Search results for: online safety
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5983

Search results for: online safety

2023 A Saltwater Battery Inspired by the Membrane Potential Found in Biological Cells

Authors: Ross Lee, Pritpal Singh, Andrew Jester

Abstract:

As the world transitions to a more sustainable energy economy, the deployment of energy storage technologies is expected to increase to develop a more resilient grid system. However, current technologies are associated with various environmental and safety issues throughout their entire lifecycle; therefore, new battery technology is necessary for grid applications to curtail these risks. Biological cells, such as human neurons and electrolytes in the electric eel, can serve as a more sustainable design template for a new bio-inspired (i.e., biomimetic) battery. Within biological cells, an electrochemical gradient across the cell membrane forms the membrane potential, which serves as the driving force for ion transport into/out of the cell, akin to the charging/discharging of a battery cell. This work serves as the first step to developing such a biomimetic battery cell, starting with the fabrication and characterization of ion-selective membranes to facilitate ion transport through the cell. Performance characteristics (e.g., cell voltage, power density, specific energy, roundtrip efficiency) for the cell under investigation are compared to incumbent battery technologies and biological cells to assess the readiness level for this emerging technology. Using a Na⁺-Form Nafion-117 membrane, the cell in this work successfully demonstrated behavior similar to human neurons; these findings will inform how cell components can be re-engineered to enhance device performance.

Keywords: battery, biomimetic, electrolytes, human neurons, ion-selective membranes, membrane potential

Procedia PDF Downloads 120
2022 Advocating for Those with Limited Mobility

Authors: Dorothy I. Riddle

Abstract:

Limited mobility (or an inability to walk more than 15 meters without sitting down to rest) restricts full community participation for 13 percent of Canadian adults or 4.2 million persons), yet Canadian accessibility standards are silent on distance to be walked as an accessibility barrier to be addressed. Instead, they focus on ensuring access for the wheeled mobility devices used regularly by le The Accessible Canada Act mandates that Canada be barrier free by 2040, which will necessitate eliminating distance to be walked as a barrier in federal programs and services. This paper details the results of a multi-year research project funded by Accessibility Standards Canada to document the lived experience of those struggling with limited mobility and make recommendations regarding how to ensure accessibility for those with limited mobility. Over 2,600 Canadians from across Canada participated in an online survey and follow-up focus groups. The results underscored the importance of providing not only mobility supports in public facilities but also the information necessary for planning access to federal programs and services. As numerous participants indicated, if they weren’t sure how far they would have to walk, they simply stayed home and depended on friends and relatives for help with errands or appointments. This included failing to participate in civic activities, such as voting, for fear of having to walk too far and stand unsupported for too long. Types of information that were deemed critical included whether or not mobility aids were available, where seating to rest was located throughout the facility, what alternatives to standing while waiting for service and having to walk to the service provider (rather than the provider coming to the customer) were available, and diagrams of accessible parking and its relationship to elevators and services.

Keywords: accessibility standards, distance to be walked, limited mobility, mobility aids, service to customer

Procedia PDF Downloads 83
2021 The Cloud Systems Used in Education: Properties and Overview

Authors: Agah Tuğrul Korucu, Handan Atun

Abstract:

Diversity and usefulness of information that used in education are have increased due to development of technology. Web technologies have made enormous contributions to the distance learning system especially. Mobile systems, one of the most widely used technology in distance education, made much easier to access web technologies. Not bounding by space and time, individuals have had the opportunity to access the information on web. In addition to this, the storage of educational information and resources and accessing these information and resources is crucial for both students and teachers. Because of this importance, development and dissemination of web technologies supply ease of access to information and resources are provided by web technologies. Dynamic web technologies introduced as new technologies that enable sharing and reuse of information, resource or applications via the Internet and bring websites into expandable platforms are commonly known as Web 2.0 technologies. Cloud systems are one of the dynamic web technologies that defined as a model provides approaching the demanded information independent from time and space in appropriate circumstances and developed by NIST. One of the most important advantages of cloud systems is meeting the requirements of users directly on the web regardless of hardware, software, and dealing with install. Hence, this study aims at using cloud services in education and investigating the services provided by the cloud computing. Survey method has been used as research method. In the findings of this research the fact that cloud systems are used such studies as resource sharing, collaborative work, assignment submission and feedback, developing project in the field of education, and also, it is revealed that cloud systems have plenty of significant advantages in terms of facilitating teaching activities and the interaction between teacher, student and environment.

Keywords: cloud systems, cloud systems in education, online learning environment, integration of information technologies, e-learning, distance learning

Procedia PDF Downloads 350
2020 Assessment of Microbiological Status of Branded and Street Vended Ice-Cream Offered for Public Consumption: A Comparative Study in Tangail Municipality, Bangladesh

Authors: Afroza Khatun, Masuma, Md. Younus Mia, Kamal Kanta Das

Abstract:

Analysis of the microbial status and physicochemical parameters of some branded and street vended ice cream showed that total viable bacteria in branded ice cream ranged from 4.8×10³ to 1.10×10⁵ cfu/ml, and in street vended ice-cream ranged from 7.5×10⁴ to 1.6×10⁸ cfu/ml. Total coliform bacteria present up to 9.20×10³ cfu/ml in branded ice cream and 5.3×10³ to 9.6×10⁶ cfu/ml observed in street vended ice cream. Total E. coli were found to be present within a range from 0 to 4.5×10³ cfu/ml in branded and 4.1×10² to 7.5×10⁴ cfu/ml in street ice cream. The ranges of Staphylococcus aureus count were 1.8×10² to 2.9×10⁴ cfu/ml (branded) and 3.9×10⁴ to 7.9×10⁶ cfu/ml (street). The pH of both types of ice cream showed acidic to neutral conditions where the concentration of pH for branded ice cream was 5.5 to 6.9, as well as the value of pH in street ice cream, was 6.2 to 7.0. The range of Total soluble solids in several branded ice creams was 26 to 29%, and the value of TSS obtained in street-vended ice-creams ranged from 5 to 10%. The overall results of this research demonstrated that the microbial quality in all street ice creams exceeded the BSTI standard and exhibited lower quality than the industrially produced branded ice creams due to comparatively faulty manufacturing processes and poor hygiene practices. The presence of pathogenic microbes was also observed in branded ice creams which was quite alarming for public health. So it is suggested that the government authorized organization should conduct the proper monitoring system to ensure that both branded and street vended ice-creams are microbiologically safe to prevent public health hazards.

