Search results for: phone record analysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 28297

Search results for: phone record analysis

27907 Determination of the Minimum Time and the Optimal Trajectory of a Moving Robot Using Picard's Method

Authors: Abbes Lounis, Kahina Louadj, Mohamed Aidene

Abstract:

This paper presents an optimal control problem applied to a robot; the problem is to determine a command which makes it possible to reach a final state from a given initial state in record time. The approach followed to solve this optimization problem with constraints on the control starts by presenting the equations of motion of the dynamic system then by applying Pontryagin's maximum principle (PMP) to determine the optimal control, and Picard's successive approximation method combined with the shooting method to solve the resulting differential system.

Keywords: robotics, Pontryagin's Maximum Principle, PMP, Picard's method, shooting method, non-linear differential systems

Procedia PDF Downloads 252
27906 Pattern Recognition Search: An Advancement Over Interpolation Search

Authors: Shahpar Yilmaz, Yasir Nadeem, Syed A. Mehdi

Abstract:

Searching for a record in a dataset is always a frequent task for any data structure-related application. Hence, a fast and efficient algorithm for the approach has its importance in yielding the quickest results and enhancing the overall productivity of the company. Interpolation search is one such technique used to search through a sorted set of elements. This paper proposes a new algorithm, an advancement over interpolation search for the application of search over a sorted array. Pattern Recognition Search or PR Search (PRS), like interpolation search, is a pattern-based divide and conquer algorithm whose objective is to reduce the sample size in order to quicken the process and it does so by treating the array as a perfect arithmetic progression series and thereby deducing the key element’s position. We look to highlight some of the key drawbacks of interpolation search, which are accounted for in the Pattern Recognition Search.

Keywords: array, complexity, index, sorting, space, time

Procedia PDF Downloads 236
27905 Predicting the Product Life Cycle of Songs on Radio - How Record Labels Can Manage Product Portfolio and Prioritise Artists by Using Machine Learning Techniques

Authors: Claus N. Holm, Oliver F. Grooss, Robert A. Alphinas

Abstract:

This research strives to predict the remaining product life cycle of a song on radio after it has been played for one or two months. The best results were achieved using a k-d tree to calculate the most similar songs to the test songs and use a Random Forest model to forecast radio plays. An 82.78% and 83.44% accuracy is achieved for the two time periods, respectively. This explorative research leads to over 4500 test metrics to find the best combination of models and pre-processing techniques. Other algorithms tested are KNN, MLP and CNN. The features only consist of daily radio plays and use no musical features.

Keywords: hit song science, product life cycle, machine learning, radio

Procedia PDF Downloads 150
27904 Competing Discourses of Masculinity and Seeking Mental Health Assistance among Male Police Officers in Canada

Authors: Maria T. Cruz, Scott N. Thompson

Abstract:

In recent years, Canadian federal and provincial law enforcement organizations have implemented numerous mental health strategies in an attempt to address officers’ mental health and wellness needs. Despite these reforms, however, mental illness continues to persist in these populations. Whereas workplace stressors continue to be factored into the development of mental health initiatives, it is proposed that aspects of masculine culture have been overlooked as contributing to the prevalence of mental illness among Canadian officers. By drawing on Michel Foucault’s theory of discourse, this study was conducted to determine if elements of masculine discourse exist as a socio-cultural barrier for officers seeking mental health assistance. This research supported the above hypothesis, and furthermore, identified how masculine discourse works in competition with mental health-related help-seeking discourses. To answer the research question, semi-structured phone interviews with active and retired male officers from Western provincial and municipal policing organizations, and the Royal Canadian Mounted Police were employed. Through thematic analysis of the transcripts, the data revealed three themes: i) masculinity in law enforcement is a determinant of workplace competency; ii) the dominance of masculine culture in law enforcement is problematic for mental health, and iii) improved help-seeking policies complicate how masculinity is expressed in law enforcement organizations. These findings suggest that within the reviewed Canadian law enforcement organizations, aspects of masculinity act as a socio-cultural barrier to officers seeking mental health services, and that the two conflicting discourses of masculinity and mental health-related help-seeking appear to be in competition with each other.

