Search results for: routine health information system
27831 Causal Modeling of the Glucose-Insulin System in Type-I Diabetic Patients
Authors: J. Fernandez, N. Aguilar, R. Fernandez de Canete, J. C. Ramos-Diaz
Abstract:
In this paper, a simulation model of the glucose-insulin system for a patient undergoing diabetes Type 1 is developed by using a causal modeling approach under system dynamics. The OpenModelica simulation environment has been employed to build the so called causal model, while the glucose-insulin model parameters were adjusted to fit recorded mean data of a diabetic patient database. Model results under different conditions of a three-meal glucose and exogenous insulin ingestion patterns have been obtained. This simulation model can be useful to evaluate glucose-insulin performance in several circumstances, including insulin infusion algorithms in open-loop and decision support systems in closed-loop.Keywords: causal modeling, diabetes, glucose-insulin system, diabetes, causal modeling, OpenModelica software
Procedia PDF Downloads 33027830 The Bloom of 3D Printing in the Health Care Industry
Authors: Mihika Shivkumar, Krishna Kumar, C. Perisamy
Abstract:
3D printing is a method of manufacturing wherein materials, such as plastic or metal, are deposited in layers one on top of the other to produce a three dimensional object. 3D printing is most commonly associated with creating engineering prototypes. However, its applications in the field of human health care have been frequently disregarded. Medical applications for 3D printing are expanding rapidly and are envisaged to revolutionize health care. Medical applications for 3D printing, both present and its potential, can be categorized broadly, including: creation of customized prosthetics tissue and organ fabrication; creation of implants, and anatomical models and pharmaceutical research regarding drug dosage forms. This piece breaks down bioprinting in the healthcare sector. It focuses on the better subtle elements of every particular point, including how 3D printing functions in the present, its impediments, and future applications in the health care sector.Keywords: bio-printing, prototype, drug delivery, organ regeneration
Procedia PDF Downloads 27227829 Geographic Information Systems and a Breath of Opportunities for Supply Chain Management: Results from a Systematic Literature Review
Authors: Anastasia Tsakiridi
Abstract:
Geographic information systems (GIS) have been utilized in numerous spatial problems, such as site research, land suitability, and demographic analysis. Besides, GIS has been applied in scientific fields like geography, health, and economics. In business studies, GIS has been used to provide insights and spatial perspectives in demographic trends, spending indicators, and network analysis. To date, the information regarding the available usages of GIS in supply chain management (SCM) and how these analyses can benefit businesses is limited. A systematic literature review (SLR) of the last 5-year peer-reviewed academic literature was conducted, aiming to explore the existing usages of GIS in SCM. The searches were performed in 3 databases (Web of Science, ProQuest, and Business Source Premier) and reported using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology. The analysis resulted in 79 papers. The results indicate that the existing GIS applications used in SCM were in the following domains: a) network/ transportation analysis (in 53 of the papers), b) location – allocation site search/ selection (multiple-criteria decision analysis) (in 45 papers), c) spatial analysis (demographic or physical) (in 34 papers), d) combination of GIS and supply chain/network optimization tools (in 32 papers), and e) visualization/ monitoring or building information modeling applications (in 8 papers). An additional categorization of the literature was conducted by examining the usage of GIS in the supply chain (SC) by the business sectors, as indicated by the volume of the papers. The results showed that GIS is mainly being applied in the SC of the biomass biofuel/wood industry (33 papers). Other industries that are currently utilizing GIS in their SC were the logistics industry (22 papers), the humanitarian/emergency/health care sector (10 papers), the food/agro-industry sector (5 papers), the petroleum/ coal/ shale gas sector (3 papers), the faecal sludge sector (2 papers), the recycle and product footprint industry (2 papers), and the construction sector (2 papers). The results were also presented by the geography of the included studies and the GIS software used to provide critical business insights and suggestions for future research. The results showed that research case studies of GIS in SCM were conducted in 26 countries (mainly in the USA) and that the most prominent GIS software provider was the Environmental Systems Research Institute’s ArcGIS (in 51 of the papers). This study is a systematic literature review of the usage of GIS in SCM. The results showed that the GIS capabilities could offer substantial benefits in SCM decision-making by providing key insights to cost minimization, supplier selection, facility location, SC network configuration, and asset management. However, as presented in the results, only eight industries/sectors are currently using GIS in their SCM activities. These findings may offer essential tools to SC managers who seek to optimize the SC activities and/or minimize logistic costs and to consultants and business owners that want to make strategic SC decisions. Furthermore, the findings may be of interest to researchers aiming to investigate unexplored research areas where GIS may improve SCM.Keywords: supply chain management, logistics, systematic literature review, GIS
Procedia PDF Downloads 14327828 A Digital Filter for Symmetrical Components Identification
Authors: Khaled M. El-Naggar
Abstract:
This paper presents a fast and efficient technique for monitoring and supervising power system disturbances generated due to dynamic performance of power systems or faults. Monitoring power system quantities involve monitoring fundamental voltage, current magnitudes, and their frequencies as well as their negative and zero sequence components under different operating conditions. The proposed technique is based on simulated annealing optimization technique (SA). The method uses digital set of measurements for the voltage or current waveforms at power system bus to perform the estimation process digitally. The algorithm is tested using different simulated data to monitor the symmetrical components of power system waveforms. Different study cases are considered in this work. Effects of number of samples, sampling frequency and the sample window size are studied. Results are reported and discussed.Keywords: estimation, faults, measurement, symmetrical components
Procedia PDF Downloads 46527827 An Investigation on the Internal Quality Assurance System of Higher Education in Indonesia
Authors: Andi Mursidi
Abstract:
This study aims to investigate why the internal quality assurance system as the basis for the assessment of external quality assurance systems is not well developed at universities in Indonesia. To answer this problem, technical analysis used single instrumental case study with the respondents from ten universities. The findings of this study are the internal quality assurance system that is applied so far (1) only to gain accreditation; and (2) considered as a liability rather than as a necessity to meet the demands of quality standards. It needs strong commitment from internal stakeholders at the college/university to establish internal quality assurance systems that exceed the national standards of higher education. A high quality college/ university will have a good accreditation rank.Keywords: internal stakeholders, internal quality assurance system, commitment, higher education
Procedia PDF Downloads 29027826 Iot Device Cost Effective Storage Architecture and Real-Time Data Analysis/Data Privacy Framework
Authors: Femi Elegbeleye, Omobayo Esan, Muienge Mbodila, Patrick Bowe
Abstract:
This paper focused on cost effective storage architecture using fog and cloud data storage gateway and presented the design of the framework for the data privacy model and data analytics framework on a real-time analysis when using machine learning method. The paper began with the system analysis, system architecture and its component design, as well as the overall system operations. The several results obtained from this study on data privacy model shows that when two or more data privacy model is combined we tend to have a more stronger privacy to our data, and when fog storage gateway have several advantages over using the traditional cloud storage, from our result shows fog has reduced latency/delay, low bandwidth consumption, and energy usage when been compare with cloud storage, therefore, fog storage will help to lessen excessive cost. This paper dwelt more on the system descriptions, the researchers focused on the research design and framework design for the data privacy model, data storage, and real-time analytics. This paper also shows the major system components and their framework specification. And lastly, the overall research system architecture was shown, its structure, and its interrelationships.Keywords: IoT, fog, cloud, data analysis, data privacy
Procedia PDF Downloads 10027825 Diffusion Dynamics of Leech-Heart Inter-Neuron Model
Authors: Arnab Mondal, Sanjeev Kumar Sharma, Ranjit Kumar Upadhyay
Abstract:
We study the spatiotemporal dynamics of a neuronal cable. The processes of one- dimensional (1D) and 2D diffusion are considered for a single variable, which is the membrane voltage, i.e., membrane voltage diffusively interacts for spatiotemporal pattern formalism. The recovery and other variables interact through the membrane voltage. A 3D Leech-Heart (LH) model is introduced to investigate the nonlinear responses of an excitable neuronal cable. The deterministic LH model shows different types of firing properties. We explore the parameter space of the uncoupled LH model and based on the bifurcation diagram, considering v_k2_ashift as a bifurcation parameter, we analyze the 1D diffusion dynamics in three regimes: bursting, regular spiking, and a quiescent state. Depending on parameters, it is shown that the diffusive system may generate regular and irregular bursting or spiking behavior. Further, it is explored a 2D diffusion acting on the membrane voltage, where different types of patterns can be observed. The results show that the LH neurons with different firing characteristics depending on the control parameters participate in a collective behavior of an information processing system that depends on the overall network.Keywords: bifurcation, pattern formation, spatio-temporal dynamics, stability analysis
Procedia PDF Downloads 22327824 Proposed Alternative System for Existing Traffic Signal System
Authors: Alluri Swaroopa, L. V. N. Prasad
Abstract:
Alone with fast urbanization in world, traffic control problem became a big issue in urban construction. Having an efficient and reliable traffic control system is crucial to macro-traffic control. Traffic signal is used to manage conflicting requirement by allocating different sets of mutually compatible traffic movement during distinct time interval. Many approaches have been made proposed to solve this discrete stochastic problem. Recognizing the need to minimize right-of-way impacts while efficiently handling the anticipated high traffic volumes, the proposed alternative system gives effective design. This model allows for increased traffic capacity and reduces delays by eliminating a step in maneuvering through the freeway interchange. The concept proposed in this paper involves construction of bridges and ramps at intersection of four roads to control the vehicular congestion and to prevent traffic breakdown.Keywords: bridges, junctions, ramps, urban traffic control
Procedia PDF Downloads 55427823 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 3327822 Artificial Neural Network in FIRST Robotics Team-Based Prediction System
Authors: Cedric Leong, Parth Desai, Parth Patel
Abstract:
The purpose of this project was to develop a neural network based on qualitative team data to predict alliance scores to determine winners of matches in the FIRST Robotics Competition (FRC). The game for the competition changes every year with different objectives and game objects, however the idea was to create a prediction system which can be reused year by year using some of the statistics that are constant through different games, making our system adaptable to future games as well. Aerial Assist is the FRC game for 2014, and is played in alliances of 3 teams going against one another, namely the Red and Blue alliances. This application takes any 6 teams paired into 2 alliances of 3 teams and generates the prediction for the final score between them.Keywords: artifical neural network, prediction system, qualitative team data, FIRST Robotics Competition (FRC)
Procedia PDF Downloads 51427821 Ocular Complications, Adverse Effects of the Procedure, Side-effects of Medications Used for Graft Survival, and Preventable Vision Loss in Live-related Renal Transplant Recipients: Experience at a Transplant Centre in Pakistan
Authors: Fatema Ali Lanewala, Akhtar Jamal Khan
Abstract:
The ocular complications in renal transplant recipients at the biggest transplant center in Pakistan were seen to be diverse, multiple, and sight-threatening. These complications could mainly be due to the primary disease causing renal failure, the process of transplantation, and/or the medications used pre and post-transplantation. A retrospective case series recently published in the Journal of Pakistan Medical Association highlights the common ocular pathologies encountered in renal transplant population. Majority of the patients suffered from cataract, which is a known side-effect of long-term steroids routinely used for graft survival. There was a unique finding in Pakistani population, never reported before from any other transplant centre world over; a large number of recipients was reported to be suffering from night blindness, which significantly improved on vitamin A supplementation. There were a variety of other ocular complications seen which emphasizes the necessity of ocular care and routine examination of transplant recipient’s eyes by an ophthalmologist in order to avoid visual compromise and improve the quality of life of the transplant recipient.Keywords: cataract, night blindness, ocular complications, renal transplantation
Procedia PDF Downloads 10727820 Potential Enhancement of Arsenic Removal Filter Commonly Used in South Asia: A Review
Authors: Sarthak Karki, Haribansha Timalsina
Abstract:
Kanchan Arsenic Filter is an economical low cost and termed the most efficient arsenic removal filter system in South Asian countries such as Nepal. But when the effluent quality was evaluated, it was seen to possess a lower removal rate of arsenite species. In addition to that, greater pathogenic growth and loss in overall efficacy with time due to precipitation of iron sulphates were the further complications. This brings the health issue on the front line as millions of people rely on groundwater sources for general water necessities. With this paper, we analyzed the mechanisms and changes in the efficiency of the extant filter system when integrated with activated laterite and hair column beds, plus an additional charcoal layer for inhibiting pathogen colonies. Hair column have rich keratin protein that binds with arsenic species, and similarly, raw laterite has huge deposits of iron and aluminum, all of these factors helping to remove heavy metal contaminants from water sources. Further study on the commercialized mass production of the new proposed filter and versatility analysis is required.Keywords: laterite, charcoal, arsenic removal, hair column
Procedia PDF Downloads 8927819 Pediatric Hearing Aid Use: A Study Based on Data Logging Information
Authors: Mina Salamatmanesh, Elizabeth Fitzpatrick, Tim Ramsay, Josee Lagacé, Lindsey Sikora, JoAnne Whittingham
Abstract:
Introduction: Hearing loss (HL) is one of the most common disorders that presents at birth and in early childhood. Universal newborn hearing screening (UNHS) has been adopted based on the assumption that with early identification of HL, children will have access to optimal amplification and intervention at younger ages, therefore, taking advantage of the brain’s maximal plasticity. One particular challenge for parents in the early years is achieving consistent hearing aid (HA) use which is critical to the child’s development and constitutes the first step in the rehabilitation process. This study examined the consistency of hearing aid use in young children based on data logging information documented during audiology sessions in the first three years after hearing aid fitting. Methodology: The first 100 children who were diagnosed with bilateral HL before 72 months of age since 2003 to 2015 in a pediatric audiology clinic and who had at least two hearing aid follow-up sessions with available data logging information were included in the study. Data from each audiology session (age of child at the session, average hours of use per day (for each ear) in the first three years after HA fitting) were collected. Clinical characteristics (degree of hearing loss, age of HA fitting) were also documented to further understanding of factors that impact HA use. Results: Preliminary analysis of the results of the first 20 children shows that all of them (100%) have at least one data logging session recorded in the clinical audiology system (Noah). Of the 20 children, 17(85%) have three data logging events recorded in the first three years after HA fitting. Based on the statistical analysis of the first 20 cases, the median hours of use in the first follow-up session after the hearing aid fitting in the right ear is 3.9 hours with an interquartile range (IQR) of 10.2h. For the left ear the median is 4.4 and the IQR is 9.7h. In the first session 47% of the children use their hearing aids ≤5 hours, 12% use them between 5 to 10 hours and 22% use them ≥10 hours a day. However, these children showed increased use by the third follow-up session with a median (IQR) of 9.1 hours for the right ear and 2.5, and of 8.2 hours for left ear (IQR) IQR is 5.6 By the third follow-up session, 14% of children used hearing aids ≤5 hours, while 38% of children used them ≥10 hours. Based on the primary results, factors like age and level of HL significantly impact the hours of use. Conclusion: The use of data logging information to assess the actual hours of HA provides an opportunity to examine the: a) challenges of families of young children with HAs, b) factors that impact use in very young children. Data logging when used collaboratively with parents, can be a powerful tool to identify problems and to encourage and assist families in maximizing their child’s hearing potential.Keywords: hearing loss, hearing aid, data logging, hours of use