Keywords: food safety, microbiological analysis, physicochemical, ice-cream, E. coli, Staphylococcus aureus

Procedia PDF Downloads 83
2019 Design of a Photovoltaic Power Generation System Based on Artificial Intelligence and Internet of Things

Authors: Wei Hu, Wenguang Chen, Chong Dong

Abstract:

In order to improve the efficiency and safety of photovoltaic power generation devices, this photovoltaic power generation system combines Artificial Intelligence (AI) and the Internet of Things (IoT) to control the chasing photovoltaic power generation device to track the sun to improve power generation efficiency and then convert energy management. The system uses artificial intelligence as the control terminal, the power generation device executive end uses the Linux system, and Exynos4412 is the CPU. The power generating device collects the sun image information through Sony CCD. After several power generating devices feedback the data to the CPU for processing, several CPUs send the data to the artificial intelligence control terminal through the Internet. The control terminal integrates the executive terminal information, time information, and environmental information to decide whether to generate electricity normally and then whether to convert the converted electrical energy into the grid or store it in the battery pack. When the power generation environment is abnormal, the control terminal authorizes the protection strategy, the power generation device executive terminal stops power generation and enters a self-protection posture, and at the same time, the control terminal synchronizes the data with the cloud. At the same time, the system is more intelligent, more adaptive, and longer life.

Keywords: photo-voltaic power generation, the pursuit of light, artificial intelligence, internet of things, photovoltaic array, power management

Procedia PDF Downloads 126
2018 Text Mining of Veterinary Forums for Epidemiological Surveillance Supplementation

Authors: Samuel Munaf, Kevin Swingler, Franz Brülisauer, Anthony O’Hare, George Gunn, Aaron Reeves

Abstract:

Web scraping and text mining are popular computer science methods deployed by public health researchers to augment traditional epidemiological surveillance. However, within veterinary disease surveillance, such techniques are still in the early stages of development and have not yet been fully utilised. This study presents an exploration into the utility of incorporating internet-based data to better understand the smallholder farming communities within Scotland by using online text extraction and the subsequent mining of this data. Web scraping of the livestock fora was conducted in conjunction with text mining of the data in search of common themes, words, and topics found within the text. Results from bi-grams and topic modelling uncover four main topics of interest within the data pertaining to aspects of livestock husbandry: feeding, breeding, slaughter, and disposal. These topics were found amongst both the poultry and pig sub-forums. Topic modeling appears to be a useful method of unsupervised classification regarding this form of data, as it has produced clusters that relate to biosecurity and animal welfare. Internet data can be a very effective tool in aiding traditional veterinary surveillance methods, but the requirement for human validation of said data is crucial. This opens avenues of research via the incorporation of other dynamic social media data, namely Twitter and Facebook/Meta, in addition to time series analysis to highlight temporal patterns.

Keywords: veterinary epidemiology, disease surveillance, infodemiology, infoveillance, smallholding, social media, web scraping, sentiment analysis, geolocation, text mining, NLP

Procedia PDF Downloads 102
2017 Primary and Secondary Psychopathic Traits: Assessing Differences in Interpersonal Relationships through Friendship, Emotional Contagion, and Social Rewards

Authors: Silene Ten Seldam, Kiara Margarita Lu, Melina Nicole Kyranides

Abstract:

Psychopathic traits are marked by a lack of empathy and an inability to maintain meaningful relationships. Yet little research has investigated differences in interpersonal relationships between primary and secondary psychopathic traits. Emotional contagion, the tendency to automatically mimic others’ facial expressions and movements, is a type of empathy contributing to relationship quality. Additionally, the motivating and pleasurable aspects of social interaction, social reward is integral to understanding relationships. Therefore, the current research investigated interpersonal relationships through relationship status, the quality of friendships, the susceptibility to positive (happiness, love) and negative (sadness, fear, anger) emotional contagion, and social reward. Recruited online, 389 participants between 18 and 76 years old (M = 33.61; of which 241 were female) completed self-report questionnaires assessing primary and secondary psychopathic traits, friendship, emotional contagion, and social rewards. Hierarchical multiple regression showed relationship status as a protective factor and that individuals with secondary psychopathic traits are less likely to be in a relationship. This study is the first to investigate emotional contagion with primary and secondary psychopathic traits. Emotional contagion for sadness predicted secondary psychopathic traits. Negative social potency (enjoying being cruel and antagonistic to others) predicted both primary and secondary traits. However, admiration and prosocial interactions only predicted primary psychopathic traits. Findings infer differences in maintaining relationships, regulating emotions, empathising with others through emotional contagion, and motivation to socially engage, perhaps due to each dimensions’distinct origins and manifestations.