Keywords: competing discourses, dominant discourses, Foucault’s theory of discourse, law enforcement, masculinity, mental health, police officers

Procedia PDF Downloads 169
27903 Petri Net Modeling and Simulation of a Call-Taxi System

Authors: T. Godwin

Abstract:

A call-taxi system is a type of taxi service where a taxi could be requested through a phone call or mobile app. A schematic functioning of a call-taxi system is modeled using Petri net, which provides the necessary conditions for a taxi to be assigned by a dispatcher to pick a customer as well as the conditions for the taxi to be released by the customer. A Petri net is a graphical modeling tool used to understand sequences, concurrences, and confluences of activities in the working of discrete event systems. It uses tokens on a directed bipartite multi-graph to simulate the activities of a system. The Petri net model is translated into a simulation model and a call-taxi system is simulated. The simulation model helps in evaluating the operation of a call-taxi system based on the fleet size as well as the operating policies for call-taxi assignment and empty call-taxi repositioning. The developed Petri net based simulation model can be used to decide the fleet size as well as the call-taxi assignment policies for a call-taxi system.

Keywords: call-taxi, discrete event system, petri net, simulation modeling

Procedia PDF Downloads 416
27902 Noise Pollution in Nigerian Cities: Case Study of Bida, Nigeria

Authors: Funke Morenike Jiyah, Joshua Jiyah

Abstract:

The occurrence of various health issues have been linked to excessive noise pollution in all works of life as evident in many research efforts. This study provides empirical analysis of the effects of noise pollution on the well-being of the residents of Bida Local Government Area, Niger State, Nigeria. The study adopted a case study research design, involving cross-sectional procedure. Field observations and medical reports were obtained to support the respondents’ perception on the state of their well-being. The sample size for the study was selected using the housing stock in the various wards. One major street in each ward was selected. A total of 1,833 buildings were counted along the sampled streets and 10% of this was selected for the administration of structured questionnaire.The environmental quality of the wards was determined by measuring the noise level using Testo 815 noise meters. The result revealed that Bariki ward which houses the GRA has the lowest noise level of 37.8 dB(A)while the noise pollution levels recorded in the other thirteen wards were all above the recommended levels. The average ambient noise level in sawmills, commercial centres, road junctions and industrial areas were above 90 dB(A). The temporal record from the Federal Medical Centre, Bida revealed that, apart from malaria, hypertension (5,614 outpatients) was the most prevalent health issue in 2013 alone. The paper emphasised the need for compatibility consideration in the choice of residential location, the use of ear muffler and effective enforcement of zoning regulations.

Keywords: bida, decibels, environmental quality, noise, well-being

Procedia PDF Downloads 130
27901 Towards Developing a Self-Explanatory Scheduling System Based on a Hybrid Approach

Authors: Jian Zheng, Yoshiyasu Takahashi, Yuichi Kobayashi, Tatsuhiro Sato

Abstract:

In the study, we present a conceptual framework for developing a scheduling system that can generate self-explanatory and easy-understanding schedules. To this end, a user interface is conceived to help planners record factors that are considered crucial in scheduling, as well as internal and external sources relating to such factors. A hybrid approach combining machine learning and constraint programming is developed to generate schedules and the corresponding factors, and accordingly display them on the user interface. Effects of the proposed system on scheduling are discussed, and it is expected that scheduling efficiency and system understandability will be improved, compared with previous scheduling systems.

Keywords: constraint programming, factors considered in scheduling, machine learning, scheduling system

Procedia PDF Downloads 317
27900 Database Management System for Orphanages to Help Track of Orphans

Authors: Srivatsav Sanjay Sridhar, Asvitha Raja, Prathit Kalra, Soni Gupta

Abstract:

Database management is a system that keeps track of details about a person in an organisation. Not a lot of orphanages these days are shifting to a computer and program-based system, but unfortunately, most have only pen and paper-based records, which not only consumes space but it is also not eco-friendly. It comes as a hassle when one has to view a record of a person as they have to search through multiple records, and it will consume time. This program will organise all the data and can pull out any information about anyone whose data is entered. This is also a safe way of storage as physical data gets degraded over time or, worse, destroyed due to natural disasters. In this developing world, it is only smart enough to shift all data to an electronic-based storage system. The program comes with all features, including creating, inserting, searching, and deleting the data, as well as printing them.

Keywords: database, orphans, programming, C⁺⁺

Procedia PDF Downloads 149
27899 Application of Subversion Analysis in the Search for the Causes of Cracking in a Marine Engine Injector Nozzle

Authors: Leszek Chybowski, Artur Bejger, Katarzyna Gawdzińska

Abstract:

Subversion analysis is a tool used in the TRIZ (Theory of Inventive Problem Solving) methodology. This article introduces the history and describes the process of subversion analysis, as well as function analysis and analysis of the resources, used at the design stage when generating possible undesirable situations. The article charts the course of subversion analysis when applied to a fuel injection nozzle of a marine engine. The work describes the fuel injector nozzle as a technological system and presents principles of analysis for the causes of a cracked tip of the nozzle body. The system is modelled with functional analysis. A search for potential causes of the damage is undertaken and a cause-and-effect analysis for various hypotheses concerning the damage is drawn up. The importance of particular hypotheses is evaluated and the most likely causes of damage identified.

