Search results for: information seeking behaviors
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12547

Search results for: information seeking behaviors

8077 Communication of Expected Survival Time to Cancer Patients: How It Is Done and How It Should Be Done

Authors: Geir Kirkebøen

Abstract:

Most patients with serious diagnoses want to know their prognosis, in particular their expected survival time. As part of the informed consent process, physicians are legally obligated to communicate such information to patients. However, there is no established (evidence based) ‘best practice’ for how to do this. The two questions explored in this study are: How do physicians communicate expected survival time to patients, and how should it be done? We explored the first, descriptive question in a study with Norwegian oncologists as participants. The study had a scenario and a survey part. In the scenario part, the doctors should imagine that a patient, recently diagnosed with a serious cancer diagnosis, has asked them: ‘How long can I expect to live with such a diagnosis? I want an honest answer from you!’ The doctors should assume that the diagnosis is certain, and that from an extensive recent study they had optimal statistical knowledge, described in detail as a right-skewed survival curve, about how long such patients with this kind of diagnosis could be expected to live. The main finding was that very few of the oncologists would explain to the patient the variation in survival time as described by the survival curve. The majority would not give the patient an answer at all. Of those who gave an answer, the typical answer was that survival time varies a lot, that it is hard to say in a specific case, that we will come back to it later etc. The survey part of the study clearly indicates that the main reason why the oncologists would not deliver the mortality prognosis was discomfort with its uncertainty. The scenario part of the study confirmed this finding. The majority of the oncologists explicitly used the uncertainty, the variation in survival time, as a reason to not give the patient an answer. Many studies show that patients want realistic information about their mortality prognosis, and that they should be given hope. The question then is how to communicate the uncertainty of the prognosis in a realistic and optimistic – hopeful – way. Based on psychological research, our hypothesis is that the best way to do this is by explicitly describing the variation in survival time, the (usually) right skewed survival curve of the prognosis, and emphasize to the patient the (small) possibility of being a ‘lucky outlier’. We tested this hypothesis in two scenario studies with lay people as participants. The data clearly show that people prefer to receive expected survival time as a median value together with explicit information about the survival curve’s right skewedness (e.g., concrete examples of ‘positive outliers’), and that communicating expected survival time this way not only provides people with hope, but also gives them a more realistic understanding compared with the typical way expected survival time is communicated. Our data indicate that it is not the existence of the uncertainty regarding the mortality prognosis that is the problem for patients, but how this uncertainty is, or is not, communicated and explained.

Keywords: cancer patients, decision psychology, doctor-patient communication, mortality prognosis

Procedia PDF Downloads 324
8076 Implementation Of Evidence Based Nursing Practice And Associated Factors Among Nurses Working In Jimma Zone Public Hospitals, Southwest Ethiopia

Authors: Dawit Hoyiso, Abinet Arega, Terefe Markos

Abstract:

Background: - In spite of all the various programs and strategies to promote the use of research finding there is still gap between theory and practice. Difference in outcomes, health inequalities, and poorly performing health service continue to present a challenge to all nurses. A number of studies from various countries have reported that nurses’ experience of evidence-based practice is low. In Ethiopia there is an information gap on the extent of evidence based nursing practice and its associated factors. Objective: - the study aims to assess the implementation of evidence based nursing practice and associated factors among nurses in Jimma zone public hospitals. Method: - Institution based cross-sectional study was conducted from March 1-30/2015. A total of 333 sampled nurses for quantitative and 8 in-depth interview of key informants were involved in the study. Semi-structured questionnaire was adapted from funk’s BARRIER scale and Friedman’s test. Multivariable Linear regression was used to determine significance of association between dependent and independent variables. Pretest was done on 17 nurses of Bedele hospital. Ethical issue was secured. Result:-Of 333 distributed questionnaires 302 were completed, giving 90.6% response rate. Of 302 participants 245 were involved in EBP activities to different level (from seldom to often). About forty five(18.4%) of the respondents had implemented evidence based practice to low level (sometimes), one hundred three (42 %) of respondents had implemented evidence based practice to medium level and ninety seven (39.6 %) of respondents had implemented evidence based practice to high level(often). The first greatest perceived barrier was setting characteristic (mean score=26.60±7.08). Knowledge about research evidence was positively associated with implementation of evidence based nursing practice (β=0.76, P=0.008). Similarly, Place where the respondent graduated was positively associated with implementation of evidence based nursing practice (β=2.270, P=0.047). Also availability of information resources was positively associated with implementation of evidence based practice (β=0.67, P= 0.006). Conclusion: -Even though larger portion of nurses in this study were involved in evidence-based practice whereas small number of participants had implemented frequently. Evidence-based nursing practice was positively associated with knowledge of research, place where respondents graduated, and the availability of information resources. Organizational factors were found to be the greatest perceived barrier. Intervention programs on awareness creation, training, resource provision, and curriculum issues to improve implementation of evidence based nursing practice by stakeholders are recommended.