Keywords: primary psychopathic traits, secondary psychopathic traits, interpersonal relationships, friendship, emotional contagion, social reward

Procedia PDF Downloads 123
2016 Media Representation of Romanian Migrants in the Italian Media: A Comparative Study

Authors: Paula-Catalina Meirosu

Abstract:

The economic migration (intra-EU) is a topic of debate in the public space in both countries of origin and countries of destination. Since the 1990s, after the collapse of communist regimes and then the accession of some former communist countries to the EU, the migratory flows of migrants (including Romanian migrants) to EU countries has been increased constantly. Italy is one of the main countries of destination among Romanians since at the moment Italy hosts more than one million Romanian migrants. Based on an interdisciplinary analytical framework focused on the theories in the field of transnationalism, media and migration studies and critical media analysis, this paper investigates the media construction of intra-EU economic migration in the Italian press from two main perspectives. The first point of view is the media representation of Romanian migrants in the Italian press in a specific context: the EU elections in 2014. The second one explores the way in which Romanian journalists use the media in the destinations countries (such as Italy) as a source to address the issue of migration. In this context, the paper focuses on online articles related to the Romanian migrants’ representation in the media before and during the EU elections in two newspapers (La Repubblica from Italy and Adevarul from Romania), published during January-May 2014. The methodology is based on a social-constructivist approach, predominantly discursive and includes elements of critical discourse analysis (CDA) to identify the patterns of Romanian migrants in the Italian press as well as strategies for building categories, identities, and roles of migrants. The aim of such an approach is to find out the dynamic of the media discourse on migration from a destination country in the light of a European electoral context (EU elections) and based on the results, to propose scenarios for the elections to be held this year.

Keywords: migration, media discourse, Romanian migrants, transnationalism

Procedia PDF Downloads 136
2015 Factors Affecting the Adoption of Cloud Business Intelligence among Healthcare Sector: A Case Study of Saudi Arabia

Authors: Raed Alsufyani, Hissam Tawfik, Victor Chang, Muthu Ramachandran

Abstract:

This study investigates the factors that influence the decision by players in the healthcare sector to embrace Cloud Business Intelligence Technology with a focus on healthcare organizations in Saudi Arabia. To bring this matter into perspective, this study primarily considers the Technology-Organization-Environment (TOE) framework and the Human Organization-Technology (HOT) fit model. A survey was hypothetically designed based on literature review and was carried out online. Quantitative data obtained was processed from descriptive and one-way frequency statistics to inferential and regression analysis. Data were analysed to establish factors that influence the decision to adopt Cloud Business intelligence technology in the healthcare sector. The implication of the identified factors was measured, and all assumptions were tested. 66.70% of participants in healthcare organization backed the intention to adopt cloud business intelligence system. 99.4% of these participants considered security concerns and privacy risk have been the most significant factors in the adoption of cloud Business Intelligence (CBI) system. Through regression analysis hypothesis testing point that usefulness, service quality, relative advantage, IT infrastructure preparedness, organization structure; vendor support, perceived technical competence, government support, and top management support positively and significantly influence the adoption of (CBI) system. The paper presents quantitative phase that is a part of an on-going project. The project will be based on the consequences learned from this study.

Keywords: cloud computing, business intelligence, HOT-fit model, TOE, healthcare and innovation adoption

Procedia PDF Downloads 172
2014 Ireland to US Food Tourism the Diaspora and the Locale

Authors: Catriona Hilliard

Abstract:

Food identity is synonymous with many national tourism destinations and perceptions in tourist source markets – stereotypes could include snails in France; beer in Britain and Germany; paella in Spain - and is an accepted element of national identity that can be incorporated into tourism experiences. Irish transatlantic food connections are culturally strong with diaspora subsequent generations in the US displaying an online interest in traditional Irish food, even with a twist. Back ‘home’, the value of the local indigenous experience was a specific element of the way The Gathering 2013 was promoted to the Irish diaspora, developing community interest and input to tourism. Over the past 20 years, Ireland has realized the value of its food industry to tourism. This has included the establishment of food development programmes for the hospitality industry; food festivals as a possible element of the tourist experience; and a programmes of food ambassadors to market Irish produce and to encourage service providers to understand; utilize and incorporate this into their offerings. Irish produce is being now actively marketed as part of the proposed tourism experience, to particular segment markets including transatlantic visitors. In addition, individual providers are becoming aware of the value of the market, and how to gain from it. Also, networks of food providers have developed collaborative structures of promoting their experiences to audiences, displaying a cluster approach of tourism development towards that sector. A power point presentation will look at how Irish produce contributes to tourism marketing and promotion of Ireland to America; how that may have assisted sustainable development of communities here; and hopes to elicit some discussion relating to longer term identification of Irish food, as part of tourism, for the potential benefit of the ‘locale’.

Keywords: Irish, USA, food, tourism

Procedia PDF Downloads 392
2013 A Study of Challenges Faced and Support Systems Available for Emirati Student Mothers Post-Childbirth

Authors: Martina Dickson, Lilly Tennant

Abstract:

The young Emirati female university students of today are the first generation of women in the UAE for whom higher education as become not only a possibility, but almost an expectation. Young women in the UAE today make up around 77% of students in higher education institutes in the country. However, the societal expectations placed upon these women in terms of early marriage, child-bearing and rearing are similar to those placed upon their mothers and grandmothers in a time where women were not expected to go to university. A large proportion of female university students in the UAE are mothers of young children, or become mothers whilst at the university. This creates a challenging situation for young student mothers, where two weeks’ maternity leave is typical across institutions. The context of this study is in one such institution in the UAE. We have employed a mixed method approach to gathering interview data from twenty mothers, and survey data from over one hundred mothers. The main findings indicate that mothers have strong desires for their institution to support them more, for example by the provision of nursery facilities and resting areas for new mothers, and giving them greater flexibility over course selections and schedules including the provision of online learning. However, the majority felt supported on a personal level by their tutors. The major challenges which they identified in returning to college after only two weeks’ leave included the inevitable health and lack of sleep issues when caring for a newborn, struggling to catch up with missed college work and handling their course load. We also explored the women's’ home support systems which were provided from a variety of extended family, spouses and paid domestic help.