Keywords: complex technical system, fuel injector, function analysis, importance analysis, resource analysis, sabotage analysis, subversion analysis, TRIZ (Theory of Inventive Problem Solving)

Procedia PDF Downloads 610
27898 Face Tracking and Recognition Using Deep Learning Approach

Authors: Degale Desta, Cheng Jian

Abstract:

The most important factor in identifying a person is their face. Even identical twins have their own distinct faces. As a result, identification and face recognition are needed to tell one person from another. A face recognition system is a verification tool used to establish a person's identity using biometrics. Nowadays, face recognition is a common technique used in a variety of applications, including home security systems, criminal identification, and phone unlock systems. This system is more secure because it only requires a facial image instead of other dependencies like a key or card. Face detection and face identification are the two phases that typically make up a human recognition system.The idea behind designing and creating a face recognition system using deep learning with Azure ML Python's OpenCV is explained in this paper. Face recognition is a task that can be accomplished using deep learning, and given the accuracy of this method, it appears to be a suitable approach. To show how accurate the suggested face recognition system is, experimental results are given in 98.46% accuracy using Fast-RCNN Performance of algorithms under different training conditions.

Keywords: deep learning, face recognition, identification, fast-RCNN

Procedia PDF Downloads 135
27897 Cheiloscopy: A Study on Predominant Lip Print Patterns among the Gujarati Population

Authors: Pooja Ahuja, Tejal Bhutani, M. S. Dahiya

Abstract:

Cheiloscopy, the study of lip prints, is a tool in forensic investigation technique that deals with identification of individuals based on lips patterns. The objective of this study is to determine predominant lip print pattern found among the Gujarati population, to evaluate whether any sex difference exists and to study the permanence of the pattern over six months duration. The study comprised of 100 healthy individuals (50 males and 50 females), in the age group of 18 to 25 years of Gujarati population of the Gandhinagar region of the Gujarat state, India. By using Suzuki and Tsuchihashi classification, Lip prints were then divided into four quadrants and also classified on the basis of peripheral shape of the lips. Materials used to record the lip prints were dark brown colored lipstick, cellophane tape, and white bond paper. Lipstick was applied uniformly, and lip prints were taken on the glued portion of cellophane tape and then stuck on to a white bond paper. These lip prints were analyzed with magnifying lens and virtually with stereo microscope. On the analysis of the subject population, results showed Branched pattern Type II (29.57 percentage) to be most predominant in the Gujarati population. Branched pattern Type II (35.60 percentage) and long vertical Type I (28.28 percentage) were most prevalent in males and females respectively and large full lips were most predominantly present in both the sexes. The study concludes that lip prints in any form can be an effective tool for identification of an individual in a closed or open group forms.

Keywords: cheiloscopy, lip pattern, predomianant, Gujarati population

Procedia PDF Downloads 293
27896 Adaption Model for Building Agile Pronunciation Dictionaries Using Phonemic Distance Measurements

Authors: Akella Amarendra Babu, Rama Devi Yellasiri, Natukula Sainath

Abstract:

Where human beings can easily learn and adopt pronunciation variations, machines need training before put into use. Also humans keep minimum vocabulary and their pronunciation variations are stored in front-end of their memory for ready reference, while machines keep the entire pronunciation dictionary for ready reference. Supervised methods are used for preparation of pronunciation dictionaries which take large amounts of manual effort, cost, time and are not suitable for real time use. This paper presents an unsupervised adaptation model for building agile and dynamic pronunciation dictionaries online. These methods mimic human approach in learning the new pronunciations in real time. A new algorithm for measuring sound distances called Dynamic Phone Warping is presented and tested. Performance of the system is measured using an adaptation model and the precision metrics is found to be better than 86 percent.

