Search results for: distributed workplaces
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2080

Search results for: distributed workplaces

1720 A Two Server Poisson Queue Operating under FCFS Discipline with an ‘m’ Policy

Authors: R. Sivasamy, G. Paulraj, S. Kalaimani, N.Thillaigovindan

Abstract:

For profitable businesses, queues are double-edged swords and hence the pain of long wait times in a queue often frustrates customers. This paper suggests a technical way of reducing the pain of lines through a Poisson M/M1, M2/2 queueing system operated by two heterogeneous servers with an objective of minimising the mean sojourn time of customers served under the queue discipline ‘First Come First Served with an ‘m’ policy, i.e. FCFS-m policy’. Arrivals to the system form a Poisson process of rate λ and are served by two exponential servers. The service times of successive customers at server ‘j’ are independent and identically distributed (i.i.d.) random variables and each of it is exponentially distributed with rate parameter μj (j=1, 2). The primary condition for implementing the queue discipline ‘FCFS-m policy’ on these service rates μj (j=1, 2) is that either (m+1) µ2 > µ1> m µ2 or (m+1) µ1 > µ2> m µ1 must be satisfied. Further waiting customers prefer the server-1 whenever it becomes available for service, and the server-2 should be installed if and only if the queue length exceeds the value ‘m’ as a threshold. Steady-state results on queue length and waiting time distributions have been obtained. A simple way of tracing the optimal service rate μ*2 of the server-2 is illustrated in a specific numerical exercise to equalize the average queue length cost with that of the service cost. Assuming that the server-1 has to dynamically adjust the service rates as μ1 during the system size is strictly less than T=(m+2) while μ2=0, and as μ1 +μ2 where μ2>0 if the system size is more than or equal to T, corresponding steady state results of M/M1+M2/1 queues have been deduced from those of M/M1,M2/2 queues. To conclude this investigation has a viable application, results of M/M1+M2/1 queues have been used in processing of those waiting messages into a single computer node and to measure the power consumption by the node.

Keywords: two heterogeneous servers, M/M1, M2/2 queue, service cost and queue length cost, M/M1+M2/1 queue

Procedia PDF Downloads 343
1719 Chinese Leaders Abroad: Case in the Netherlands

Authors: Li Lin, Hein Roelfsema

Abstract:

To achieve aggressive expansion goals, many Chinese companies are seeking resources and market around the world. To an increasing extent, Chinese enterprises recognized the Netherlands as their gateway to Europe Market. Yet, large cultural gaps (e.g. individualism/collectivism, power distance) may influence expat leaders’ influencing process, in turn affect intercultural teamwork. Lessons and suggestions from Chinese expat leaders could provide profound knowledge for managerial practice and future research. The current research focuses on the cultural difference between China and the Netherlands, along with leadership tactics for coping and handling differences occurring in the international business work. Exclusive 47 in-depth interviews with Chinese expat leaders were conducted. Within each interview, respondents were asked what were the main issues when working with Dutch employees, and what they believed as the keys to successful leadership in Dutch-Chinese cross-cultural workplaces. Consistent with previous research, the findings highlight the need to consider the cultural context within which leadership adapts. In addition, the findings indicated the importance of recognizing and applying the cultural advantages from which leadership originates. The results address observation ability as a crucial key for Chinese managers to lead Dutch/international teams. Moreover, setting a common goal help a leader to overcome the challenges due to cultural differences. Based on the analysis, we develop a process model to illustrate the dynamic mechanisms. Our study contributes to the better understanding of transference of management practices, and has important practical implications for managing Dutch employees.

Keywords: Chinese managers, Dutch employees, leadership, interviews

Procedia PDF Downloads 321
1718 Health and Safety of Red Cross Workers in Long-Term Homes during Early Days of the COVID-19 Pandemic: A Human Performance Perspective

Authors: Douglas J. Kube

Abstract:

At the beginning of the COVID-19 pandemic, the Canadian Red Cross deployed workers into long-term care homes across Canada to support our most vulnerable citizens. It began by recruiting and training small teams of workers to provide non-clinical services for facilities in outbreak. Deployed workers were trained on an approach based on successful Red Cross deployments used with Ebola in which zones were established, levels of protection used, and strict protocols followed to prevent exposure. This paper addresses aspects of human performance through a safety culture lens. The Red Cross deployments highlight valuable insights and are an excellent case study in the principles of human performance and organizational culture. This paper looks at human performance principles, including human fallibility, predictability of error-likely situations, avoiding events by understanding reasons mistakes occur, and the influence on behaviour by organizational factors. This study demonstrates how the Red Cross’s organizational culture and work design positively influenced performance to protect workers and residents/clients. Lastly, this paper shares lessons that can be applied in many workplaces to improve worker health and safety and safety culture. This critical examination is based on the author’s experience as a Senior Occupational Health and Safety Advisor with the Red Cross during the pandemic as part of the team responsible for developing and implementing biological safety practices in long-term care deployments.

Keywords: COVID, human performance, organizational culture, work design

Procedia PDF Downloads 40
1717 Improving Junior Doctor Induction Through the Use of Simple In-House Mobile Application

Authors: Dmitriy Chernov, Maria Karavassilis, Suhyoun Youn, Amna Izhar, Devasenan Devendra

Abstract:

Introduction and Background: A well-structured and comprehensive departmental induction improves patient safety and job satisfaction amongst doctors. The aims of our Project were as follows: 1. Assess the perceived preparedness of junior doctors starting their rotation in Acute Medicine at Watford General Hospital. 2. Develop a supplemental Induction Guide and Pocket reference in the form of an iOS mobile application. 3. To collect feedback after implementing the mobile application following a trial period of 8 weeks with a small cohort of junior doctors. Materials and Methods: A questionnaire was distributed to all new junior trainees starting in the department of Acute Medicine to assess their experience of current induction. A mobile Induction application was developed and trialled over a period of 8 weeks, distributed in addition to the existing didactic induction session. After the trial period, the same questionnaire was distributed to assess improvement in induction experience. Analytics data were collected with users’ consent to gauge user engagement and identify areas of improvement of the application. A feedback survey about the app was also distributed. Results: A total of 32 doctors used the application during the 8-week trial period. The application was accessed 7259 times in total, with the average user spending a cumulative of 37 minutes 22 seconds on the app. The most used section was Clinical Guidelines, accessed 1490 times. The App Feedback survey revealed positive reviews: 100% of participants (n=15/15) responded that the app improved their overall induction experience compared to other placements; 93% (n=14/15) responded that the app improved overall efficiency in completing daily ward jobs compared to previous rotations; and 93% (n=14/15) responded that the app improved patient safety overall. In the Pre-App and Post-App Induction Surveys, participants reported: a 48% improvement in awareness of practical aspects of the job; a 26% improvement of awareness on locating pathways and clinical guidelines; a 40% reduction of feelings of overwhelmingness. Conclusions and recommendations: This study demonstrates the importance of technology in Medical Education and Clinical Induction. The mobile application average engagement time equates to over 20 cumulative hours of on-the-job training delivered to each user, within an 8-week period. The most used and referred to section was clinical guidelines. This shows that there is high demand for an accessible pocket guide for this type of material. This simple mobile application resulted in a significant improvement in feedback about induction in our Department of Acute Medicine, and will likely impact workplace satisfaction. Limitations of the application include: post-app surveys had a small number of participants; the app is currently only available for iPhone users; some useful sections are nested deep within the app, lacks deep search functionality across all sections; lacks real time user feedback; and requires regular review and updates. Future steps for the app include: developing a web app, with an admin dashboard to simplify uploading and editing content; a comprehensive search functionality; and a user feedback and peer ratings system.

Keywords: mobile app, doctor induction, medical education, acute medicine

Procedia PDF Downloads 63
1716 Disrupting Microaggressions in the Academic Workplace: The Role of Bystanders

Authors: Tugba Metinyurt

Abstract:

Microaggressions are small, everyday verbal and behavioral slights that communicate derogatory messages to individuals on the basis of their group membership. They are often unintentional and not intended to do harm, and yet research has shown that their cumulative effect can be quite detrimental. The current pilot study focuses on the role of bystanders disrupting gender microaggressions and potential barriers of challenging them in the academic workplace at University of Massachusetts Lowell (UML). The participants in this study included 9 male and 20 female from faculty of different disciplines at UML. A Barriers to Intervening Questionnaire asks respondents 1) to rate barriers to intervening in situations described in three short vignettes and 2) to identify more general factors that make it more or less likely that UML faculty will intervene in microaggressions as bystanders through response to an open-ended question. Responses to the questionnaire scales that ask about respondents’ own reactions to the vignettes indicated that faculty may hesitate to interrupt gender microaggressions to avoid being perceived as offensive, losing their relationship with their coworkers, and engaging possible arguments. Responses to the open-ended question, which asked more generally about perceived barriers, revealed a few additional barriers; lack of interpersonal and institutional support, repercussion to self, personal orientation/personality, and privilege. Interestingly, participants tended to describe the obstacles presented in the questionnaire as unlikely to prevent them from intervening, yet the same barriers were suggested to be issues for others on the open-ended questions. Limitations and future directions are discussed. The barriers identified in this research can inform efforts to create bystander trainings to interrupt microaggressions in the academic workplaces.

Keywords: academic workplace, bystander behavior, implicit bias, microaggressions

Procedia PDF Downloads 128
1715 Evaluation of Food Safety and Security Practices in Midday Meal Programmes in Rural Areas of Beed District

Authors: Nuzhat Sultana M. B.

Abstract:

Children are high-risk population in terms of food born illnesses. Food safety and security are the most important aspect of the success of midday meal programmes. Improper holding temperatures, cross-contamination and poor personal hygiene of food handlers are the main causes for the prevalence of pathogenic microbes in the food servicing areas. Two hundred and fifty preschool children in the age of 3 to 6 years from urban and rural anganwadies (pre school center) of Beed district were selected. Nutritional status of preschool children were assessed by anthropometrical and clinical measurement. The study assessed the food safety and security with the help of personal hygiene and other safety measures maintained by the food personnel working for midday meal programme, supplying mid meals to children in govt. anganwadies (pre school center). The hygiene level, sanitary condition and microbial quality of food and water, pathological health examination of food handlers were assessed with the help of checklist. A questionnaire was designed to evaluate knowledge, attitude, and practices of food handlers. Results of the study show that the nutritional and health status of rural and urban preschool children was very poor. Many of the food handlers were not aware of general knowledge and hygiene practices to be followed during food preparation areas. An intervention programme of education and importing training at workplaces has shown a positive impact on the outcome of safety and security practices and safe, hygienic practices of food handlers at workplace.

Keywords: food, health, preschool children, safety, security

Procedia PDF Downloads 180
1714 Impact of Adolescent Smoking on the Behaviour, Academic and Health Aspects in Qatar

Authors: Abdelsalam Gomaa, Mahjabeen Ramzan, Tooba Ali Akbar, Huma Nadeem

Abstract:

The use of tobacco and the health risks linked to it are well known in this day and age due to the presence of easily available information through the internet. The media is a powerful platform that is used by many anti-smoking awareness campaigns to reach their target audience; yet, it has been found that adolescents are taking up smoking every passing day. Half of this smoking population of youngsters resides in Asia alone, which includes Qatar, the focus country of this study. As smoking happens to be one of the largest avoidable causes of serious diseases like cancers and heart problems, children are taking up smoking at an alarming rate everywhere including Qatar. Importance of the health of the citizens of Qatar is one of the pillars of the Qatar vision 2030, which is to ensure a healthy population, both physically and mentally. Since the youth makes up a significant percentage of the population and in order to achieve the health objectives of the Qatar vision 2030, it is essential to ensure the health and well-being of this part of the population of the country as they are the future of Qatar. Children, especially boys who tend to be more aggressive by nature, are highly likely to develop behavioral and health issues due to smoking at an early age. Research conducted around the world has also emphasized on this association between the smokers developing a bad behaviour as well as poor social communication skills. However, due to lack of research into this association, very little is known about the extent to which smoking impacts the children’s academics, health and behaviour. Moreover, a study of this nature has not yet been conducted in Qatar previously as most of the studies focus on adult smokers and ways to minimize the number of smoking habits in universities and workplaces. This study solely focuses on identifying a relationship between smoking and its impacts on the adolescents by conducting a research on different schools across Qatar.