Keywords: student mothers, challenges, supports, United Arab Emirates

Procedia PDF Downloads 222
2012 Resilient Analysis as an Alternative to Conventional Seismic Analysis Methods for the Maintenance of a Socioeconomical Functionality of Structures

Authors: Sara Muhammad Elqudah, Vigh László Gergely

Abstract:

Catastrophic events, such as earthquakes, are sudden, short, and devastating, threatening lives, demolishing futures, and causing huge economic losses. Current seismic analyses and design standards are based on life safety levels where only some residual strength and stiffness are left in the structure leaving it beyond economical repair. Consequently, it has become necessary to introduce and implement the concept of resilient design. Resilient design is about designing for ductility over time by resisting, absorbing, and recovering from the effects of a hazard in an appropriate and efficient time manner while maintaining the functionality of the structure in the aftermath of the incident. Resilient analysis is mainly based on the fragility, vulnerability, and functionality curves where eventually a resilience index is generated from these curves, and the higher this index is, the better is the performance of the structure. In this paper, seismic performances of a simple two story reinforced concrete building, located in a moderate seismic region, has been evaluated using the conventional seismic analyses methods, which are the linear static analysis, the response spectrum analysis, and the pushover analysis, and the generated results of these analyses methods are compared to those of the resilient analysis. Results highlight that the resilience analysis was the most convenient method in generating a more ductile and functional structure from a socio-economic perspective, in comparison to the standard seismic analysis methods.

Keywords: conventional analysis methods, functionality, resilient analysis, seismic performance

Procedia PDF Downloads 119
2011 Rethinking Urban Green Space Quality and Planning Models from Users and Experts’ Perspective for Sustainable Development: The Case of Debre Berhan and Debre Markos Cities, Ethiopia

Authors: Alemaw Kefale, Aramde Fetene, Hayal Desta

Abstract:

This study analyzed the users' and experts' views on the green space quality and planning models in Debre Berhan (DB) and Debre Markos (DM) cities in Ethiopia. A questionnaire survey was conducted on 350 park users (148 from DB and 202 from DM) to rate the accessibility, size, shape, vegetation cover, social and cultural context, conservation and heritage, community participation, attractiveness, comfort, safety, inclusiveness, and maintenance of green spaces using a Likert scale. A key informant interview was held with 13 experts in DB and 12 in DM. Descriptive statistics and tests of independence of variables using the chi-square test were done. A statistically significant association existed between the perception of green space quality attributes and users' occupation (χ² (160, N = 350) = 224.463, p < 0.001), age (χ² (128, N = 350) = 212.812, p < 0.001), gender (χ² (32, N = 350) = 68.443, p < 0.001), and education level (χ² (192, N = 350) = 293.396, p < 0.001). 61.7 % of park users were unsatisfied with the quality of urban green spaces. The users perceived dense vegetation cover as "good," with a mean value of 3.41, while the remaining were perceived as "medium with a mean value of 2.62 – 3.32". Only quantitative space standards are practiced as a green space planning model, while other models are unfamiliar and never used in either city. Therefore, experts need to be aware of and practice urban green models during urban planning to ensure that new developments include green spaces to accommodate the community's and the environment's needs.

Keywords: urban green space, quality, users and experts, green space planning models, Ethiopia

Procedia PDF Downloads 60
2010 Net Regularity and Its Ethical Implications on Internet Stake Holders

Authors: Nourhan Elshenawi

Abstract:

Net Neutrality (NN) is the principle of treating all online data the same without any prioritization of some over others. A research gap in current scholarship about “violations of NN” and the subsequent ethical concerns paves the way for the following research question: To what extent violations of NN entail ethical concerns and implications for Internet stakeholders? To answer this question, NR is examined using the two major action-based ethical theories, Kantian and Utilitarian, across the relevant Internet stakeholders. First some necessary IT background is provided that shapes how the Internet works and who the key stakeholders are. Following the IT background, the relationship between the stakeholders, users, Internet Service Providers (ISPs) and content providers is discussed and illustrated. Then some violations of NN that are currently occurring is covered, without attracting any attention from the general public from an ethical perspective, as a new term Net Regularity (NR). Afterwards, the current scholarship on NN and its violations are discussed, that are mainly from an economic and sociopolitical perspectives to highlight the lack of ethical discussions on the issue. Before moving on to the ethical analysis however, websites are presented as digital entities that are affected by NR and their happiness is measured using functionalism. The analysis concludes that NR is prone to an unethical treatment of Internet stakeholders in the perspective of both theories. Finally, the current Digital Divide in the world is presented to be able to better illustrate the implications of NR. The implications present the new Internet divide that will take place between individuals within society. Through answering the research question using ethical analysis, it attempts to shed some light on the issue of NR and what kind of society it would lead to. NR would not just lead to a divided society, but divided individuals that are separated by something greater than distance, the Internet.

Keywords: digital divide, digital entities, digital ontology, internet ethics, internet law, net neutrality, internet service providers, websites as beings

Procedia PDF Downloads 276
2009 Resilient Manufacturing in Times of Mass Customisation: Using Augmented Reality to Improve Training and Operating Practices of EV’s Battery Assembly

Authors: Lorena Caires Moreira, Marcos Kauffman

Abstract:

This paper outlines the results of experimental research on deploying an emerging augmented reality (AR) system for real-time task assistance of highly customized and high-risk manual operations. The focus is on operators’ training capabilities and the aim is to test if such technologies can support achieving higher levels of knowledge retention and accuracy of task execution to improve health and safety (H and S) levels. The proposed solution is tested and validated using a real-world case study of electric vehicles’ battery module assembly. The experimental results revealed that the proposed AR method improved the training practices by increasing the knowledge retention levels from 40% to 84% and improved the accuracy of task execution from 20% to 71%, compared to the traditional paper-based method. The results of this research can be used as a demonstration of how emerging technologies are advancing the choice of manual, hybrid, or fully automated processes by promoting the connected worker (Industry 5.0) and supporting manufacturing in becoming more resilient in times of constant market changes.