Keywords: pronunciation variations, dynamic programming, machine learning, natural language processing

Procedia PDF Downloads 166
27895 A Relational Approach to Adverb Use in Interactions

Authors: Guillaume P. Fernandez

Abstract:

Individual language use is a matter of choice in particular interactions. The paper proposes a conceptual and theoretical framework with methodological consideration to develop how language produced in dyadic relations is to be considered and situated in the larger social configuration the interaction is embedded within. An integrated and comprehensive view is taken: social interactions are expected to be ruled by a normative context, defined by the chain of interdependences that structures the personal network. In this approach, the determinants of discursive practices are not only constrained by the moment of production and isolated from broader influences. Instead, the position the individual and the dyad have in the personal network influences the discursive practices in a twofold manner: on the one hand, the network limits the access to linguistic resources available within it, and, on the other hand, the structure of the network influences the agency of the individual, by the social control inherent to particular network characteristics. Concretely, we investigate how and to what extent consistent ego is from one interaction to another in his or her use of adverbs. To do so, social network analysis (SNA) methods are mobilized. Participants (N=130) are college students recruited in the french speaking part of Switzerland. The personal network of significant ones of each individual is created using name generators and edge interpreters, with a focus on social support and conflict. For the linguistic parts, respondents were asked to record themselves with five of their close relations. From the recordings, we computed an average similarity score based on the adverb used across interactions. In terms of analyses, two are envisaged: First, OLS regressions including network-level measures, such as density and reciprocity, and individual-level measures, such as centralities, are performed to understand the tenets of linguistic similarity from one interaction to another. The second analysis considers each social tie as nested within ego networks. Multilevel models are performed to investigate how the different types of ties may influence the likelihood to use adverbs, by controlling structural properties of the personal network. Primary results suggest that the more cohesive the network, the less likely is the individual to change his or her manner of speaking, and social support increases the use of adverbs in interactions. While promising results emerge, further research should consider a longitudinal approach to able the claim of causality.

Keywords: personal network, adverbs, interactions, social influence

Procedia PDF Downloads 60
27894 Lightweight and Seamless Distributed Scheme for the Smart Home

Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro

Abstract:

Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.

Keywords: authentication, key-session, security, wireless sensors

Procedia PDF Downloads 313
27893 Machine Learning Strategies for Data Extraction from Unstructured Documents in Financial Services

Authors: Delphine Vendryes, Dushyanth Sekhar, Baojia Tong, Matthew Theisen, Chester Curme

Abstract:

Much of the data that inform the decisions of governments, corporations and individuals are harvested from unstructured documents. Data extraction is defined here as a process that turns non-machine-readable information into a machine-readable format that can be stored, for instance, in a database. In financial services, introducing more automation in data extraction pipelines is a major challenge. Information sought by financial data consumers is often buried within vast bodies of unstructured documents, which have historically required thorough manual extraction. Automated solutions provide faster access to non-machine-readable datasets, in a context where untimely information quickly becomes irrelevant. Data quality standards cannot be compromised, so automation requires high data integrity. This multifaceted task is broken down into smaller steps: ingestion, table parsing (detection and structure recognition), text analysis (entity detection and disambiguation), schema-based record extraction, user feedback incorporation. Selected intermediary steps are phrased as machine learning problems. Solutions leveraging cutting-edge approaches from the fields of computer vision (e.g. table detection) and natural language processing (e.g. entity detection and disambiguation) are proposed.

Keywords: computer vision, entity recognition, finance, information retrieval, machine learning, natural language processing

Procedia PDF Downloads 104
27892 Wearable Heart Rate Sensor Based on Wireless System for Heart Health Monitoring

Authors: Murtadha Kareem, Oliver Faust

Abstract:

Wearable biosensor systems can be designed and developed for health monitoring. There is much interest in both scientific and industrial communities established since 2007. Fundamentally, the cost of healthcare has increased dramatically and the world population is aging. That creates the need to harvest technological improvements with small bio-sensing devices, wireless-communication, microelectronics and smart textiles, that leads to non-stop developments of wearable sensor based systems. There has been a significant demand to monitor patient's health status while the patient leaves the hospital in his/her personal environment. To address this need, there are numerous system prototypes which has been launched in the medical market recently, the aim of that is to provide real time information feedback about patient's health status, either to the patient himself/herself or direct to the supervising medical centre station, while being capable to give a notification for the patient in case of possible imminent health threatening conditions. Furthermore, wearable health monitoring systems comprise new techniques to address the problem of managing and monitoring chronic heart diseases for elderly people. Wearable sensor systems for health monitoring include various types of miniature sensors, either wearable or implantable. To be specific, our proposed system able to measure essential physiological parameter, such as heart rate signal which could be transmitted through Bluetooth to the cloud server in order to store, process, analysis and visualise the data acquisition. The acquired measurements are connected through internet of things to a central node, for instance an android smart phone or tablet used for visualising the collected information on application or transmit it to a medical centre.