Keywords: adolescents, modelling techniques, Qatar, smoking

Procedia PDF Downloads 217
1713 Impact of Economic Globalization on Ecological Footprint in India: Evidenced with Dynamic ARDL Simulations

Authors: Muhammed Ashiq Villanthenkodath, Shreya Pal

Abstract:

Purpose: This study scrutinizes the impact of economic globalization on ecological footprint while endogenizing economic growth and energy consumption from 1990 to 2018 in India. Design/methodology/approach: The standard unit root test has been employed for time series analysis to unveil the integration order. Then, the cointegration was confirmed using autoregressive distributed lag (ARDL) analysis. Further, the study executed the dynamic ARDL simulation model to estimate long-run and short-run results along with simulation and robotic prediction. Findings: The cointegration analysis confirms the existence of a long-run association among variables. Further, economic globalization reduces the ecological footprint in the long run. Similarly, energy consumption decreases the ecological footprint. In contrast, economic growth spurs the ecological footprint in India. Originality/value: This study contributes to the literature in many ways. First, unlike studies that employ CO2 emissions and globalization nexus, this study employs ecological footprint for measuring environmental quality; since it is the broader measure of environmental quality, it can offer a wide range of climate change mitigation policies for India. Second, the study executes a multivariate framework with updated series from 1990 to 2018 in India to explore the link between EF, economic globalization, energy consumption, and economic growth. Third, the dynamic autoregressive distributed lag (ARDL) model has been used to explore the short and long-run association between the series. Finally, to our limited knowledge, this is the first study that uses economic globalization in the EF function of India amid facing a trade-off between sustainable economic growth and the environment in the era of globalization.

Keywords: economic globalization, ecological footprint, India, dynamic ARDL simulation model

Procedia PDF Downloads 98
1712 Reliability Qualification Test Plan Derivation Method for Weibull Distributed Products

Authors: Ping Jiang, Yunyan Xing, Dian Zhang, Bo Guo

Abstract:

The reliability qualification test (RQT) is widely used in product development to qualify whether the product meets predetermined reliability requirements, which are mainly described in terms of reliability indices, for example, MTBF (Mean Time Between Failures). It is widely exercised in product development. In engineering practices, RQT plans are mandatorily referred to standards, such as MIL-STD-781 or GJB899A-2009. But these conventional RQT plans in standards are not preferred, as the test plans often require long test times or have high risks for both producer and consumer due to the fact that the methods in the standards only use the test data of the product itself. And the standards usually assume that the product is exponentially distributed, which is not suitable for a complex product other than electronics. So it is desirable to develop an RQT plan derivation method that safely shortens test time while keeping the two risks under control. To meet this end, for the product whose lifetime follows Weibull distribution, an RQT plan derivation method is developed. The merit of the method is that expert judgment is taken into account. This is implemented by applying the Bayesian method, which translates the expert judgment into prior information on product reliability. Then producer’s risk and the consumer’s risk are calculated accordingly. The procedures to derive RQT plans are also proposed in this paper. As extra information and expert judgment are added to the derivation, the derived test plans have the potential to shorten the required test time and have satisfactory low risks for both producer and consumer, compared with conventional test plans. A case study is provided to prove that when using expert judgment in deriving product test plans, the proposed method is capable of finding ideal test plans that not only reduce the two risks but also shorten the required test time as well.

Keywords: expert judgment, reliability qualification test, test plan derivation, producer’s risk, consumer’s risk

Procedia PDF Downloads 103
1711 Women's Employment Issues in Georgia and Solutions Based on European Experience

Authors: N. Damenia, E. Kharaishvili, N. Sagareishvili, M. Saghareishvili

Abstract:

Women's Employment is one of the most important issues in the global economy. The article discusses the stated topic in Georgia, through historical content, Soviet experience, and modern perspectives. The paper discusses segmentation insa terms of employment and related problems. Based on statistical analysis, women's unemployment rate and its factors are analyzed. The level of employment of women in Transcaucasia (Georgia, Armenia, and Azerbaijan) is discussed and is compared with Baltic countries (Lithuania, Latvia, and Estonia). The study analyzes women’s level of development, according to the average age of marriage and migration level. The focus is on Georgia's Association Agreement with the EU in 2014, which includes economic, social, trade and political issues. One part of it is gender equality at workplaces. According to the research, the average monthly remuneration of women managers in the financial and insurance sector equaled to 1044.6 Georgian Lari, while in overall business sector average monthly remuneration equaled to 961.1 GEL. Average salaries are increasing; however, the employment rate remains problematic. For example, in 2017, 74.6% of men and 50.8% of women were employed from a total workforce. It is also interesting that the proportion of men and women at managerial positions is 29% (women) to 71% (men). Based on the results, the main recommendation for government and civil society is to consider women as a part of the country’s economic development. In this aspect, the experience of developed countries should be considered. It is important to create additional jobs in urban or rural areas and help migrant women return and use their working resources properly.

Keywords: employment of women, segregation in terms of employment, women's employment level in Transcaucasia, migration level

Procedia PDF Downloads 93
1710 Bench-scale Evaluation of Alternative-to-Chlorination Disinfection Technologies for the Treatment of the Maltese Tap-water

Authors: Georgios Psakis, Imren Rahbay, David Spiteri, Jeanice Mallia, Martin Polidano, Vasilis P. Valdramidis

Abstract:

Absence of surface water and progressive groundwater quality deterioration have exacerbated scarcity rapidly, making the Mediterranean island of Malta one of the most water-stressed countries in Europe. Water scarcity challenges have been addressed by reverse osmosis desalination of seawater, 60% of which is blended with groundwater to form the current potable tap-water supply. Chlorination has been the adopted method of water disinfection prior to distribution. However, with the Malteseconsumer chlorine sensory-threshold being as low as 0.34 ppm, presence of chorine residuals and chlorination by-products in the distributed tap-water impacts negatively on its organoleptic attributes, deterring the public from consuming it. As part of the PURILMA initiative, and with the aim of minimizing the impact of chlorine residual on the quality of the distributed water, UV-C, and hydrosonication, have been identified as cost- and energy-effective decontamination alternatives, paving the way for more sustainable water management. Bench-scale assessment of the decontamination efficiency of UV-C (254 nm), revealed 4.7-Log10 inactivation for both Escherichia coli and Enterococcus faecalis at 36 mJ/cm2. At >200 mJ/cm2fluence rates, there was a systematic 2-Log10 difference in the reductions exhibited by E. coli and E. faecalis to suggest that UV-C disinfection was more effective against E. coli. Hybrid treatment schemes involving hydrosonication(at 9.5 and 12.5 dm3/min flow rates with 1-5 MPa maximum pressure) and UV-C showed at least 1.1-fold greater bactericidal activity relative to the individualized UV-C treatments. The observed inactivation appeared to have stemmed from additive effects of the combined treatments, with hydrosonication-generated reactive oxygen species enhancing the biocidal activity of UV-C.

Keywords: disinfection, groundwater, hydrosonication, UV-C

Procedia PDF Downloads 141
1709 Nutritional Wellness at the Workplace

Authors: Siveshnee Devar

Abstract:

Background: The rate of absenteeism and prevalence of NCDs in South Africa is extremely high. This is consistent with other educational institutions and workplaces around the globe. In most cases the absence of health and the presence of one or more non communicable diseases coupled with the lack of physical exercise is a major factor in absenteeism. Absenteeism at the workplace comes at a huge cost to the employer and the country as a whole. Aim: Findings from this study was to develop a suitable nutritional wellness program for the workplace. Methodology: A needs analysis in the form of 24-hour recall, food frequency, health and socio demographic questionnaires was undertaken to determine the need for a wellness program for the institution. Anthropometric indices such as BMI, waist circumference and blood pressure were also undertaken to determine the state of health of the staff. Results: This study has found that obesity, central obesity, hypertension as well as deficiencies in nutrients and minerals were prevalent in this group. Fruit and vegetable consumption was also below the WHO recommendation. This study showed a link between diet, physical activity and diseases of lifestyle. There were positive correlations between age and systolic blood pressure, waist circumference and systolic blood pressure, waist circumference and diastolic blood pressure and waist-to-height ratio and BMI. Conclusion: The results indicated the need for immediate intervention in the form of a wellness program. Nutrition education is important for both the workplace and out. Education and knowledge are important factors for lifestyle changes. The proposed intervention is aimed at improving presenteeism and decreasing the incidence of non- communicable diseases. Presenteeism and good health are important factors for quality education at all educational institutions.

Keywords: absenteeism, non-communicable diseases, nutrition, wellness

Procedia PDF Downloads 553
1708 Power Energy Management For A Grid-Connected PV System Using Rule-Base Fuzzy Logic

Authors: Nousheen Hashmi, Shoab Ahmad Khan

Abstract:

Active collaboration among the green energy sources and the load demand leads to serious issues related to power quality and stability. The growing number of green energy resources and Distributed-Generators need newer strategies to be incorporated for their operations to keep the power energy stability among green energy resources and micro-grid/Utility Grid. This paper presents a novel technique for energy power management in Grid-Connected Photovoltaic with energy storage system under set of constraints including weather conditions, Load Shedding Hours, Peak pricing Hours by using rule-based fuzzy smart grid controller to schedule power coming from multiple Power sources (photovoltaic, grid, battery) under the above set of constraints. The technique fuzzifies all the inputs and establishes fuzzify rule set from fuzzy outputs before defuzzification. Simulations are run for 24 hours period and rule base power scheduler is developed. The proposed fuzzy controller control strategy is able to sense the continuous fluctuations in Photovoltaic power generation, Load Demands, Grid (load Shedding patterns) and Battery State of Charge in order to make correct and quick decisions.The suggested Fuzzy Rule-based scheduler can operate well with vague inputs thus doesn’t not require any exact numerical model and can handle nonlinearity. This technique provides a framework for the extension to handle multiple special cases for optimized working of the system.

Keywords: photovoltaic, power, fuzzy logic, distributed generators, state of charge, load shedding, membership functions

Procedia PDF Downloads 461
1707 Comparison of Blockchain Ecosystem for Identity Management

Authors: K. S. Suganya, R. Nedunchezhian

Abstract:

In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management.

Keywords: blockchain, consensus protocols, bitcoin, identity theft, digital identity management, pandemic, COVID-19, self-sovereign identity

Procedia PDF Downloads 101
1706 Geospatial Curve Fitting Methods for Disease Mapping of Tuberculosis in Eastern Cape Province, South Africa

Authors: Davies Obaromi, Qin Yongsong, James Ndege

Abstract:

To interpolate scattered or regularly distributed data, there are imprecise or exact methods. However, there are some of these methods that could be used for interpolating data in a regular grid and others in an irregular grid. In spatial epidemiology, it is important to examine how a disease prevalence rates are distributed in space, and how they relate with each other within a defined distance and direction. In this study, for the geographic and graphic representation of the disease prevalence, linear and biharmonic spline methods were implemented in MATLAB, and used to identify, localize and compare for smoothing in the distribution patterns of tuberculosis (TB) in Eastern Cape Province. The aim of this study is to produce a more “smooth” graphical disease map for TB prevalence patterns by a 3-D curve fitting techniques, especially the biharmonic splines that can suppress noise easily, by seeking a least-squares fit rather than exact interpolation. The datasets are represented generally as a 3D or XYZ triplets, where X and Y are the spatial coordinates and Z is the variable of interest and in this case, TB counts in the province. This smoothing spline is a method of fitting a smooth curve to a set of noisy observations using a spline function, and it has also become the conventional method for its high precision, simplicity and flexibility. Surface and contour plots are produced for the TB prevalence at the provincial level for 2012 – 2015. From the results, the general outlook of all the fittings showed a systematic pattern in the distribution of TB cases in the province and this is consistent with some spatial statistical analyses carried out in the province. This new method is rarely used in disease mapping applications, but it has a superior advantage to be assessed at subjective locations rather than only on a rectangular grid as seen in most traditional GIS methods of geospatial analyses.