Keywords: evidence based practice, nursing practice, research utilization, Ethiopia

Procedia PDF Downloads 93
8075 Indian Business-Papers in Industrial Revolution 4.0: A Paradigm Shift

Authors: Disha Batra

Abstract:

The Industrial Revolution 4.0 is quite different, and a paradigm shift is underway in the media industry. With the advent of automated journalism and social media platforms, newspaper organizations have changed the way news was gathered and reported. The emergence of the fourth industrial revolution in the early 21st century has made the newspapers to adapt the changing technologies to remain relevant. This paper investigates the content of Indian business-papers in the era of the fourth industrial revolution and how these organizations have emerged in the time of convergence. The study is the content analyses of the top three Indian business dailies as per IRS (Indian Readership Survey) 2017 over a decade. The parametric analysis of the different parameters (source of information, use of illustrations, advertisements, layout, and framing, etc.) have been done in order to come across with the distinct adaptations and modifications by these dailies. The paper significantly dwells upon the thematic analysis of these newspapers in order to explore and find out the coverage given to various sub-themes of EBF (economic, business, and financial) journalism. Further, this study reveals the effect of high-speed algorithm-based trading, the aftermath of the fourth industrial revolution on the creative and investigative aspect of delivering financial stories by these respective newspapers. The study indicates a change heading towards an ongoing paradigm shift in the business newspaper industry with an adequate change in the source of information gathering along with the subtle increase in the coverage of financial news stories over the time.

Keywords: business-papers, business news, financial news, industrial revolution 4.0.

Procedia PDF Downloads 114
8074 Depressive-Like Behavior in a Murine Model of Colorectal Cancer Associated with Altered Cytokine Levels in Stress-Related Brain Regions

Authors: D. O. Miranda, L. R. Azevedo, J. F. C. Cordeiro, A. H. Dos Santos, S. F. Lisboa, F. S. Guimarães, G. S. Bisson

Abstract:

Background: The Colorectal cancer (CRC) is one of the most common cancers and the fourth leading cause of cancer death in the world. The prevalence of psychiatric-disorders among CRC patients, mainly depression, is high, resulting in impaired quality of life and side effects of primary treatment. High levels of proinflammatory cytokines at tumor microenvironment is a feature of CRC and the literature suggests that those mediators could contribute to the development of psychiatric disorders. Nevertheless, the ability of tumor-associated biological processes to affect the central nervous system (CNS) has only recently been explored in the context of symptoms of depression and is still not well understood. Therefore, the aim of the present study was to test the hypothesis that depressive-like behavior in an experimental model of CCR induced by N-methyl-N-nitro-N-nitrosoguanidine (MNNG) was correlated to proinflammatory profile in the periphery and in the brain. Methods: Colorectal carcinogenesis was induced in adult C57BL/6 mice (n=12) by administration of MNNG (5mg/kg, 0.1ml/intrarectal instillation) 2 times a week, for 2 week. Control group (n=12) received saline (0.1ml/intrarectal instillation). Eight weeks after beginning of MNNG administration animals were submitted to the forced swim test (FST) and the sucrose preference test for evaluation, respectively, of depressive- and anhedonia-like behaviors. After behavioral evaluation, the colon was collected and brain regions dissected (cortex-C, striatum-ST and hippocampus-HIP) for posterior evaluation of cytokine levels (IL-1β, IL-10, IL-17, and CX3CL1) by ELISA. Results: MNNG induced depressive-like behavior, represented by increased immobility time in the FST (Student t test, p < 0.05) and lower sucrose preference (Student t test, p < 0.05). Moreover, there were increased levels of IL-1β, IL-17 and CX3CL1 in the colonic tissue (Student t test, p < 0.05) and in the brain (IL-1 β in the ST and HIP, Student t test, p < 0.05; IL-17 and CX3CL1 in the C and HIP, p < 0.05). IL-10 levels, in contrast, were decreased in both the colon (p < 0.05) and the brain (C and HIP, p < 0.05). Conclusions: The results obtained in the present work support the notion that tumor growth induces neuroinflammation in stress-related brain regions and depressive-like behavior, which could be related to the high incidence of depression in colorectal carcinogenesis. This work have important clinical and research implications, taken into account that cytokine levels may be a marker promissory for the developing depression in CRC patients. New therapeutic strategies to assist in alleviating mental suffering in cancer patients might result from a better understanding of the role of cytokines in the pathophysiology of depression in these subjects.