Procedia PDF Downloads 23027818 Care at the Intersection of Biomedicine and Traditional Chinese Medicine: Narratives of Integration, Negotiation, and Provision
Authors: Jessica Ding
Abstract:
The field of global health is currently advocating for a resurgence in the use of traditional medicines to improve people-centered care. Healthcare policies are rapidly changing in response; in China, the increasing presence of TCM in the same spaces as biomedicine has led to a new term: integrative medicine. However, the existence of TCM as a part of integrative medicine creates a pressing paradoxical tension where TCM is both seen as a marginalized system within ‘modern’ hospitals and as a modality worth integrating. Additionally, the impact of such shifts has not been fully explored: the World Health Organization for one focuses only on three angles —practices, products, and practitioners— with regards to traditional medicines. Through ten weeks of fieldwork conducted at an urban hospital in Shanghai, China, this research expands the perspective of existing strategies by looking at integrative care through a fourth lens: patients and families. The understanding of self-care, health-seeking behavior, and non-professional caregiving structures are critical to grasping the significance of traditional medicine for people-centered care. Indeed, those individual and informal health care expectations align with the very spaces and needs that traditional medicine has filled before such ideas of integration. It specifically looks at this issue via three processes that operationalize experiences of care: (1) how aspects of TCM are valued within integrative medicine, (2) how negotiations of care occur between patients and doctors, and (3) how 'good quality' caregiving presents in integrative clinical spaces. This research hopes to lend insight into how culturally embedded traditions, bureaucratic and institutional rationalities, and social patterns of health-seeking behavior influence care to shape illness experiences at the intersection of two medical modalities. This analysis of patients’ clinical and illness experiences serves to enrich the narratives of integrative medical care’s ability to provide patient-centered care to determine how international policies are realized at the individual level. This anthropological study of the integration of Traditional Chinese medicine in local contexts can reveal the extent to which global strategies, as promoted by the WHO and the Chinese government actually align with the expectations and perspectives of patients receiving care. Ultimately, this ethnographic analysis of a local Chinese context hopes to inform global policies regarding the future use and integration of traditional medicines.Keywords: emergent systems, global health, integrative medicine, traditional Chinese medicine, TCM
Procedia PDF Downloads 14327817 Speciation of Bacteria Isolated from Clinical Canine and Feline Urine Samples by Using ChromID CPS Elite Agar: A Preliminary Study
Authors: Delsy Salinas, Andreia Garcês, Augusto Silva, Paula Brilhante Simões
Abstract:
Urinary tract infection (UTI) is a common disease affecting dogs and cats in both community and hospital environment. Bacteria is the most frequent agent isolated, fewer than 1% of infections are due to parasitic, fungal, or viral agents. Common symptoms and laboratory abnormalities includeabdominal pain, pyrexia, renomegaly, and neutrophilia with left shift. A rapid and precise identification of the bacterial agent is still a challenge in veterinarian laboratories. Therefore, this cross-sectional study aims to describe bacterial colony patterns of urine samples by using chromID™ CPS® EliteAgar (BioMérieux, France) from canine and feline specimens submitted to a veterinary laboratory in Portugal (INNO Veterinary Laboratory, Braga)from January to March2022. All urine samples were cultivated in CPS Elite Agar with calibrated 1 µL inoculating loop and incubated at 37ºC for 18-24h. Color,size, and shape (regular or irregular outline)were recorded for all samples. All colonies were classified as Gram-negative or Gram-positive bacteriausing Gram stain (PREVI® Color BioMérieux, France) and determined if they were pure colonies. Identification of bacteria species was performed using GP and GN cards inVitek 2® Compact(BioMérieux, France). A total of 256/1003 submitted urine samples presented bacterial growth, from which 172 isolates were included in this study. The sample’s population included 111 dogs (n=45 males and n=66 females) and 61 cats (n=35 males and n=26 females). The most frequent isolated bacteria wasEscherichia coli (44,7%), followed by Proteus mirabilis (13,4%). All Escherichia coli isolates presented red to burgundy colonies, a colony diameter between 2 to 6 mm, and regular or irregular outlines. Similarly, 100% of Proteus mirabilis isolates were dark yellow colonies with a diffuse pigment and the same size and shape as Escherichia coli. White and pink pale colonies where Staphylococcus species exclusively and S. pseudintermedius was the most frequent (8,2 %). Cian to blue colonies were mostly Enterococcusspp. (8,2%) and Streptococcus spp. (4,6%). Beige to brown colonies were Pseudomonas aeruginosa (2,9%) and Citrobacter spp. (1,2%).Klebsiella spp.,Serratia spp. and Enterobacter spp were green colonies. All Gram-positive isolates were 1 to 2 mm diameter long and had a regular