Keywords: linear, biharmonic splines, tuberculosis, South Africa

Procedia PDF Downloads 217
1705 Attitudes of Young Adults with Physical Disabilities towards Occupational Preferences

Authors: Limor Gadot, Orly Sarid

Abstract:

Integration of young adults with disabilities (YAWD) into workplaces provides an opportunity for social and occupational mobility, enabling them to financial independence. To enhance integration, it is important to understand their occupational preferences as well as the factors that influencing it such as demographic variables, self-assessed health, beliefs about work, subjective norms, and self-efficacy. Planned behavior theory was chosen as a basis for this study. A cross-sectional study, based on preliminary sample of 37 YAWD who have been recognized by the National Insurance Institute and are engaged in a year of national service. The finding shows that most of the participants were single (97%) women (60%); average age was 22(+ 2) years, approximately half were secular. Most of the participants had disabilities resulting from CP (96%). Self-assessed health was correlated positively and significantly with behavioral intentions to work in the free market (r = .33, p = .05), and significant negative correlation with behavioral intentions to work in supported settings (r =.-40, p = .01), and sheltered settings (r =-.36, p = .03): individuals who perceived themselves as having more severe disabilities showed a greater tendency to choose a workplace with more rehabilitative inputs. Furthermore, women showed a greater tendency than men to perceive their disability as impairing their future intention to work: t (36) = 2.23, p < .05. Beliefs about work were positively associated with normative beliefs (r = .308, p = .06). The findings indicate that, especially with women, perceptions of health are related to occupational preferences. Moreover, the findings indicate that the relationship between subjective norms about work and normative beliefs about integrating in a workplace that prevail in the individual's environment affects occupational preferences. The contribution of the study lies in the development of new responses and interventions to encourage adults with disabilities to work.

Keywords: young adults, disabilities, work preferences, occupational preferences

Procedia PDF Downloads 237
1704 Lightweight and Seamless Distributed Scheme for the Smart Home

Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro

Abstract:

Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.

Keywords: authentication, key-session, security, wireless sensors

Procedia PDF Downloads 296
1703 Long-Term Modal Changes in International Traffic - Example of the Polish Eastern Border

Authors: Tomasz Komornicki

Abstract:

The possibilities of cross-border traffic depend on the degree of permeability of a given border as well as the state of the existing transport infrastructure. The aim of this paper is to identify the impact of economic transformation, EU accession, and infrastructure development on modal shifts in border traffic through the Polish eastern boundary. In the 1980s railway was still the main mode of cross-border transport in Poland. At the beginning of the 1990s, the role of the road and rail transborder passenger traffic was similar, but since 1993, the role of rail was decreasing. The general decline in rail infrastructure in Poland continued uninterruptedly until accession to the European Union. The slow opposite trend can be observed later as a result of the inflow of European funds. In the countries neighbouring Poland from the east, these processes took place with some delay, and the loss of railway position was not so drastic. Therefore, cross-border railway connections have been maintained for quite a long time since the break-up of the USSR. However, finally, cross-border rail transport proved to be completely inflexible in relation to both economic, geopolitical, and transport transformations. It has been shown that the current modal split of the passenger border traffic was shaped by the following factors: a) closure of many transborder railway lines, especially local ones; b) the signing of an agreement on minor border traffic with Ukraine; c) rapidly growing number of citizens of Ukraine working in Poland (unofficial transportation of workers by car directly to their workplaces in Poland); d) the emergence of low-cost air connections between Ukraine and Poland and the growing role of air transport in the Russia-Poland relationship. The summary points to the possibility of a renewed increase in the importance of rail transport on the eastern border of the European Union.

Keywords: modal change, border, rail transport, Poland

Procedia PDF Downloads 182
1702 Low Overhead Dynamic Channel Selection with Cluster-Based Spatial-Temporal Station Reporting in Wireless Networks

Authors: Zeyad Abdelmageid, Xianbin Wang

Abstract:

Choosing the operational channel for a WLAN access point (AP) in WLAN networks has been a static channel assignment process initiated by the user during the deployment process of the AP, which fails to cope with the dynamic conditions of the assigned channel at the station side afterward. However, the dramatically growing number of Wi-Fi APs and stations operating in the unlicensed band has led to dynamic, distributed, and often severe interference. This highlights the urgent need for the AP to dynamically select the best overall channel of operation for the basic service set (BSS) by considering the distributed and changing channel conditions at all stations. Consequently, dynamic channel selection algorithms which consider feedback from the station side have been developed. Despite the significant performance improvement, existing channel selection algorithms suffer from very high feedback overhead. Feedback latency from the STAs, due to the high overhead, can cause the eventually selected channel to no longer be optimal for operation due to the dynamic sharing nature of the unlicensed band. This has inspired us to develop our own dynamic channel selection algorithm with reduced overhead through the proposed low-overhead, cluster-based station reporting mechanism. The main idea behind the cluster-based station reporting is the observation that STAs which are very close to each other tend to have very similar channel conditions. Instead of requesting each STA to report on every candidate channel while causing high overhead, the AP divides STAs into clusters then assigns each STA in each cluster one channel to report feedback on. With the proper design of the cluster based reporting, the AP does not lose any information about the channel conditions at the station side while reducing feedback overhead. The simulation results show equal performance and, at times, better performance with a fraction of the overhead. We believe that this algorithm has great potential in designing future dynamic channel selection algorithms with low overhead.