Keywords: augmented reality, extended reality, connected worker, XR-assisted operator, manual assembly, industry 5.0, smart training, battery assembly

Procedia PDF Downloads 129
2008 A Hybrid Traffic Model for Smoothing Traffic Near Merges

Authors: Shiri Elisheva Decktor, Sharon Hornstein

Abstract:

Highway merges and unmarked junctions are key components in any urban road network, which can act as bottlenecks and create traffic disruption. Inefficient highway merges may trigger traffic instabilities such as stop-and-go waves, pose safety conditions and lead to longer journey times. These phenomena occur spontaneously if the average vehicle density exceeds a certain critical value. This study focuses on modeling the traffic using a microscopic traffic flow model. A hybrid traffic model, which combines human-driven and controlled vehicles is assumed. The controlled vehicles obey different driving policies when approaching the merge, or in the vicinity of other vehicles. We developed a co-simulation model in SUMO (Simulation of Urban Mobility), in which the human-driven cars are modeled using the IDM model, and the controlled cars are modeled using a dedicated controller. The scenario chosen for this study is a closed track with one merge and one exit, which could be later implemented using a scaled infrastructure on our lab setup. This will enable us to benchmark the results of this study obtained in simulation, to comparable results in similar conditions in the lab. The metrics chosen for the comparison of the performance of our algorithm on the overall traffic conditions include the average speed, wait time near the merge, and throughput after the merge, measured under different travel demand conditions (low, medium, and heavy traffic).

Keywords: highway merges, traffic modeling, SUMO, driving policy

Procedia PDF Downloads 108
2007 A Finite Element Based Predictive Stone Lofting Simulation Methodology for Automotive Vehicles

Authors: Gaurav Bisht, Rahul Rathnakumar, Ravikumar Duggirala

Abstract:

Predictive simulations are one of the key focus areas in safety-critical industries such as aerospace and high-performance automotive engineering. The stone-chipping study is one such effort taken up by the industry to predict and evaluate the damage caused due to gravel impact on vehicles. This paper describes a finite elements based method that can simulate the ejection of gravel chips from a vehicle tire. The FE simulations were used to obtain the initial ejection velocity of the stones for various driving conditions using a computational contact mechanics approach. To verify the accuracy of the tire model, several parametric studies were conducted. The FE simulations resulted in stone loft velocities ranging from 0–8 m/s, regardless of tire speed. The stress on the tire at the instant of initial contact with the stone increased linearly with vehicle speed. Mesh convergence studies indicated that a highly resolved tire mesh tends to result in better momentum transfer between the tire and the stone. A fine tire mesh also showed a linearly increasing relationship between the tire forward speed and stone lofting speed, which was not observed in coarser meshes. However, it also highlighted a potential challenge, in that the ejection velocity vector of the stone seemed to be sensitive to the mesh, owing to the FE-based contact mechanical formulation of the problem.

Keywords: abaqus, contact mechanics, foreign object debris, stone chipping

Procedia PDF Downloads 266
2006 The Residual Effects of Special Merchandising Sections on Consumers' Shopping Behavior

Authors: Shih-Ching Wang, Mark Lang

Abstract:

This paper examines the secondary effects and consequences of special displays on subsequent shopping behavior. Special displays are studied as a prominent form of in-store or shopper marketing activity. Two experiments are performed using special value and special quality-oriented displays in an online simulated store environment. The impact of exposure to special displays on mindsets and resulting product choices are tested in a shopping task. Impact on store image is also tested. The experiments find that special displays do trigger shopping mindsets that affect product choices and shopping basket composition and value. There are intended and unintended positive and negative effects found. Special value displays improve store price image but trigger a price sensitive shopping mindset that causes more lower-priced items to be purchased, lowering total basket dollar value. Special natural food displays improve store quality image and trigger a quality-oriented mindset that causes fewer lower-priced items to be purchased, increasing total basket dollar value. These findings extend the theories of product categorization, mind-sets, and price sensitivity found in communication research into the retail store environment. Findings also warn retailers to consider the total effects and consequences of special displays when designing and executing in-store or shopper marketing activity.

Keywords: special displays, mindset, shopping behavior, price consciousness, product categorization, store image

Procedia PDF Downloads 284
2005 Tracing Digital Traces of Phatic Communion in #Mooc

Authors: Judith Enriquez-Gibson

Abstract:

This paper meddles with the notion of phatic communion introduced 90 years ago by Malinowski, who was a Polish-born British anthropologist. It explores the phatic in Twitter within the contents of tweets related to moocs (massive online open courses) as a topic or trend. It is not about moocs though. It is about practices that could easily be hidden or neglected if we let big or massive topics take the lead or if we simply follow the computational or secret codes behind Twitter itself and third party software analytics. It draws from media and cultural studies. Though at first it appears data-driven as I submitted data collection and analytics into the hands of a third party software, Twitonomy, the aim is to follow how phatic communion might be practised in a social media site, such as Twitter. Lurking becomes its research method to analyse mooc-related tweets. A total of 3,000 tweets were collected on 11 October 2013 (UK timezone). The emphasis of lurking is to engage with Twitter as a system of connectivity. One interesting finding is that a click is in fact a phatic practice. A click breaks the silence. A click in one of the mooc website is actually a tweet. A tweet was posted on behalf of a user who simply chose to click without formulating the text and perhaps without knowing that it contains #mooc. Surely, this mechanism is not about reciprocity. To break the silence, users did not use words. They just clicked the ‘tweet button’ on a mooc website. A click performs and maintains connectivity – and Twitter as the medium in attendance in our everyday, available when needed to be of service. In conclusion, the phatic culture of breaking silence in Twitter does not have to submit to the power of code and analytics. It is a matter of human code.