outline, meanwhile, Gram-negative rods presented variable patterns. This results showed that theprevalence of E coli and P. mirabilis as uropathogenic agents follows the same trends in Europe as previously described in other studies. Both agents presented a particular color pattern in CPS Elite Agar to identify them without needing complementary tests. No other bacteria genus could be correlated strongly to a specific color pattern, and similar results have been observed instudies using human’s samples. Chromogenic media shows a great advantage for common urine bacteria isolation than traditional COS, McConkey, and CLEDAgar mediums in a routine context, especially when mixed fermentative Gram-negative agents grow simultaneously. In addition, CPS Elite Agar is versatile for Artificial Intelligent Reading Plates Systems. Routine veterinarian laboratories could use CPS Elite Agar for a rapid screening for bacteria identification,mainlyE coli and P.mirabilis, saving 6h to 10h of automatized identification.Keywords: cats, CPS elite agar, dogs, urine pathogens
Procedia PDF Downloads 10327816 Re-Os Application to Petroleum System: Implications from the Geochronology and Oil-Source Correlation of Duvernay Petroleum System, Western Canadian Sedimentary Basin
Authors: Junjie Liu, David Selby, Mark Obermajer, Andy Mort
Abstract:
The inaugural application of Re-Os dating, which is based on the beta decay of 187Re to 187Os with a long half-life of 41.577 ± 0.12 Byr and initially used for sulphide minerals and organic rich rocks, to petroleum systems was performed on bitumen of the Polaris Mississippi Valley Type Pb-Zn deposit, Canada. To further our understanding of the Re-Os system and its application to petroleum systems, here we present a study on Duvernay Petroleum System, Western Canadian Sedimentary Basin. The Late Devonian Duvernay Formation organic-rich shales are the only source of the petroleum system. The Duvernay shales reached maturation only during the Laramide Orogeny (80 – 35 Ma) and the generated oil migrated short distances into the interfingering Leduc reefs and overlying Nisku carbonates with no or little secondary alteration post oil-generation. Although very low in Re and Os, the asphaltenes of Duvernay-sourced Leduc and Nisku oils define a Laramide Re-Os age. In addition, the initial Os isotope compositions of the oil samples are similar to that of the Os isotope composition of the Duvernay Formation at the time of oil generation, but are very different to other oil-prone intervals of the basin, showing the ability of the Os isotope composition as an inorganic oil-source correlation tool. In summary, the ability of the Re-Os geochronometer to record the timing of oil generation and trace the source of an oil is confirmed in the Re-Os study of Duvernay Petroleum System.Keywords: Duvernay petroleum system, oil generation, oil-source correlation, Re-Os
Procedia PDF Downloads 31127815 Relationship Building Between Peer Support Worker and Person in Recovery in the Community-based One-to-One Peer Support Service of Mental Health Setting
Authors: Yuen Man Yan
Abstract:
Peer support has been a rising prevalent mental health service in the globe. The community-based mental health services employ persons with lived experience of mental illness to be peer support workers (PSWs) to provide peer support service to those who are in the progress of recovery (PIRs). It represents the transformation of mental health service system to a recovery-oriented and person-centered care. Literatures proved the feasibility and effectiveness of the peer support service. Researchers have attempted to explore the unique good qualities of peer support service that benefit the PIRs. Empirical researches found that the strength of the relationship between those who sought for change and the change agents positively related to the outcomes in one-to-one therapies across theoretical orientations. However, there is lack of literature on investigating the relationship building between the PSWs and PIRs in the one-to-one community-based peer support service. This study aims to identify and characterise the relationship in the community-based one-to-one peer support service from the perspectives of PSWs and PIRs; and to conceptualize the components of relationship building between PSWs and PIRs in the community-based one-to-one peer support service. The study adopted the constructivist grounded theory approach. 10 pairs of the PSWs and PIRs participated in the study. Data were collected through multiple qualitative methods, including observation of the interaction and exchange of the PSWs and PIRs in the 1ₛₜ, 3ᵣ𝒹 and 9th sessions of the community-based one-to-one peer support service; and semi-structural interview with the PSWs and PIRs separately after the 3ᵣ𝒹and 9ₜₕ session of the peer support service. This presentation is going to report the preliminary findings of the study. PSWs and PIRs identified their relationship as “life alliance”. Empathy was found to be one of key components of the relationship between the PSWs and the PIRs. Unlike the empathy, as explained by Carl Roger, in which the service provider was able to put themselves into the shoes of the service recipients as if he was the service recipients, the intensity of the empathy was much greater in the relationship between PSWs and PIRs because PSWs had the lived experience of mental illness and recovery. The dimensions of the empathy in the relationship between PSWs and PIRs was found to be multiple, not only related to the mental illness but also related to various aspects in life, like family relationship, employment, interest of life, self-esteem and etc.Keywords: person with lived experience, peer support worker, peer support service, relationship building, therapeutic alliance, community-based mental health setting
Procedia PDF Downloads 7227814 Signal Estimation and Closed Loop System Performance in Atrial Fibrillation Monitoring with Communication Channels
Authors: Mohammad Obeidat, Ayman Mansour
Abstract:
In this paper a unique issue rising from feedback control of Atrial Fibrillation monitoring system with embedded communication channels has been investigated. One of the important factors to measure the performance of the feedback control closed loop system is disturbance and noise attenuation factor. It is important that the feedback system can attenuate such disturbances on the atrial fibrillation heart rate signals. Communication channels depend on network traffic conditions and deliver different throughput, implying that the sampling intervals may change. Since signal estimation is updated on the arrival of new data, its dynamics actually change with the sampling interval. Consequently, interaction among sampling, signal estimation, and the controller will introduce new issues in remotely controlled Atrial Fibrillation system. This paper treats a remotely controlled atrial fibrillation system with one communication channel which connects between the heart rate and rhythm measurements to the remote controller. Typical and optimal signal estimation schemes is represented by a signal averaging filter with its time constant derived from the step size of the signal estimation algorithm.Keywords: atrial fibrillation, communication channels, closed loop, estimation
Procedia PDF Downloads 37827813 Observer-Based Control Design for Double Integrators Systems with Long Sampling Periods and Actuator Uncertainty
Authors: Tomas Menard
Abstract:
The design of control-law for engineering systems has been investigated for many decades. While many results are concerned with continuous systems with continuous output, nowadays, many controlled systems have to transmit their output measurements through network, hence making it discrete-time. But it is well known that the sampling of a system whose control-law is based on the continuous output may render the system unstable, especially when this sampling period is long compared to the system dynamics. The control design then has to be adapted in order to cope with this issue. In this paper, we consider systems which can be modeled as double integrator with uncertainty on the input since many mechanical systems can be put under such form. We present a control scheme based on an observer using only discrete time measurement and which provides continuous time estimation of the state, combined with a continuous control law, which stabilized a system with second-order dynamics even in the presence of uncertainty. It is further shown that arbitrarily long sampling periods can be dealt with properly setting the control scheme parameters.Keywords: dynamical system, control law design, sampled output, observer design
Procedia PDF Downloads 18727812 Impacts of School-Wide Positive Behavioral Interventions and Supports on Student Academics, Behavior and Mental Health
Authors: Catherine Bradshaw
Abstract:
Educators often report difficulty managing behavior problems and other mental health concerns that students display at school. These concerns also interfere with the learning process and can create distraction for teachers and other students. As such, schools play an important role in both preventing and intervening with students who experience these types of challenges. A number of models have been proposed to serve as a framework for delivering prevention and early intervention services in schools. One such model is called Positive Behavioral Interventions and Supports (PBIS), which has been scaled-up to over 26,000 schools in the U.S. and many other countries worldwide. PBIS aims to improve a range of student outcomes through early detection of and intervention related to behavioral and mental health symptoms. PBIS blends and applies social learning, behavioral, and organizational theories to prevent disruptive behavior and enhance the school’s organizational health. PBIS focuses on creating and sustaining tier 1 (universal), tier 2 (selective), and tier 3 (individual) systems of support. Most schools using PBIS have focused on the core elements of the tier 1 supports, which includes the following critical features. The formation of a PBIS team within the school to lead implementation. Identification and training of a behavioral support ‘coach’, who serves as a on-site technical assistance provider. Many of the individuals identified to serve as a PBIS coach are also trained as a school psychologist or guidance counselor; coaches typically have prior PBIS experience and are trained to conduct functional behavioral assessments. The PBIS team also identifies a set of three to five positive behavioral expectations that are implemented for all students and by all staff school-wide (e.g., ‘be respectful, responsible, and ready to learn’); these expectations are posted in all settings across the school, including in the classroom, cafeteria, playground etc. All school staff define and teach the school-wide behavioral expectations to all students and review them regularly. Finally, PBIS schools develop or adopt a school-wide system to reward or reinforce students who demonstrate those 3-5 positive behavioral expectations. Staff and administrators create an agreed upon system for responding to behavioral violations that include definitions about what constitutes a classroom-managed vs. an office-managed discipline problem. Finally, a formal system is developed to collect, analyze, and use disciplinary data (e.g., office discipline referrals) to inform decision-making. This presentation provides a brief overview of PBIS and reports findings from a series of four U.S. based longitudinal randomized controlled trials (RCTs) documenting the impacts of PBIS on school climate, discipline problems, bullying, and academic achievement. The four RCTs include 80 elementary, 40 middle, and 58 high schools and results indicate a broad range of impacts on multiple student and school-wide outcomes. The session will highlight lessons learned regarding PBIS implementation and scale-up. We also review the ways in which PBIS can help educators and school leaders engage in data-based decision-making and share data with other decision-makers and stakeholders (e.g., students, parents, community members), with the overarching goal of increasing use of evidence-based programs in schools.Keywords: positive behavioral interventions and supports, mental health, randomized trials, school-based prevention