Keywords: channel assignment, Wi-Fi networks, clustering, DBSCAN, overhead

Procedia PDF Downloads 91
1701 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates

Procedia PDF Downloads 283
1700 Integrated Risk Management in The Supply Chain of Essential Medicines in Zambia

Authors: Mario M. J. Musonda

Abstract:

Access to health care is a human right, which includes having timely access to affordable and quality essential medicines at the right place and in sufficient quantity. However, inefficient public sector supply chain management contributes to constant shortages of essential medicines at health facilities. Literature review involved a desktop study of published research studies and reports on risk management, supply chain management of essential medicines and their integration to increase the efficiency of the latter. The research was conducted on a sample population of offices under Ministry of Health Headquarters, Lusaka Provincial and District Offices, selected health facilities in Lusaka, Medical Stores Limited, Zambia Medicines Regulatory Authority and Cooperating Partners. Individuals involved in study were selected judgmentally by their functions under selection and quantification, regulation, procurement, storage, distribution, quality assurance, and dispensing of essential medicines. Structured interviews and discussions were held with selected experts and self-administered questionnaires were distributed. Collected and analysed data of 35 returned and usable questionnaires from the 50 distributed. The highest prioritised risks were; inadequate and inconsistent fund disbursements, weak information management systems, weak quality management systems and insufficient resources (HR and infrastructure) among others. The results for this research can be used to increase the efficiency of the public sector supply chain of essential medicines and other pharmaceuticals. The results of the study showed that there is need to implement effective risk management systems by participating institutions and organisations to increase the efficiency of the entire supply chain in order to avoid and/or reduce shortages of essential medicines at health facilities.

Keywords: essential medicine, risk assessment, risk management, supply chain, supply chain risk management

Procedia PDF Downloads 416
1699 A Handheld Light Meter Device for Methamphetamine Detection in Oral Fluid

Authors: Anindita Sen

Abstract:

Oral fluid is a promising diagnostic matrix for drugs of abuse compared to urine and serum. Detection of methamphetamine in oral fluid would pave way for the easy evaluation of impairment in drivers during roadside drug testing as well as ensure safe working environments by facilitating evaluation of impairment in employees at workplaces. A membrane-based point-of-care (POC) friendly pre-treatment technique has been developed which aided elimination of interferences caused by salivary proteins and facilitated the demonstration of methamphetamine detection in saliva using a gold nanoparticle based colorimetric aptasensor platform. It was found that the colorimetric response in saliva was always suppressed owing to the matrix effects. By navigating the challenging interfering issues in saliva, we were successfully able to detect methamphetamine at nanomolar levels in saliva offering immense promise for the translation of these platforms for on-site diagnostic systems. This subsequently motivated the development of a handheld portable light meter device that can reliably transduce the aptasensors colorimetric response into absorbance, facilitating quantitative detection of analyte concentrations on-site. This is crucial due to the prevalent unreliability and sensitivity problems of the conventional drug testing kits. The fabricated light meter device response was validated against a standard UV-Vis spectrometer to confirm reliability. The portable and cost-effective handheld detector device features sensitivity comparable to the well-established UV-Vis benchtop instrument and the easy-to-use device could potentially serve as a prototype for a commercial device in the future.

Keywords: aptasensors, colorimetric gold nanoparticle assay, point-of-care, oral fluid

Procedia PDF Downloads 21
1698 Sexual Harassment at University: Male Students' Perspectives

Authors: Shakila Singh

Abstract:

Sexual harassment continues to be a problem both in educational institutions and workplaces with the main victims being women and the main perpetrators being men. The achievement of quality education demands to create safe learning spaces for all students and requires extensive and integrated interventions. This article draws on the data from a broader study that aims to create safer learning environments at university by addressing gender violence. It attempts to understand male students’ perspectives about their role in sexual harassment on the campus. It is a move away from interventions that place the responsibility of prevention of sexual harassment, on women. The study adopts an interpretive paradigm within a qualitative approach. The sample comprises twenty male university students who were purposively selected because they live in the campus residences. The main data generation methods included focus group discussions and individual interviews. Findings show that while many male students agree that victims of sexual harassment are mainly women, they also suggest that men are victims of sexual harassment by women. Male students have varying understandings of what constitutes sexual harassment. They position themselves as victims who feel harassed by women’s dress and behaviour. Male students also felt under pressure by sexual advances made by women that forced them to comply in order to protect their masculinity. This article argues that social norms of masculinity are powerful drivers of behaviour that play a key role in the perpetuation of sexual harassment. Male students who feel strongly against sexual harassment of female students are constrained by their masculinities in their ability to act against it. Effective interventions need to actively engage students in reflecting on and challenging social and cultural norms that contribute to violent expressions and to develop alternatives with them.

Keywords: gender violence, male students, sexual harassment, university students

Procedia PDF Downloads 178
1697 Phytogeography and Regional Conservation Status of Gymnosperms in Pakistan

Authors: Raees Khan, Mir A. Khan, Sheikh Z. Ul Abidin, Abdul S. Mumtaz

Abstract:

In the present study, phytogeography and conservation status of gymnosperms of Pakistan were investigated. 44 gymnosperms species of 18 genera and 9 families were collected from 66 districts of the country. Among the 44 species, 20 species were native (wild) and 24 species were exotic (cultivated). Ephedra sarocarpa of Ephedraceae was not collected in this study from its distribution area and most probably it may be Nationally Extinct now from this area. Previously in Gymnosperms Flora of Pakistan 34 species was reported. 12 new gymnosperms species were recorded for the first time. Pinus wallichiana (40 districts), Cedrus deodara (39 districts) Pinus roxburghii (36 districts), Picea smithiana (36 districts) and Abies pindrow (34 districts) have the maximum ecological amplitude. Juniperus communis (17districts) and Juniperus excelsa (14 districts) were the widely distributed among the junipers. Ephedra foliata (23 districts), Ephedra gerardiana (20 districts) and Ephedra intermedia (19 districts) has the widest distribution range. Taxus fuana was also wider distribution range and recorded in 19 districts but its population was not very stable. These species was recorded to support local flora and fuana, especially endemics. PCORD version 5 clustered all gymnosperms species into 4 communities and all localities into 5 groups through cluster analyses. The Two Way Cluster Analyses of 66 districts (localities) resulted 4 various plant communities. The Gymnosperms in Pakistan are distributed in 3 floristic regions i.e. Western plains of the country, Northern and Western mountainous regions and Western Himalayas. The assessment of the National conservation status of these species, 10 species were found to be threatened, 6 species were endangered, 4 species were critically endangered and 1 species have become extinct (Ephedra sarcocarpa). The population of some species i.e. Taxus fuana, Ephedra gerardiana, Ephedra monosperma, Picea smithiana and Abies spectabilis is decreasing at an alarming rate.