Keywords: click, Twitter, phatic communion, social media data, mooc

Procedia PDF Downloads 414
2004 Examining the Predicting Effect of Mindfulness on Psychological Well-Being among Undergraduate Students

Authors: Piyanee Klainin-Yobas, Debbie Ramirez, Zenaida Fernandez, Jenneth Sarmiento, Wareerat Thanoi, Jeanette Ignacio, Ying Lau

Abstract:

In many countries, university students experience various stressors that may negatively affect their psychological well-being (PWB). Hence, they are at risk for physical and mental problems. This research aimed to examine the predicting effects of mindfulness, self-efficacy, and social support on psychological well-being among undergraduate students. A non-experimental research was conducted at a university in the Philippines. All students enrolled in undergraduate programs were eligible for this study unless they had chronic medical or mental health problems. Power analysis was used to calculate an adequate sample size and a convenience sampling of 630 was recruited. Data were collected through online self-reported questionnaires from year 2013 to 2015. All self-reported scales used in this study had sound psychometric properties. Descriptive statistics, correlational analyses, and structural equation modeling were performed to analyze the research data. Results showed that the participants were mostly Filipino, female, Christian, and in Schools of Nursing. Mindfulness, self-efficacy, support from family, support from friends, and support from significant others were significant predictors of psychological well-being. Mindfulness was the strongest predictor of positive psychological well-being whereas self-efficacy was the strongest predictor of negative psychological well-being. In conclusion, findings from this study add knowledge to the existing literature regarding the predictors of psychological well-being. Psychosocial interventions, with the focus on strengthening mindfulness and self-efficacy, could be delivered to undergraduate students to help them enhance psychological well-being. More studies can be undertaken to test the interventions and multi-centered research can be conducted to enhance generalizability of research findings.

Keywords: mindfulness, self-efficacy, social support, psychological wellbeing

Procedia PDF Downloads 433
2003 The Reduction of Post-Blast Fumes to Improve Productivity and Safety: A Review Paper

Authors: Nhleko Monique Chiloane

Abstract:

The gold mining industry has predominantly used ammonium nitrate fuel oil (ANFO) explosives for decades, although these are known to be “gassier” and their detonation results in toxic fumes, for example, carbon monoxide (CO), nitrogen oxides (NOx) and ammonia. Re-entry into underground workings too soon after blasting can lead to fatal exposure to toxic fumes. It is, therefore, required that the polluted air be removed from the affected areas within a reasonable period before employees' re-entry into the working area. Post-blast re-entry times have therefore been described as a productivity bottleneck. The known causes of post-blast fumes are water ingress, incorrect fuel to oxygen ratio, confinement, explosive additives etc. To prevent or minimize post-blast fumes, some researchers have used neutralization, re-burning technique and non-explosive products or different oxidizing agents. The use of commercial explosives without nitrate oxidizing agents can also minimize the production of blasting fumes and thereby reduce the time needed for the clearance of these fumes to allow workers to re-enter the underground workings safely. The reduction in non-production time directly contributes to an increase in the available time per shift for productive work, thus leading to continuous mining. However, owing to its low cost and ease of use, ANFO is still widely used in South African underground blasting operations.

Keywords: post-blast fumes, continuous mining, ammonium nitrate explosive, non-explosive blasting, re-entry period

Procedia PDF Downloads 184
2002 Comparison between Deterministic and Probabilistic Stability Analysis, Featuring Consequent Risk Assessment

Authors: Isabela Moreira Queiroz

Abstract:

Slope stability analyses are largely carried out by deterministic methods and evaluated through a single security factor. Although it is known that the geotechnical parameters can present great dispersal, such analyses are considered fixed and known. The probabilistic methods, in turn, incorporate the variability of input key parameters (random variables), resulting in a range of values of safety factors, thus enabling the determination of the probability of failure, which is an essential parameter in the calculation of the risk (probability multiplied by the consequence of the event). Among the probabilistic methods, there are three frequently used methods in geotechnical society: FOSM (First-Order, Second-Moment), Rosenblueth (Point Estimates) and Monte Carlo. This paper presents a comparison between the results from deterministic and probabilistic analyses (FOSM method, Monte Carlo and Rosenblueth) applied to a hypothetical slope. The end was held to evaluate the behavior of the slope and consequent risk analysis, which is used to calculate the risk and analyze their mitigation and control solutions. It can be observed that the results obtained by the three probabilistic methods were quite close. It should be noticed that the calculation of the risk makes it possible to list the priority to the implementation of mitigation measures. Therefore, it is recommended to do a good assessment of the geological-geotechnical model incorporating the uncertainty in viability, design, construction, operation and closure by means of risk management. 

Keywords: probabilistic methods, risk assessment, risk management, slope stability

Procedia PDF Downloads 393
2001 Unsafe Abortions in India: Questioning the Propitiousness of MTP Act

Authors: Suresh Sharma, Neeti Goutam

Abstract:

In India abortions are legal and with the exceedingly liberal and broadened law that was passed in 1971, “Medical Termination of Pregnancy Act” had opened a new window to Women’s’ freedom and choice over their fertility. This paper would like to focus on the factors responsible for or leading to unsafe abortion as well as such high incidence of abortion in India which can help in understanding the ways in which we can prevent this apathy. To study the intricacies involved in delivering safety to womanhood in terms of safe abortion practice which includes more trained personnel, detailed explanation and consequences of conducting an abortion, fine reporting, awareness regarding family planning measures and not only pressurizing them to sterilize immediately after an abortion but also prior to that informing them and lastly easy accessibility of Contraceptives with a educated and brief information on that. Data has been drawn from various sources such as National Family Household Survey (1, 2, 3), Health Management Information System and Annual Health Survey. To safeguard the interest of women when it comes to complications resulting from unsafe abortions, Reproductive Health laid its strict adherence to it in its guidelines. The Government could induce more measures in terms of family planning measures and increase in the number of skilled medical health force, chiefly in rural areas to prevent the illegality of abortions. But before that fine reporting on the number of abortions performed will give an insight to this very issue only then policies and programs will work much better in favor of women.