Keywords: Wearable sensor, Heart rate, Internet of things, Chronic heart disease

Procedia PDF Downloads 158
27891 Factors Associated with Injuries and Trauma Among the Survivors of Gender-Based Violence in Afghanistan

Authors: Mohammad Akbar Paiman, Yasmin Nadeem Parpio, Naureen Akbarali, Khwaja Mir Islam Saeed, Murad Moosa Khan

Abstract:

Background: Gender-based violence (GBV) is widely considered a significant public health problem that is associated with acute morbidity and mortality. GBV is commonly understood as a physical, sexual, and mental assault from intimate partners, sexual violence by non-partners, sexual assault of girls, and acts like trafficking women for sex. Objective: This study aimed to determine the factors associated with injuries and trauma among victims of GBV in Afghanistan. Method: We conducted a record-based analysis of the data collected by the Gender Department of the Family Protection Centre nationally between November 2013 and October 2019. Cross-tabulation between different variables such as age, sex, marital status, and type of violence and associations between different types of violence, age, gender, and geographical location was determined using the logistic regression model. Results: During the study period, there were a total of 58,160 GBV in Afghanistan. Most of the victims were women 98% with over three-quarters being adults 78%. Most of the victims were married 76%, followed by single 14%, widowed 5%, and engaged 5%. Over three-quarters of the violence, 73% was observed in the victim’s house while nearly one-quarter of the violence 24 % occurred in the perpetrator’s house. Conclusions: GBV is a significant public health problem in Afghanistan that needs to be addressed at multiple levels including policy, state, and community as well as by raising public awareness and education and a strong code of conduct against GBV by all stakeholders.

Keywords: gender-based violence, physical and psychological violence, injuries, Afghanistan

Procedia PDF Downloads 49
27890 Optimized Approach for Secure Data Sharing in Distributed Database

Authors: Ahmed Mateen, Zhu Qingsheng, Ahmad Bilal

Abstract:

In the current age of technology, information is the most precious asset of a company. Today, companies have a large amount of data. As the data become larger, access to data for some particular information is becoming slower day by day. Faster data processing to shape it in the form of information is the biggest issue. The major problems in distributed databases are the efficiency of data distribution and response time of data distribution. The security of data distribution is also a big issue. For these problems, we proposed a strategy that can maximize the efficiency of data distribution and also increase its response time. This technique gives better results for secure data distribution from multiple heterogeneous sources. The newly proposed technique facilitates the companies for secure data sharing efficiently and quickly.

Keywords: ER-schema, electronic record, P2P framework, API, query formulation

Procedia PDF Downloads 328
27889 Parameters Affecting the Elasto-Plastic Behavior of Outrigger Braced Walls to Earthquakes

Authors: T. A. Sakr, Hanaa E. Abd-El-Mottaleb

Abstract:

Outrigger-braced wall systems are commonly used to provide high rise buildings with the required lateral stiffness for wind and earthquake resistance. The existence of outriggers adds to the stiffness and strength of walls as reported by several studies. The effects of different parameters on the elasto-plastic dynamic behavior of outrigger-braced wall systems to earthquakes are investigated in this study. Parameters investigated include outrigger stiffness, concrete strength, and reinforcement arrangement as the main design parameters in wall design. In addition to being significant to the wall behavior, such parameters may lead to the change of failure mode and the delay of crack propagation and consequently failure as the wall is excited by earthquakes. Bi-linear stress-strain relation for concrete with limited tensile strength and truss members with bi-linear stress-strain relation for reinforcement were used in the finite element analysis of the problem. The famous earthquake record, El-Centro, 1940 is used in the study. Emphasis was given to the lateral drift, normal stresses and crack pattern as behavior controlling determinants. Results indicated significant effect of the studied parameters such that stiffer outrigger, higher grade concrete and concentrating the reinforcement at wall edges enhance the behavior of the system. Concrete stresses and cracking behavior are sigbificantly enhanced while lesser drift improvements are observed.