Keywords: conservation status, gymnosperms, phytogeography, Pakistan

Procedia PDF Downloads 225
1696 Useful Characteristics of Pleurotus Mushroom Hybrids

Authors: Suvalux Chaichuchote, Ratchadaporn Thonghem

Abstract:

Pleurotus mushroom is one of popular edible mushrooms in Thailand. It is much favored by consumers due to its delicious taste and high nutrition. It is commonly used as an ingredient in several dishes. The commercially cultivated strain grown in most farms is the Pleurotus sp., Hed Bhutan, that is widely distributed to mushroom farms throughout the country and can be cultivated almost all year round. However, it demands different cultivated strains from mushroom growers, therefore, the improving mushroom strains should be done to their benefits. In this study, we used a di-mon mating method to hybrid production from Hed Bhutan (P-3) as dikaryon material and monokaryotic mycelium were isolated from basidiospores of other three Pleurotus sp. by single spore isolation. The 3 hybrids: P-3XSA-6, P-3XSB-24 and P-3XSE-5 were recognized from the 12 hybridized successfully. They were appropriate hybridized in terms of fruiting body performance in the three time cycles of cultivation such as the number of days until growing, time for pinning, color and shape of fruiting bodies and yield. For genetic study, genomic DNAs of both Hed Bhutan (P-3) and three hybrids were extracted. A couple of primer ITS1 and ITS4 were used to amplify the gene coding for ITS1, ITS2 and 5.8S rRNA. The similarities between these amplified genes and databases of DNA revealed that Hed Bhutan (P-3) was the Pleurotus pulmonarius as well as P-3XSA-6, P-3XSB-24 and P-3XSE-5 hybrids. Furthermore, Hed Bhutan (P3) and three hybrids were distributed to 3 small-scale farms, with mushroom farming experience, in the countryside. To address this, one hundred and twenty mushroom bags of each strain were supplied to them. The findings, by interview, indicated two mushroom farmers were satisfied with P-3XSA-6 hybrid and P-3XSB-24 hybrid, thanks to their simultaneous fruiting time and good yield. While the other was satisfied with P-3XSB-24 hybrid due to its good yield and P-3XSE-5 hybrids thanks to its gradually fruiting body, benefiting in frequent harvest. Overall, farmers adopted all hybrids to grow as commercially cultivated strains as well as Hed Bhutan (P-3) strain.

Keywords: dikaryon, monokaryon, pleurotus, strain improvement

Procedia PDF Downloads 225
1695 Modeling Socioeconomic and Political Dynamics of Terrorism in Pakistan

Authors: Syed Toqueer, Omer Younus

Abstract:

Terrorism, today, has emerged as a global menace with Pakistan being the most adversely affected state. Therefore, the motive behind this study is to empirically establish the linkage of terrorism with socio-economic (uneven income distribution, poverty and unemployment) and political nexuses so that a policy recommendation can be put forth to better approach this issue in Pakistan. For this purpose, the study employs two competing models, namely, the distributed lag model and OLS, so that findings of the model may be consolidated comprehensively, over the reference period of 1984-2012. The findings of both models are indicative of the fact that uneven income distribution of Pakistan is rather a contributing factor towards terrorism when measured through GDP per capita. This supports the hypothesis that immiserizing modernization theory is applicable for the state of Pakistan where the underprivileged are marginalized. Results also suggest that other socio-economic variables (poverty, unemployment and consumer confidence) can condense the brutality of terrorism once these conditions are catered to and improved. The rational of opportunity cost is at the base of this argument. Poor conditions of employment and poverty reduces the opportunity cost for individuals to be recruited by terrorist organizations as economic returns are considerably low and thus increasing the supply of volunteers and subsequently increasing the intensity of terrorism. The argument of political freedom as a means of lowering terrorism stands true. The more the people are politically repressed the more alternative and illegal means they will find to make their voice heard. Also, the argument that politically transitioning economy faces more terrorism is found applicable for Pakistan. Finally, the study contributes to an ongoing debate on which of the two set of factors are more significant with relation to terrorism by suggesting that socio-economic factors are found to be the primary causes of terrorism for Pakistan.

Keywords: terrorism, socioeconomic conditions, political freedom, distributed lag model, ordinary least square

Procedia PDF Downloads 299
1694 Assessing the Accessibility to Primary Percutaneous Coronary Intervention

Authors: Tzu-Jung Tseng, Pei-Hsuen Han, Tsung-Hsueh Lu

Abstract:

Background: Ensuring patients with ST-elevation myocardial infarction (STEMI) access to hospitals that could perform percutaneous coronary intervention (PCI) in time is an important concern of healthcare managers. One commonly used the method to assess the coverage of population access to PCI hospital is the use GIS-estimated linear distance (crow's fly distance) between the district centroid and the nearest PCI hospital. If the distance is within a given distance (such as 20 km), the entire population of that district is considered to have appropriate access to PCI. The premise of using district centroid to estimate the coverage of population resident in that district is that the people live in the district are evenly distributed. In reality, the population density is not evenly distributed within the administrative district, especially in rural districts. Fortunately, the Taiwan government released basic statistical area (on average 450 population within the area) recently, which provide us an opportunity to estimate the coverage of population access to PCI services more accurate. Objectives: We aimed in this study to compare the population covered by a give PCI hospital according to traditional administrative district versus basic statistical area. We further examined if the differences between two geographic units used would be larger in a rural area than in urban area. Method: We selected two hospitals in Tainan City for this analysis. Hospital A is in urban area, hospital B is in rural area. The population in each traditional administrative district and basic statistical area are obtained from Taiwan National Geographic Information System, Ministry of Internal Affairs. Results: Estimated population live within 20 km of hospital A and B was 1,515,846 and 323,472 according to traditional administrative district and was 1,506,325 and 428,556 according to basic statistical area. Conclusion: In urban area, the estimated access population to PCI services was similar between two geographic units. However, in rural areas, the access population would be overestimated.

