas.Keywords: formative assessment, higher education, learning styles, Confucian heritage cultures
Procedia PDF Downloads 3341302 iPSC-derived MSC Mediated Immunosuppression during Mouse Airway Transplantation
Authors: Mohammad Afzal Khan, Fatimah Alanazi, Hala Abdalrahman Ahmed, Talal Shamma, Kilian Kelly, Mohammed A. Hammad, Abdullah O. Alawad, Abdullah Mohammed Assiri, Dieter Clemens Broering
Abstract:
Lung transplantation is a life-saving surgical replacement of diseased lungs in patients with end-stage respiratory malfunctions. Despite the remarkable short-term recovery, long-term lung survival continues to face several significant challenges, including chronic rejection and severe toxic side-effects due to global immunosuppression. Stem cell-based immunotherapy has been recognized as a crucial immunoregulatory regimen in various preclinical and clinical studies. Despite initial therapeutic outcomes, conventional stem cells face key limitations. The Cymerus™ manufacturing facilitates the production of a virtually limitless supply of consistent human induced pluripotent stem cell (iPSC)-derived mesenchymal stem cells, which could play a key role in selective immunosuppression and graft repair during rejection. Here, we demonstrated the impact of iPSC-derived human MSCs on the development of immune-tolerance and long-term graft survival in mouse orthotopic airway allografts. BALB/c→C57BL/6 allografts were reconstituted with iPSC-derived MSCs (2 million/transplant/ at d0), and allografts were examined for regulatory T cells (Tregs), oxygenation, microvascular blood flow, airway epithelium and collagen deposition during rejection. We demonstrated that iPSC-derived MSC treatment leads to significant increase in tissue expression of hTSG-6 protein, followed by an upregulation of mouse Tregs and IL-5, IL-10, IL-15 cytokines, which augments graft microvascular blood flow and oxygenation, and thereby maintained a healthy airway epithelium and prevented the subepithelial deposition of collagen at d90 post-transplantation. Collectively, these data confirmed that iPSC-derived MSC-mediated immunosuppression has potential to establish immune-tolerance and rescue allograft from sustained hypoxic/ischemic phase and subsequently limits long-term airway epithelial injury and collagen progression, which therapeutically warrant a study of Cymerus iPSC-derived MSCs as a potential management option for immunosuppression in transplant recipients.Keywords: stem cell therapy, immunotolerance, regulatory T cells, hypoxia and ischemia, microvasculature
Procedia PDF Downloads 1581301 Secure Transfer of Medical Images Using Hybrid Encryption Authentication, Confidentiality, Integrity
Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad
Abstract:
In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation
Procedia PDF Downloads 5401300 The Environmental Challenges of Energy Generation and Usage in Nigeria
Authors: Aliyu Mohammed Lawal, Dahiru Ya'u Gital
Abstract:
The problems placed on the environment as a result of energy generation and usage in Nigeria are: Potential damage to the environment health by Co, Co2, Sox and Nox effluent gas emissions and global warming. For instance in the year 2004 in Nigeria energy consumption was 58% oil and 34% natural gas but about 94 million metric tons of Co2 was emitted out of which 64% came from fossil fuels while about 35% came from fuel wood. The findings from this research on how to alleviate these problems are that long term sustainable development solutions should be enhanced globally; energy should be used more rationally renewable energy resources should be exploited and the existing emissions should be controlled to tolerate limits because the increase in energy demand in Nigeria places enormous strain on current energy facilities.Keywords: energy generation, environmental health, effluent gas emission, global warming, fossil fuel
Procedia PDF Downloads 4591299 Colonial Body: Historicizing the Becoming of the Kashmiri Body
Authors: Ain ul Khair
Abstract:
In this study, the author situates the formation of the Kashmiri body as colonized in the postcolonial society, on which India continues to execute and maintain colonial practices adopted and replicated from the Western colonial projects. This paper explores the formation of a Kashmiri body as a site of complete dehumanization, which has deliberately been politicized based on its religion, racialized because of its ethnic distinction, and consequently has been subjected to extreme forms of violence. This paper specifically looks at the creation of the Kashmiri colonized body through India’s colonial practices that are in continuity from the Western imperialist colonial projects through the historicization of the careful manufacturing of the Kashmiri colonial body through the lens of the political, legal, geographical, and demographic landscape of India’s colonial project. The paper looks at the framing of the colonial legal framework that informs the construction of the colonized Kashmiri body, drawing violence and religion at the center of it.Keywords: historicization, colonial body, kashmir, india, pakistan, south asia, religion, political identity, politics, Mahmood Mamdani, Ann Stoler, Fanon
Procedia PDF Downloads 401298 A Conjugate Gradient Method for Large Scale Unconstrained Optimization
Authors: Mohammed Belloufi, Rachid Benzine, Badreddine Sellami
Abstract:
Conjugate gradient methods is useful for solving large scale optimization problems in scientific and engineering computation, characterized by the simplicity of their iteration and their low memory requirements. It is well known that the search direction plays a main role in the line search method. In this paper, we propose a search direction with the Wolfe line search technique for solving unconstrained optimization problems. Under the above line searches and some assumptions, the global convergence properties of the given methods are discussed. Numerical results and comparisons with other CG methods are given.Keywords: unconstrained optimization, conjugate gradient method, strong Wolfe line search, global convergence
Procedia PDF Downloads 4221297 Characterization and the Study of Energy Potential of Municipal Solid Waste Disposed in Bauchi Town and Environs
Authors: Aliyu Mohammed Lawal, Dahiru Yau Gital
Abstract:
The characterisation and the energy potential of the municipal solid wastes in Bauchi town and environs were studied. It was found that, 35,000 tonnes of waste was generated annually at 0.19 kg/capital/day of which, the combination of plastics, rubber, polyethene bags constituted about 33%, followed by textile materials, leathers, wood 26%, combination of papers, cartons 19%, crop stalks/grass 11% and the remaining incombustible materials 11%. The heating value or calorific value of the wastes was determined using a digital calorimeter to be 6.43 MJ/kg, almost one-third of the energy content of peat which has a value of 15.9 MJ/kg. The calorific value of the fuel was found to be significant; hence, the waste could be used for energy generation.Keywords: calorific value, characterization, digital calorimeter, incombustible, municipal solid waste
Procedia PDF Downloads 2621296 Using the Internet of Things to Deal with Ventilators for Minimizing the Direct Contact with COVID-19 Patients
Authors: Mohammed Al-Shalabi
Abstract:
In recent years, the Internet of Things (IoT) has become an important technology for connecting various smart objects in many applications, especially in health monitoring applications. The IoT technology develops healthcare applications from traditional to personalized ones by making the treatment and monitoring of patients easier. Nowadays, especially during the COVID-19 pandemic, the necessity of enhancing healthcare monitoring applications to avoid the spreading of this pandemic is increased. In this paper, a mechanism is proposed to minimize direct contact with COVID-19 patients who need ventilators by using IoT technology. The proposed mechanism saves medical providers from COVID-19 infection and then minimizes the spreading of this disease.Keywords: internet of things, healthcare monitoring, COVID-19, ventilators, thingspeak, clouds
Procedia PDF Downloads 1351295 Traditional Medicine and Islamic Holistic Approach in Palliative Care Management of Terminal Illpatient of Cancer
Authors: Mohammed Khalil Ur Rahman, Mohammed Alsharon, Arshad Muktar, Zahid Shaik
Abstract:
Any ailment can go into terminal stages, cancer being one such disease which is many times detected in latent stages. Cancer is often characterized by constitutional symptoms which are agonizing in nature which disturbs patients and their family as well. In order to relieve such intolerable symptoms treatment modality employed is known to be ‘Palliative Care’. The goal of palliative care is to enhance patient’s quality of life by relieving or rather reducing the distressing symptoms of patients such as pain, nausea/ vomiting, anorexia/loss of appetite, excessive salivation, mouth ulcers, weight loss, constipation, oral thrush, emaciation etc. which are due to the effect of disease or due to the undergoing treatment such as chemotherapy, radiation etc. Ayurveda and Unani as well as other traditional medicines is getting more and more international attention in recent years and Ayurveda and Unani holistic perspective of the disease, it seems that there are many herbs and herbomineral preparation which can be employed in the treatment of malignancy and also in palliative care. Though many of them have yet to be scientifically proved as anti-cancerous but there is definitely a positive lead that some of these medications relieve the agonising symptoms thereby making life of the patient easy. Health is viewed in Islam in a holistic way. One of the names of the Quran is al-shifa' meaning ‘that which heals’ or ‘the restorer of health’ to refer to spiritual, intellectual, psychological, and physical health. The general aim of medical science, according to Islam, is to secure and adopt suitable measures which, with Allah’s permission, help to preserve or restore the health of the human body. Islam motivates the Physician to view the patient as one organism. The patient has physical, social, psychological, and spiritual dimensions that must be considered in synthesis with an integrated, holistic approach. Aims & Objectives: - To suggest herbs which are mentioned in Ayurveda Unani with potential palliative activity in case of Cancer patients. - Most of tibb nabawi [Prophetic Medicine] is preventive medicine and must have been divinely inspired. - Spiritual Aspects of Healing: Prayer, dua, recitation of the Quran - Remembrance of Allah play a central role.Materials & Method: Literary review of the herbs supported with experiential evidence will be discussed. Discussion: On the basis of collected data subject will be discussed in length. Conclusion: Will be presented in paper.Keywords: palliative care, holistic, Ayurvedic and Unani traditional system of medicine, Quran, hadith
Procedia PDF Downloads 3391294 Tourism a Ray of Hope to Peace: Case Study of Kashmir
Authors: Khurshid Ahmad Sheikh
Abstract:
This study describes tourism can be a ray of hope to overcome terrorism, especially in places having great tourism potential but could not successfully market their breathtaking beauty and enormous tourism potential because of terrorism threats. It is not so that the area is dangerous, but it does not look attractive. In Asia, regardless of a famous and most important tourist destination, the growth of tourism in Kashmir is stalled by terrorism in the valley. Kashmir has many seasonal tourist destinations like Walur Lake, Pahalgam, Sonamarg, Gulmarg, Dal Lake and other undiscovered virgin tourist destinations, which makes it the preferred tourist destination throughout the year. This research is based on the ideas of the local people who are suffering because of this social evil and have seen changes happen from prosperity to perish. Tourism can be the right adopted measure that brings back life to its virgin origin and makes it a heaven for the rest of the world. Tourism has the power to heal up all the wounds which have been created in this long gap of war and terrorism. In this paper, we will describe the influence of tourism is be the best solution for the harmony and fortune of Kashmir.Keywords: Kashmir, tourism, solution to peace, culture
Procedia PDF Downloads 1231293 Effect of Climate Change on the Genomics of Invasiveness of the Whitefly Bemisia tabaci Species Complex by Estimating the Effective Population Size via a Coalescent Method
Authors: Samia Elfekih, Wee Tek Tay, Karl Gordon, Paul De Barro
Abstract:
Invasive species represent an increasing threat to food biosecurity, causing significant economic losses in agricultural systems. An example is the sweet potato whitefly, Bemisia tabaci, which is a complex of morphologically indistinguishable species causing average annual global damage estimated at US$2.4 billion. The Bemisia complex represents an interesting model for evolutionary studies because of their extensive distribution and potential for invasiveness and population expansion. Within this complex, two species, Middle East-Asia Minor 1 (MEAM1) and Mediterranean (MED) have invaded well beyond their home ranges whereas others, such as Indian Ocean (IO) and Australia (AUS), have not. In order to understand why some Bemisia species have become invasive, genome-wide sequence scans were used to estimate population dynamics over time and relate these to climate. The Bayesian Skyline Plot (BSP) method as implemented in BEAST was used to infer the historical effective population size. In order to overcome sampling bias, the populations were combined based on geographical origin. The datasets used for this particular analysis are genome-wide SNPs (single nucleotide polymorphisms) called separately in each of the following groups: Sub-Saharan Africa (Burkina Faso), Europe (Spain, France, Greece and Croatia), USA (Arizona), Mediterranean-Middle East (Israel, Italy), Middle East-Central Asia (Turkmenistan, Iran) and Reunion Island. The non-invasive ‘AUS’ species endemic to Australia was used as an outgroup. The main findings of this study show that the BSP for the Sub-Saharan African MED population is different from that observed in MED populations from the Mediterranean Basin, suggesting evolution under a different set of environmental conditions. For MED, the effective size of the African (Burkina Faso) population showed a rapid expansion ≈250,000-310,000 years ago (YA), preceded by a period of slower growth. The European MED populations (i.e., Spain, France, Croatia, and Greece) showed a single burst of expansion at ≈160,000-200,000 YA. The MEAM1 populations from Israel and Italy and the ones from Iran and Turkmenistan are similar as they both show the earlier expansion at ≈250,000-300,000 YA. The single IO population lacked the latter expansion but had the earlier one. This pattern is shared with the Sub-Saharan African (Burkina Faso) MED, suggesting IO also faced a similar history of environmental change, which seems plausible given their relatively close geographical distributions. In conclusion, populations within the invasive species MED and MEAM1 exhibited signatures of population expansion lacking in non-invasive species (IO and AUS) during the Pleistocene, a geological epoch marked by repeated climatic oscillations with cycles of glacial and interglacial periods. These expansions strongly suggested the potential of some Bemisia species’ genomes to affect their adaptability and invasiveness.Keywords: whitefly, RADseq, invasive species, SNP, climate change
Procedia PDF Downloads 1261292 India’s Emigration Act: Its Emergence and Changes
Authors: Sudhaveni Naresh
Abstract:
Emigration is not a new phenomenon in India but globalization has reinforced it. India has been a source of emigrants for many countries for a long period. Over 25 million Indian diaspora is spread across the world. Historically, during the British rule indenture labour from India was sent to other colonies. To regulate indentured emigration and to provide a mechanism for emigration, the British India government enacted Emigration Act, 1922. After independence, a majority of unskilled and semi-skilled labour emigrated to Gulf and South-East Asia, whereas white-collar workers preferred North America, Europe and Australia. They are contributing to both the economies in origin and destination. Due to increasing quantum of emigration, the Ministry of Labour enacted Emigration Act, 1983, which deals with the emigration of Indian workers for overseas employment on contractual basis, seeks to safeguard emigrants’ interest and ensures their welfare. The paper explains the reason behind enacting Emigration Act, 1983, and the changes in the form of an Emigration (Amendment) Rules, 2009. This paper examines the current status, effectiveness of the Act and rules.Keywords: economic growth, emigrants, Emigration Act 1983, remittance
Procedia PDF Downloads 336