Keywords: outrigger, shear wall, earthquake, nonlinear

Procedia PDF Downloads 278
27888 Usability Evaluation of a Self-Report Mobile App for COVID-19 Symptoms: Supporting Health Monitoring in the Work Context

Authors: Kevin Montanez, Patricia Garcia

Abstract:

The confinement and restrictions adopted to avoid an exponential spread of the COVID-19 have negatively impacted the Peruvian economy. In this context, Industries offering essential products could continue operating, but they have to follow safety protocols and implement strategies to ensure employee health. In view of the increasing internet access and mobile phone ownership, “Alerta Temprana”, a mobile app, was developed to self-report COVID-19 symptoms in the work context. In this study, the usability of the mobile app “Alerta Temprana” was evaluated from the perspective of health monitors and workers. In addition to reporting the metrics related to the usability of the application, the utility of the system is also evaluated from the monitors' perspective. In this descriptive study, the participants used the mobile app for two months. Afterwards, System Usability Scale (SUS) questionnaire was answered by the workers and monitors. A Usefulness questionnaire with open questions was also used for the monitors. The data related to the use of the application was collected during one month. Furthermore, descriptive statistics and bivariate analysis were used. The workers rated the application as good (70.39). In the case of the monitors, usability was excellent (83.0). The most important feature for the monitors were the emails generated by the application. The average interaction per user was 30 seconds and a total of 6172 self-reports were sent. Finally, a statistically significant association was found between the acceptability scale and the work area. The results of this study suggest that Alerta Temprana has the potential to be used for surveillance and health monitoring in any context of face-to-face modality. Participants reported a high degree of ease of use. However, from the perspective of workers, SUS cannot diagnose usability issues and we suggest we use another standard usability questionnaire to improve "Alerta Temprana" for future use.

Keywords: public health in informatics, mobile app, usability, self-report

Procedia PDF Downloads 112
27887 Capture-recapture to Estimate Completeness of Pulmonary Tuberculosis with Two Sources

Authors: Ratchadaporn Ungcharoen, Lily Ingsrisawang

Abstract:

Capture-recapture methods are popular techniques for indirect estimation the size of wildlife populations and the completeness of cases in epidemiology and social sciences. The aim of this study was to estimate the completeness of pulmonary tuberculosis cases confirmed by two sources of hospital registrations and surveillance systems in 2013 in Nakhon Pathom province, Thailand. Several estimators of population size were considered: the Lincoln-Petersen estimator, the Chapman estimator, the Chao’s lower bound estimator, the Zelterman’s estimator, etc. We focus on the Chapman and Chao’s lower bound estimators for estimating the completeness of pulmonary tuberculosis from two sources. The retrieved pulmonary tuberculosis data from two sources were analyzed and bootstrapped for 30 samples, with 241 observations from source 1 and 305 observations from source 2 per sample, for additional exploration of the completeness of pulmonary tuberculosis. The results from the original data show that the Chapman’s estimator gave the estimation of a total 360 (95% CI: 349-371) pulmonary tuberculosis cases, resulting in 57% estimated completeness cases. But the Chao’s lower bound estimator estimated the total of 365 (95% CI: 354-376) pulmonary tuberculosis cases and its estimated completeness cases was 55.9%. For the results from bootstrap samples, the Chapman and the Chao’s lower bound estimators gave an estimated 347 (95% CI: 309-385) and 353 (95% CI: 315-390) pulmonary tuberculosis cases, respectively. If for two sources recoding systems are available, record-linkage and capture-recapture analysis can be useful for estimating the completeness of different registration system. Both Chapman and Chao’s lower bound estimator approaches produce very close estimates.

Keywords: capture-recapture, Chao, Chapman, pulmonary tuberculosis

Procedia PDF Downloads 515
27886 Thanking as a Compliment Response at Higher Education Institution: A Comparative Study of Omani and Australian Speakers

Authors: Arfat Bait Jamil

Abstract:

This study investigates how the compliment response of thanking is performed by Omani and Australian, lecturers and students, in higher educational settings. Semi-structured interviews and observation records were used to collect data. Thanking responses were aggregated from interviews with Omani lecturers and students in Oman, and from Australian lecturers and students in Australia, wherein they were asked to imagine themselves being complimented on five different compliment topics. After the interviews, they used observation record to note down real-life examples of compliment exchanges, along with their opinions. The findings show that thanking is not a simple compliment response. Depending on the context in which the compliment is delivered, thanking does not always suggest positive thoughts or feelings and compliment approval.

Keywords: Australia, compliment responses, Oman, thanking

Procedia PDF Downloads 248
27885 Intelligent Ambulance with Advance Features of Traffic Management and Telecommunication

Authors: Mamatha M. N.