Keywords: accessibility, basic statistical area, modifiable areal unit problem (MAUP), percutaneous coronary intervention (PCI)

Procedia PDF Downloads 434
1693 Application of the Critical Decision Method for Monitoring and Improving Safety in the Construction Industry

Authors: Juan Carlos Rubio Romero, Francico Salguero Caparros, Virginia Herrera-Pérez

Abstract:

No one is in the slightest doubt about the high levels of risk involved in work in the construction industry. They are even higher in structural construction work. The Critical Decision Method (CDM) is a semi-structured interview technique that uses cognitive tests to identify the different disturbances that workers have to deal with in their work activity. At present, the vision of safety focused on daily performance and things that go well for safety and health management is facing the new paradigm known as Resilience Engineering. The aim of this study has been to describe the variability in formwork labour on concrete structures in the construction industry and, from there, to find out the resilient attitude of workers to unexpected events that they have experienced during their working lives. For this purpose, a series of semi-structured interviews were carried out with construction employees with extensive experience in formwork labour in Spain by applying the Critical Decision Method. This work has been the first application of the Critical Decision Method in the field of construction and, more specifically, in the execution of structures. The results obtained show that situations categorised as unthought-of are identified to a greater extent than potentially unexpected situations. The identification during these interviews of both expected and unexpected events provides insight into the critical decisions made and actions taken to improve resilience in daily practice in this construction work. From this study, it is clear that it is essential to gain more knowledge about the nature of the human cognitive process in work situations within complex socio-technical systems such as construction sites. This could lead to a more effective design of workplaces in the search for improved human performance.

Keywords: resilience engineering, construction industry, unthought-of situations, critical decision method

Procedia PDF Downloads 130
1692 Efficiency of an Algae-Zinc Complex Compared to Inorganic Zinc Sulfate on Broilers Performance

Authors: R. Boulmane, C. Alleno, D. Marzin

Abstract:

Trace minerals play an essential role in vital processes and are essential to many biological and physiological functions of the animal. They are usually incorporated in the form of inorganic salts such as sulfates and oxides. Most of these inorganic salts are excreted undigested by the animal causing economic losses as well as environmental pollution. In this context, the use of alternative organic trace minerals with higher bioavailability is emerging. This study was set up to evaluate the effect of using an algae-zinc complex in replacement of zinc sulfate in the feed, on growth performance of broiler chickens. One-thousand-two-hundred 1-day-old chicks were randomly distributed to 30 pens, allocated to 1 of 3 groups receiving different diets: the standard diet containing 35ppm of inorganic zinc sulfate (C+), a test diet containing 35ppm of algae-based zinc (T+), and a test diet containing half dose (16ppm) of algae-based zinc (T-). Three different feeds were distributed from D0-D11, D11-D21 and D21-D35. Individual weighing of the animals (D21 and D35), feed consumption (D11, D21 and D35) and pododermatitis occurrence (D35) were monitored. Data were submitted to analysis of variance. Results show that in finishing period the ADWG of the T+ and T- groups are significantly higher than the control C+ (+6%, P = 0.03). On the other hand, the FCR for the total period is lower for both the T+ and T- groups than the control C+ (-1.2%, P = 0.04). Pododermatitis scoring also shows less lesions for the test groups with algae-based zinc compared to the control group receiving inorganic one. In the end, this study shows a positive effect of the algae zinc-complex on growth performance of broilers compared to inorganic zinc, both when using full dose (35 ppm) or half dose (16 ppm). The use of algae-zinc complex in the premix shows to be a good alternative to reduce zinc excretion while maintaining performance.

Keywords: algae-zinc complex, broiler performance, organic trace minerals, zinc sulfate

Procedia PDF Downloads 217
1691 Enhancing Scalability in Ethereum Network Analysis: Methods and Techniques

Authors: Stefan K. Behfar

Abstract:

The rapid growth of the Ethereum network has brought forth the urgent need for scalable analysis methods to handle the increasing volume of blockchain data. In this research, we propose efficient methodologies for making Ethereum network analysis scalable. Our approach leverages a combination of graph-based data representation, probabilistic sampling, and parallel processing techniques to achieve unprecedented scalability while preserving critical network insights. Data Representation: We develop a graph-based data representation that captures the underlying structure of the Ethereum network. Each block transaction is represented as a node in the graph, while the edges signify temporal relationships. This representation ensures efficient querying and traversal of the blockchain data. Probabilistic Sampling: To cope with the vastness of the Ethereum blockchain, we introduce a probabilistic sampling technique. This method strategically selects a representative subset of transactions and blocks, allowing for concise yet statistically significant analysis. The sampling approach maintains the integrity of the network properties while significantly reducing the computational burden. Graph Convolutional Networks (GCNs): We incorporate GCNs to process the graph-based data representation efficiently. The GCN architecture enables the extraction of complex spatial and temporal patterns from the sampled data. This combination of graph representation and GCNs facilitates parallel processing and scalable analysis. Distributed Computing: To further enhance scalability, we adopt distributed computing frameworks such as Apache Hadoop and Apache Spark. By distributing computation across multiple nodes, we achieve a significant reduction in processing time and enhanced memory utilization. Our methodology harnesses the power of parallelism, making it well-suited for large-scale Ethereum network analysis. Evaluation and Results: We extensively evaluate our methodology on real-world Ethereum datasets covering diverse time periods and transaction volumes. The results demonstrate its superior scalability, outperforming traditional analysis methods. Our approach successfully handles the ever-growing Ethereum data, empowering researchers and developers with actionable insights from the blockchain. Case Studies: We apply our methodology to real-world Ethereum use cases, including detecting transaction patterns, analyzing smart contract interactions, and predicting network congestion. The results showcase the accuracy and efficiency of our approach, emphasizing its practical applicability in real-world scenarios. Security and Robustness: To ensure the reliability of our methodology, we conduct thorough security and robustness evaluations. Our approach demonstrates high resilience against adversarial attacks and perturbations, reaffirming its suitability for security-critical blockchain applications. Conclusion: By integrating graph-based data representation, GCNs, probabilistic sampling, and distributed computing, we achieve network scalability without compromising analytical precision. This approach addresses the pressing challenges posed by the expanding Ethereum network, opening new avenues for research and enabling real-time insights into decentralized ecosystems. Our work contributes to the development of scalable blockchain analytics, laying the foundation for sustainable growth and advancement in the domain of blockchain research and application.

Keywords: Ethereum, scalable network, GCN, probabilistic sampling, distributed computing

Procedia PDF Downloads 42