Procedia PDF Downloads 23127811 Incorporating Spatial Selection Criteria with Decision-Maker Preferences of A Precast Manufacturing Plant
Authors: M. N. A. Azman, M. S. S. Ahamad
Abstract:
The Construction Industry Development Board of Malaysia has been actively promoting the use of precast manufacturing in the local construction industry over the last decade. In an era of rapid technological changes, precast manufacturing significantly contributes to improving construction activities and ensuring sustainable economic growth. Current studies on the location decision of precast manufacturing plants aimed to enhanced local economic development are scarce. To address this gap, the present research establishes a new set of spatial criteria, such as attribute maps and preference weights, derived from a survey of local industry decision makers. These data represent the input parameters for the MCE-GIS site selection model, for which the weighted linear combination method is used. Verification tests on the model were conducted to determine the potential precast manufacturing sites in the state of Penang, Malaysia. The tests yield a predicted area of 12.87 acres located within a designated industrial zone. Although, the model is developed specifically for precast manufacturing plant but nevertheless it can be employed to other types of industries by following the methodology and guidelines proposed in the present research.Keywords: geographical information system, multi criteria evaluation, industrialised building system, civil engineering
Procedia PDF Downloads 28727810 Electric Propulsion System Development for High Floor Trolley Bus
Authors: Asep Andi Suryandi, Katri Yulianto, Dewi Rianti Mandasari
Abstract:
The development of environmentally friendly vehicles increasingly attracted the attention of almost all countries in the world, including Indonesia. There are various types of environmentally friendly vehicles, such as: electric vehicles, hybrid, and fuel gas. The Electric vehicle has been developed in Indonesia, a private or public vehicle. But many electric vehicles had been developed using the battery as a power source, while the battery technology for electric vehicles still constraints in capacity, dimensions of the battery itself and charging system. Trolley bus is one of the electric buses with the main power source of the network catenary / overhead line with trolley pole as the point of contact. This paper will discuss the design and manufacture electrical system in Trolleybus.Keywords: trolley bus, electric propulsion system, design, manufacture, electric vehicle
Procedia PDF Downloads 35727809 Suitable Tuning Method Selection for PID Controller Used in Digital Excitation System of Brushless Synchronous Generator
Authors: Deepak M. Sajnekar, S. B. Deshpande, R. M. Mohril
Abstract:
At present many rotary excitation control system are using analog type of Automatic Voltage Regulator which now started to replace with the digital automatic voltage regulator which is provided with PID controller and tuning of PID controller is a challenging task. The cases where digital excitation control system is used tuning of PID controller are still carried out by pole placement method. Tuning of PID controller used for static excitation control system is not challenging because it does not involve exciter time constant. This paper discusses two methods of tuning PID controller i.e. Pole placement method and pole zero cancellation method. GUI prepared for both the methods on the platform of MATLAB. Using this GUI, performance results and time required for tuning for both the methods are compared. Sensitivity of the methods is also presented with parameter variation like loop gain ‘K’ and exciter time constant ‘te’.Keywords: digital excitation system, automatic voltage regulator, pole placement method, pole zero cancellation method
Procedia PDF Downloads 67827808 Optimal Design of Multimachine Power System Stabilizers Using Improved Multi-Objective Particle Swarm Optimization Algorithm
Authors: Badr M. Alshammari, T. Guesmi
Abstract:
In this paper, the concept of a non-dominated sorting multi-objective particle swarm optimization with local search (NSPSO-LS) is presented for the optimal design of multimachine power system stabilizers (PSSs). The controller design is formulated as an optimization problem in order to shift the system electromechanical modes in a pre-specified region in the s-plan. A composite set of objective functions comprising the damping factor and the damping ratio of the undamped and lightly damped electromechanical modes is considered. The performance of the proposed optimization algorithm is verified for the 3-machine 9-bus system. Simulation results based on eigenvalue analysis and nonlinear time-domain simulation show the potential and superiority of the NSPSO-LS algorithm in tuning PSSs over a wide range of loading conditions and large disturbance compared to the classic PSO technique and genetic algorithms.Keywords: multi-objective optimization, particle swarm optimization, power system stabilizer, low frequency oscillations
Procedia PDF Downloads 43127807 An Optimal Algorithm for Finding (R, Q) Policy in a Price-Dependent Order Quantity Inventory System with Soft Budget Constraint
Authors: S. Hamid Mirmohammadi, Shahrazad Tamjidzad
Abstract:
This paper is concerned with the single-item continuous review inventory system in which demand is stochastic and discrete. The budget consumed for purchasing the ordered items is not restricted but it incurs extra cost when exceeding specific value. The unit purchasing price depends on the quantity ordered under the all-units discounts cost structure. In many actual systems, the budget as a resource which is occupied by the purchased items is limited and the system is able to confront the resource shortage by charging more costs. Thus, considering the resource shortage costs as a part of system costs, especially when the amount of resource occupied by the purchased item is influenced by quantity discounts, is well motivated by practical concerns. In this paper, an optimization problem is formulated for finding the optimal (R, Q) policy, when the system is influenced by the budget limitation and a discount pricing simultaneously. Properties of the cost function are investigated and then an algorithm based on a one-dimensional search procedure is proposed for finding an optimal (R, Q) policy which minimizes the expected system costs .Keywords: (R, Q) policy, stochastic demand, backorders, limited resource, quantity discounts