Abstract:

Traffic problems, congested traffic, and flow management were recognized as major problems mostly in all the areas, which have caused a problem for the ambulance which carries the emergency patient. The proposed paper aims in the development of ambulance which reaches the nearby hospital faster even in heavy traffic scenario. This process is activated by implementing hardware in an ambulance as well as in traffic post thus allowing a smooth flow to the ambulance to reach the hospital in time. 1) The design of the vehicle to have a communication between ambulance and traffic post. 2)Electronic Health Record with Data-acquisition system 3)Telemetry of acquired biological parameters to the nearest hospital. Thus interfacing all these three different modules and integrating them on the ambulance could reach the hospital earlier than the present ambulance. The system is accurate and efficient of 99.8%.

Keywords: bio-telemetry, data acquisition, patient database, automatic traffic control

Procedia PDF Downloads 312
27884 Sexting Phenomenon in Educational Settings: A Data Mining Approach

Authors: Koutsopoulou Ioanna, Gkintoni Evgenia, Halkiopoulos Constantinos, Antonopoulou Hera

Abstract:

Recent advances in Internet Computer Technology (ICT) and the ever-increasing use of technological equipment amongst adolescents and young adults along with unattended access to the internet and social media and uncontrolled use of smart phones and PCs have caused social problems like sexting to emerge. The main purpose of the present article is first to present an analytic theoretical framework of sexting as a recent social phenomenon based on studies that have been conducted the last decade or so; and second to investigate Greek students’ and also social network users, sexting perceptions and to record how often social media users exchange sexual messages and to retrace demographic variables predictors. Data from 1,000 students were collected and analyzed and all statistical analysis was done by the software package WEKA. The results indicate among others, that the use of data mining methods is an important tool to draw conclusions that could affect decision and policy making especially in the field and related social topics of educational psychology. To sum up, sexting lurks many risks for adolescents and young adults students in Greece and needs to be better addressed in relevance to the stakeholders as well as society in general. Furthermore, policy makers, legislation makers and authorities will have to take action to protect minors. Prevention strategies based on Greek cultural specificities are being proposed. This social problem has raised concerns in recent years and will most likely escalate concerns in global communities in the future.

Keywords: educational ethics, sexting, Greek sexters, sex education, data mining

Procedia PDF Downloads 181
27883 Ranking of the Main Criteria for Contractor Selection Procedures on Major Construction Projects in Libya Using the Delphi Method

Authors: Othoman Elsayah, Naren Gupta, Binsheng Zhang

Abstract:

The construction sector constitutes one of the most important sectors in the economy of any country. Contractor selection is a critical decision that is undertaken by client organizations and is central to the success of any construction project. Contractor selection (CS) is a process which involves investigating, screening and determining whether candidate contractors have the technical and financial capability to be accepted to formally tender for construction work. The process should be conducted prior to the award of contract, characterized by many factors such as: contactor’s skills, experience on similar projects, track- record in the industry, and financial stability. However, this paper evaluates the current state of knowledge in relation to contractor selection process and demonstrates the findings from the analysis of the data collected from the Delphi questionnaire survey. The survey was conducted with a group of 12 experts working in the Libyan construction industry (LCI). The paper starts by briefly explaining the general outline of the questionnaire including the survey participation rate, the different fields the experts came from, and the business titles of the participants. Then, the paper describes the tests used to determine when the experts had reached consensus. The paper is based on research which aims to develop rank contractor selection criteria with specific application to make construction projects in the Libyan context. The findings of this study will be utilized to establish the scope of work that will be used as part of a PhD research.

Keywords: contractor selection, Libyan construction industry, decision experts, Delphi technique

Procedia PDF Downloads 329
27882 International Protection Mechanisms for Refugees

Authors: Djehich Mohamed Yousri

Abstract:

In recent years, the world has witnessed a phenomenon of displacement that is unprecedented in history. The number of refugees has reached record levels, due to wars, persecution, many conflicts and repression in a number of countries. The interest of United Nations bodies and international and regional organizations in the issue of refugees has increased, as they have defined a refugee and thus Determining who is entitled to this legal protection, and the 1951 Convention for the Protection of Refugees defines rights for refugee protection and sets obligations that they must perform. The institutional mechanisms for refugee protection are represented in the various agencies that take care of refugee affairs. At the forefront of these agencies is the United Nations High Commissioner for Refugees, as well as the various efforts provided by the International Committee of the Red Cross and the United Nations Relief and Works Agency for Palestine Refugees in the Middle East (UNRWA).