Keywords: abortion, MTP act, India, women

Procedia PDF Downloads 362
2000 Voting Representation in Social Networks Using Rough Set Techniques

Authors: Yasser F. Hassan

Abstract:

Social networking involves use of an online platform or website that enables people to communicate, usually for a social purpose, through a variety of services, most of which are web-based and offer opportunities for people to interact over the internet, e.g. via e-mail and ‘instant messaging’, by analyzing the voting behavior and ratings of judges in a popular comments in social networks. While most of the party literature omits the electorate, this paper presents a model where elites and parties are emergent consequences of the behavior and preferences of voters. The research in artificial intelligence and psychology has provided powerful illustrations of the way in which the emergence of intelligent behavior depends on the development of representational structure. As opposed to the classical voting system (one person – one decision – one vote) a new voting system is designed where agents with opposed preferences are endowed with a given number of votes to freely distribute them among some issues. The paper uses ideas from machine learning, artificial intelligence and soft computing to provide a model of the development of voting system response in a simulated agent. The modeled development process involves (simulated) processes of evolution, learning and representation development. The main value of the model is that it provides an illustration of how simple learning processes may lead to the formation of structure. We employ agent-based computer simulation to demonstrate the formation and interaction of coalitions that arise from individual voter preferences. We are interested in coordinating the local behavior of individual agents to provide an appropriate system-level behavior.

Keywords: voting system, rough sets, multi-agent, social networks, emergence, power indices

Procedia PDF Downloads 395
1999 Infrared Lightbox and iPhone App for Improving Detection Limit of Phosphate Detecting Dip Strips

Authors: H. Heidari-Bafroui, B. Ribeiro, A. Charbaji, C. Anagnostopoulos, M. Faghri

Abstract:

In this paper, we report the development of a portable and inexpensive infrared lightbox for improving the detection limits of paper-based phosphate devices. Commercial paper-based devices utilize the molybdenum blue protocol to detect phosphate in the environment. Although these devices are easy to use and have a long shelf life, their main deficiency is their low sensitivity based on the qualitative results obtained via a color chart. To improve the results, we constructed a compact infrared lightbox that communicates wirelessly with a smartphone. The system measures the absorbance of radiation for the molybdenum blue reaction in the infrared region of the spectrum. It consists of a lightbox illuminated by four infrared light-emitting diodes, an infrared digital camera, a Raspberry Pi microcontroller, a mini-router, and an iPhone to control the microcontroller. An iPhone application was also developed to analyze images captured by the infrared camera in order to quantify phosphate concentrations. Additionally, the app connects to an online data center to present a highly scalable worldwide system for tracking and analyzing field measurements. In this study, the detection limits for two popular commercial devices were improved by a factor of 4 for the Quantofix devices (from 1.3 ppm using visible light to 300 ppb using infrared illumination) and a factor of 6 for the Indigo units (from 9.2 ppm to 1.4 ppm) with repeatability of less than or equal to 1.2% relative standard deviation (RSD). The system also provides more granular concentration information compared to the discrete color chart used by commercial devices and it can be easily adapted for use in other applications.

Keywords: infrared lightbox, paper-based device, phosphate detection, smartphone colorimetric analyzer

Procedia PDF Downloads 125
1998 Using Songs as Direct and Indirect Vehicles of Peace

Authors: Johannes Van Der Sandt

Abstract:

This paper explores and reflects on the power of music, and more specific singing as an instrument for integration, inclusion, group cohesion, collective cooperation, repairing social relationships and facilitating dialogue between groups in conflict. The General Assembly of the United Nations has declared the 21st of September as International Day of Peace. This day is dedicated to advocate and strengthen among all people, an annual day to strive for no violence and cease-fire. What role does music play in strengthening ideals of peace? The findings of this paper is a result of field and online research as well as a literature survey to identify the most important examples of institutions, instruments or initiatives where music serves as a vehicle for the transmission and promoting of peace ideals and acting to assist movements for social change. Important examples where singing and music were used as tools for peace activism are the 1987 Estonian Singing Revolution and the more recent peace engagement in the Afghan Conflict, both very good examples of the cultural capital of the local population used as catalyst for promoting peace. The author offers a concise and relevant overview of such initiatives with the aim to validate the power of music and song as tools to support the United Nation’s Declaration on the Promotion Among Youth of the Ideals of Peace, Mutual Respect and Understanding Between Peoples: Young people should be educated and made aware of the ideals of peace. They should be educated in a spirit of mutual understanding and respect for one another in order to develop an attitude of striving for equal rights for all human beings, believing in economic and social growth for all, together with a belief in disarmament and working towards the maintenance of peace and security worldwide.