Procedia PDF Downloads 64127806 Influence of Non-Carcinogenic Risk on Public Health
Authors: Gulmira Umarova
Abstract:
The data on the assessment of the influence of environmental risk to the health of the population of Uralsk in the West region of Kazakhstan were presented. Calculation of non-carcinogenic risks was performed for such air pollutants as sulfur dioxide, nitrogen oxides, hydrogen sulfide, carbon monoxide. Here with the critical organs and systems, which are affected by the above-mentioned substances were taken into account. As well as indicators of primary and general morbidity by classes of diseases among the population were considered. The quantitative risk of the influence of substances on organs and systems is established by results of the calculation.Keywords: environment, health, morbidity, non-carcinogenic risk
Procedia PDF Downloads 12427805 Reliability Assessment and Failure Detection in a Complex Human-Machine System Using Agent-Based and Human Decision-Making Modeling
Authors: Sanjal Gavande, Thomas Mazzuchi, Shahram Sarkani
Abstract:
In a complex aerospace operational environment, identifying failures in a procedure involving multiple human-machine interactions are difficult. These failures could lead to accidents causing loss of hardware or human life. The likelihood of failure further increases if operational procedures are tested for a novel system with multiple human-machine interfaces and with no prior performance data. The existing approach in the literature of reviewing complex operational tasks in a flowchart or tabular form doesn’t provide any insight into potential system failures due to human decision-making ability. To address these challenges, this research explores an agent-based simulation approach for reliability assessment and fault detection in complex human-machine systems while utilizing a human decision-making model. The simulation will predict the emergent behavior of the system due to the interaction between humans and their decision-making capability with the varying states of the machine and vice-versa. Overall system reliability will be evaluated based on a defined set of success-criteria conditions and the number of recorded failures over an assigned limit of Monte Carlo runs. The study also aims at identifying high-likelihood failure locations for the system. The research concludes that system reliability and failures can be effectively calculated when individual human and machine agent states are clearly defined. This research is limited to the operations phase of a system lifecycle process in an aerospace environment only. Further exploration of the proposed agent-based and human decision-making model will be required to allow for a greater understanding of this topic for application outside of the operations domain.Keywords: agent-based model, complex human-machine system, human decision-making model, system reliability assessment
Procedia PDF Downloads 16927804 Robotics and Embedded Systems Applied to the Buried Pipeline Inspection
Authors: Robson C. Santos, Julio C. P. Ribeiro, Iorran M. de Castro, Luan C. F. Rodrigues, Sandro R. L. Silva, Diego M. Quesada
Abstract:
The work aims to develop a robot in the form of autonomous vehicle to detect, inspection and mapping of underground pipelines through the ATmega328 Arduino platform. Hardware prototyping very similar to C / C ++ language that facilitates its use in robotics open source, resembles PLC used in large industrial processes. The robot will traverse the surface independently of direct human action, in order to automate the process of detecting buried pipes, guided by electromagnetic induction. The induction comes from coils that sends the signal to the Arduino microcontroller contained in that will make the difference in intensity and the treatment of the information, then this determines actions to electrical components such as relays and motors, allowing the prototype to move on the surface and getting the necessary information. The robot was developed by electrical and electronic assemblies that allowed test your application. The assembly is made up of metal detector coils, circuit boards and microprocessor, which interconnected circuits previously developed can determine, process control and mechanical actions for a robot (autonomous car) that will make the detection and mapping of buried pipelines plates.Keywords: robotic, metal detector, embedded system, pipeline inspection
Procedia PDF Downloads 61427803 Fault Diagnosis of Manufacturing Systems Using AntTreeStoch with Parameter Optimization by ACO
Authors: Ouahab Kadri, Leila Hayet Mouss
Abstract:
In this paper, we present three diagnostic modules for complex and dynamic systems. These modules are based on three ant colony algorithms, which are AntTreeStoch, Lumer & Faieta and Binary ant colony. We chose these algorithms for their simplicity and their wide application range. However, we cannot use these algorithms in their basement forms as they have several limitations. To use these algorithms in a diagnostic system, we have proposed three variants. We have tested these algorithms on datasets issued from two industrial systems, which are clinkering system and pasteurization system.Keywords: ant colony algorithms, complex and dynamic systems, diagnosis, classification, optimization
Procedia PDF Downloads 29927802 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan
Authors: Pema Choejey, David Murray, Chun Che Fung
Abstract:
Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.Keywords: awareness and training, cybersecurity policy, risk management, security risks
Procedia PDF Downloads 345