Keywords: protection, refugees, international, persecution, legal

Procedia PDF Downloads 73
27881 Contemplation of Thermal Characteristics by Filling Ratio of Aluminium Oxide Nano Fluid in Wire Mesh Heat Pipe

Authors: D. Mala, S. Sendhilnathan, D. Ratchagaraja

Abstract:

In this paper, the performance of heat pipe in terms of overall heat transfer coefficient and thermal resistance is quantified by varying the volume of working fluid and the performance parameters are contemplated. For this purpose Al2O3 nano particles with a density of 9.8 gm/cm3 and a volume concentration of 1% is used as the working fluid in experimental heat pipe. The performance of heat pipe was evaluated by conducting experiments with different thermal loads and different angle of inclinations. Thermocouples are used to record the temperature distribution across the experiment. The results provide evidence that the suspension of Al2O3 nano particles in the base fluid increases the thermal efficiency of heat pipe and can be used in practical heat exchange applications.

Keywords: heat pipe, angle of inclination, thermal resistance, thermal efficiency

Procedia PDF Downloads 560
27880 Being an Afghan Woman in Australia; Stereotypes, Gender Roles, and Adaption with New Context

Authors: Rojan Afrouz

Abstract:

Introduction: The immigration is a complex process of transitioning and transformation. Immigrants are more likely to come from the patriarchal and hierarchical society with traditional gender roles and women’s stereotypes. Changing the perception of women’s gender roles may result in challenges between women and their family and community. In this article, Afghan women’s perspectives on gender roles and stereotypes have been investigated as well as their experience of changes in the new context of Australia. Australian initiatives of challenging gender roles have provided the opportunities for Afghan women to emancipate from the traditional gender roles and pursue the value of gender equality. In this process, they may face many challenges in intersectional levels within their family, community and wider society which is a complex conflate of oppressive factors that may not be addressed easily and straightforward. Methods: This qualitative study has been conducted among Afghan women who have lived in Australia less than ten years. Semi-structured interviews either face to face or by phone have been used to collect data for this study. The interviews have been audio-recorded and transcribed verbatim. Nvivo software has been used for data analysis. Findings: Many participants mentioned that they had been taught that a good Afghan woman is devoted, obedient and loyal to their family and community. They believed that for many Afghan families, Afghan women's natural place was inside the home as a housewife, mother, daughter involving so many responsibilities and expectation of making sacrifices. Many women stated that their attitudes toward gender roles and their feeling of being a woman had been changed since they came to Australia although the process of change for women was complex and diverse. Some had to deal with conflicts with their stereotypes, traditional gender roles as well as strong disagreement with their family and community. Conclusion: Moving to a different country with more gender equality is an opportunity for Afghan women to change their perceptions of gender roles and stereotypes. However, challenging traditional stereotypes and gender roles in the new context is a complex process comprising intersectional levels.

Keywords: stereotypes, gender role, immigration, Afghan women

Procedia PDF Downloads 168
27879 Safety Status of Stations and Tunnels of Tehran Line 4 Urban and Suburb Railways (Subway) Against Fire Risks

Authors: Yousefi Aryian, Ghanbaripour Amir naser

Abstract:

Record of 2 million trips during a day by subway makes it the most application and the most efficient branch of public transportation. Great safety, energy consumption reduction, appropriate speed, and lower prices for passengers in comparison with private cars or buses, are some reasons for this remarkable statics. This increasing popularity compels the author to evaluate the safety of subway stations and tunnels against fire and fire extinguishing systems in Tehran subway network and then compare some of its safety parameters to other countries. This paper assessed the methods and systems used in different parts of Tehran subway and then by comparing the facilities and equipment necessary to declare and extinguish the fire, the solutions and world standards (NFPA) are explored.

Keywords: subway station, tunnel, fire alarm, extinguishing fire, NFPA standards

Procedia PDF Downloads 471
27878 A Multi-Beneficial Gift of Nature (Noni Fruit): Nutritional, Functional, and Post-Harvest Aspects

Authors: Mahsa Moteshakeri

Abstract:

Morinda citrifolia L., a miracle fruit with common name of Noni, has been widely used as food and traditional medicine in the Polynesians culture. Current scientific evidences have proved the therapeautical and nutritional properties of this fruit so that its extensive production in tropical regions in recent years has emerged a competitive global Noni market mainly as a dietary supplement in the form of juice or tablet. However, there is not much record on the processing method applied on fresh fruit postharvest or even its mechanism of action in controlling diseases. This review aimed to provide a comprehensive data on phytochemicals, technical, and nutritional advances on Noni fruit and recent patents published, as well as medicinal properties of the fruit in order to benefit future investigations on this precious fruit either in industrial or therapeautical section.

Keywords: noni fruit, phytochemicals, therapeautic properties of fruit, nutritional properties of fruit

Procedia PDF Downloads 360