Keywords: conflict, music, peace, singing

Procedia PDF Downloads 283
1997 Status and Rights of Rohingya Migrants in Bangladesh: A Critical Analysis

Authors: Md Nur Uddin

Abstract:

The Rohingya people are one of the world's most oppressed and persecuted refugee populations, having been stateless for over six generations and still are. In recent years, more than half-million Rohingya Muslims have fled Myanmar (Burma) for neighboring nations. This article discusses the Status and Rights of Rohingya Migrants in Bangladesh, with a focus on the living conditions of this vulnerable population. A lot of information has been studied about Rohingya refugees states that violence in Rakhine state has sent an estimated 615,500 Rohingya across the border into Bangladesh's Cox's Bazar since August 25, 2017. In Cox's Bazar, a total of 33,131 Rohingya refugees are housed in two registered camps, with an additional 854,024 living in informal settlements nearby. The living conditions of Rohingya refugees in overcrowded camps remain dismal. Mental health is bad, cleanliness is poor, malnutrition is common, and physical and sexual abuse is endemic. A coordinated diplomatic effort involving Bangladesh and Myanmar, as well as international mediators such as the Organization of Islamic Countries and the United Nations, is essential to adequately resolve this complex matter. Bangladeshi officials must ensure the safety of the Rohingyas in the camps and use available humanitarian aid to give the refugees basic amenities such as food, shelter, sanitation, and medical treatment. UNHCR officials should keep an eye on the actual repatriation process to ensure that refugees who have expressed a desire to stay in Bangladesh are not deported against their choice.

Keywords: international refugee laws, united nations, Rohingya, stateless, humanitarian

Procedia PDF Downloads 188
1996 The Challenges of Cloud Computing Adoption in Nigeria

Authors: Chapman Eze Nnadozie

Abstract:

Cloud computing, a technology that is made possible through virtualization within networks represents a shift from the traditional ownership of infrastructure and other resources by distinct organization to a more scalable pattern in which computer resources are rented online to organizations on either as a pay-as-you-use basis or by subscription. In other words, cloud computing entails the renting of computing resources (such as storage space, memory, servers, applications, networks, etc.) by a third party to its clients on a pay-as-go basis. It is a new innovative technology that is globally embraced because of its renowned benefits, profound of which is its cost effectiveness on the part of organizations engaged with its services. In Nigeria, the services are provided either directly to companies mostly by the key IT players such as Microsoft, IBM, and Google; or in partnership with some other players such as Infoware, Descasio, and Sunnet. This action enables organizations to rent IT resources on a pay-as-you-go basis thereby salvaging them from wastages accruable on acquisition and maintenance of IT resources such as ownership of a separate data centre. This paper intends to appraise the challenges of cloud computing adoption in Nigeria, bearing in mind the country’s peculiarities’ in terms of infrastructural development. The methodologies used in this paper include the use of research questionnaires, formulated hypothesis, and the testing of the formulated hypothesis. The major findings of this paper include the fact that there are some addressable challenges to the adoption of cloud computing in Nigeria. Furthermore, the country will gain significantly if the challenges especially in the area of infrastructural development are well addressed. This is because the research established the fact that there are significant gains derivable by the adoption of cloud computing by organizations in Nigeria. However, these challenges can be overturned by concerted efforts in the part of government and other stakeholders.

Keywords: cloud computing, data centre, infrastructure, it resources, virtualization

Procedia PDF Downloads 355
1995 The Role Support Groups Play in Decreasing Depression and PTSD in Cancer Survivors: A Literature Review

Authors: Julianne Macmullen

Abstract:

Due to advances in technology and early detection and treatment of cancer, many cancer patients are surviving longer than five years post-diagnosis. Most cancer patients suffer from depression, anxiety, and post-traumatic stress disorder (PTSD) at some point during diagnosis, treatment, and survivorship. A subgroup of patients will continue to suffer from depression and PTSD and require early intervention. Support groups provide patients with the emotional and informational support they require while also giving survivors a sense of community, friendship, and purpose. This type of support is recognized by researchers to improve the quality of life while also decreasing depression and PTSD symptoms. The gaps in the literature include cultural diversity, minorities, and support groups involving cancer types other than breast cancer. Another gap in the literature includes the perceptions of cancer patients as well as longitudinal studies to determine the relationships between support groups and decreased depression and PTSD rates over time. Future research is required to fill the gaps in the literature mentioned previously. Future research is also needed to analyze the difference in age groups and different types of support groups such as professionally-led, peer-led, and online. Implications for practice involve providers assessing for the symptoms of depression and PTSD in order to offer prompt treatment and support services to those patients. In conclusion, social support by way of support groups improves the quality of life, gives survivors a sense of purpose to help others while also gaining the support they need, and reduces the rate of depressive episodes related to PTSD.

Keywords: cancer survivor, survivorship, post-traumatic stress disorder (PTSD), depression, support groups

Procedia PDF Downloads 179
1994 Cash Management and the Impact of Cashless Policy in a Developing Nation: Nigeria as a Case Study

Authors: Ossai Paulinus Edwin

Abstract:

Cash Management is a broad area having to do with the collection, concentration, and disbursement of cash including measuring the level of liquidity and managing the cash balance and short-Term Investments. Cash Management involves the efficient collection and disbursement of cash and cash equivalents. It also includes management of marketable securities because, in modern Terminology, money comprises marketable securities and actual cash in hand or in a bank. This cash management is concerned with management of cash inflow and cash outflow of a business especially as it concerns a developing nation like Nigeria. The paper throws light on the impact of cashless policy in Nigeria as it was introduced by the Central Bank of Nigeria (CBN) in December 2011 and was kick-started in Lagos in January 2012. Survey research was adopted with the questionnaires as data collection instrument. Responses show that cashless policy if adopted generally shall increase employment opportunities, reduce cash related robbery thereby reducing risk of carrying cash; it shall also reduce cash related corruption and attract more foreign investors to the country. It is expected that the introduction of cashless policy in Nigeria is a step in the right direction as it shall bring about modernization of Nigeria payment system, reduction in the cost of banking services, reduction in high security and safety risk and also curb banking related corruptions.

Keywords: cashless economy, cash management, cashless policy, e-banking, Nigeria

Procedia PDF Downloads 543