Keywords: cytokines, brain, depression, colorectal cancer

Procedia PDF Downloads 268
8073 Maritime English Communication Training for Japanese VTS Operators in the Congested Area Including the Narrow Channel of Akashi Strait

Authors: Kenji Tanaka, Kazumi Sugita, Yuto Mizushima

Abstract:

This paper introduces a noteworthy form of English communication training for the officers and operators of the Osaka-Bay Marine Traffic Information Service (Osaka MARTIS) of the Japan Coast Guard working in the congested area at the Akashi Strait in Hyogo Prefecture, Japan. The authors of this paper, Marine Technical College’s (MTC) English language instructors, have been holding about forty lectures and exercises in basic and normal Maritime English (ME) for several groups of MARTIS personnel at Osaka MARTIS annually since they started the training in 2005. Trainees are expected to be qualified Maritime Third-Class Radio Operators who are responsible for providing safety information to a daily average of seven to eight hundred vessels that pass through the Akashi Strait, one of Japan’s narrowest channels. As of 2022, the instructors are conducting 55 remote lessons at MARTIS. One lesson is 90 minutes long. All 26 trainees are given oral and written assessments. The trainees need to pass the examination to become qualified operators every year, requiring them to train and maintain their linguistic levels even during the pandemic of Corona Virus Disease-19 (COVID-19). The vessel traffic information provided by Osaka MARTIS in Maritime English language is essential to the work involving the use of very high frequency (VHF) communication between MARTIS and vessels in the area. ME is the common language mainly used on board merchant, fishing, and recreational vessels, normally at sea. ME was edited and recommended by the International Maritime Organization in the 1970s, was revised in 2002, and has undergone continual revision. The vessel’s circumstances are much more serious at the strait than those at the open sea, so these vessels need ME to receive guidance from the center when passing through the narrow strait. The imminent and challenging situations at the strait necessitate that textbooks’ contents include the basics of the phrase book for seafarers as well as specific and additional navigational information, pronunciation exercises, notes on keywords and phrases, explanations about collocations, sample sentences, and explanations about the differences between synonyms especially those focusing on terminologies necessary for passing through the strait. Additionally, short Japanese-English translation quizzes about these topics, as well as prescribed readings about the maritime sector, are include in the textbook. All of these exercises have been trained in the remote education system since the outbreak of COVID-19. According to the guidelines of ME edited in 2009, the lowest level necessary for seafarers is B1 (lower individual users) of The Common European Framework of Reference for Languages: Learning, Teaching, Assessment (CEFR). Therefore, this vocational ME language training at Osaka MARTIS aims for its trainees to communicate at levels higher than B1. A noteworthy proof of improvement from this training is that most of the trainees have become qualified marine radio communication officers.

Keywords: akashi strait, B1 of CEFR, maritime english communication training, osaka martis

Procedia PDF Downloads 120
8072 Clinical Validation of an Automated Natural Language Processing Algorithm for Finding COVID-19 Symptoms and Complications in Patient Notes

Authors: Karolina Wieczorek, Sophie Wiliams

Abstract:

Introduction: Patient data is often collected in Electronic Health Record Systems (EHR) for purposes such as providing care as well as reporting data. This information can be re-used to validate data models in clinical trials or in epidemiological studies. Manual validation of automated tools is vital to pick up errors in processing and to provide confidence in the output. Mentioning a disease in a discharge letter does not necessarily mean that a patient suffers from this disease. Many of them discuss a diagnostic process, different tests, or discuss whether a patient has a certain disease. The COVID-19 dataset in this study used natural language processing (NLP), an automated algorithm which extracts information related to COVID-19 symptoms, complications, and medications prescribed within the hospital. Free-text patient clinical patient notes are rich sources of information which contain patient data not captured in a structured form, hence the use of named entity recognition (NER) to capture additional information. Methods: Patient data (discharge summary letters) were exported and screened by an algorithm to pick up relevant terms related to COVID-19. Manual validation of automated tools is vital to pick up errors in processing and to provide confidence in the output. A list of 124 Systematized Nomenclature of Medicine (SNOMED) Clinical Terms has been provided in Excel with corresponding IDs. Two independent medical student researchers were provided with a dictionary of SNOMED list of terms to refer to when screening the notes. They worked on two separate datasets called "A” and "B”, respectively. Notes were screened to check if the correct term had been picked-up by the algorithm to ensure that negated terms were not picked up. Results: Its implementation in the hospital began on March 31, 2020, and the first EHR-derived extract was generated for use in an audit study on June 04, 2020. The dataset has contributed to large, priority clinical trials (including International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC) by bulk upload to REDcap research databases) and local research and audit studies. Successful sharing of EHR-extracted datasets requires communicating the provenance and quality, including completeness and accuracy of this data. The results of the validation of the algorithm were the following: precision (0.907), recall (0.416), and F-score test (0.570). Percentage enhancement with NLP extracted terms compared to regular data extraction alone was low (0.3%) for relatively well-documented data such as previous medical history but higher (16.6%, 29.53%, 30.3%, 45.1%) for complications, presenting illness, chronic procedures, acute procedures respectively. Conclusions: This automated NLP algorithm is shown to be useful in facilitating patient data analysis and has the potential to be used in more large-scale clinical trials to assess potential study exclusion criteria for participants in the development of vaccines.

Keywords: automated, algorithm, NLP, COVID-19

Procedia PDF Downloads 97
8071 Food Safety and Quality Assurance and Skills Development among Farmers in Georgia

Authors: Kakha Nadiardze, Nana Phirosmanashvili

Abstract:

The goal of this paper is to present the problems of lack of information among farmers in food safety. Global food supply chains are becoming more and more diverse, making traceability systems much harder to implement across different food markets. In this abstract, we will present our work for analyzing the key developments in Georgian food market from regulatory controls to administrative procedures to traceability technologies. Food safety and quality assurance are most problematic issues in Georgia as food trade networks become more and more complex, food businesses are under more and more pressure to ensure that their products are safe and authentic. The theme follow-up principles from farm to table must be top-of-mind for all food manufacturers, farmers and retailers. Following the E. coli breakout last year, as well as more recent cases of food mislabeling, developments in food traceability systems is essential to food businesses if they are to present a credible brand image. Alongside this are the ever-developing technologies in food traceability networks, technologies that manufacturers and retailers need to be aware of if they are to keep up with food safety regulations and avoid recall. How to examine best practice in food management is the main question in order to protect company brand through safe and authenticated food. We are working with our farmers to work with our food safety experts and technology developers throughout the food supply chain. We provide time by time food analyses on heavy metals, pesticide residues and different pollutants. We are disseminating information among farmers how the latest food safety regulations will impact the methods to use to identify risks within their products.

Keywords: food safety, GMO, LMO, E. coli, quality

Procedia PDF Downloads 507
8070 A Preliminary Literature Review of Digital Transformation Case Studies

Authors: Vesna Bosilj Vukšić, Lucija Ivančić, Dalia Suša Vugec

Abstract:

While struggling to succeed in today’s complex market environment and provide better customer experience and services, enterprises encompass digital transformation as a means for reaching competitiveness and foster value creation. A digital transformation process consists of information technology implementation projects, as well as organizational factors such as top management support, digital transformation strategy, and organizational changes. However, to the best of our knowledge, there is little evidence about digital transformation endeavors in organizations and how they perceive it – is it only about digital technologies adoption or a true organizational shift is needed? In order to address this issue and as the first step in our research project, a literature review is conducted. The analysis included case study papers from Scopus and Web of Science databases. The following attributes are considered for classification and analysis of papers: time component; country of case origin; case industry and; digital transformation concept comprehension, i.e. focus. Research showed that organizations – public, as well as private ones, are aware of change necessity and employ digital transformation projects. Also, the changes concerning digital transformation affect both manufacturing and service-based industries. Furthermore, we discovered that organizations understand that besides technologies implementation, organizational changes must also be adopted. However, with only 29 relevant papers identified, research positioned digital transformation as an unexplored and emerging phenomenon in information systems research. The scarcity of evidence-based papers calls for further examination of this topic on cases from practice.

Keywords: digital strategy, digital technologies, digital transformation, literature review

Procedia PDF Downloads 214
8069 Evaluating the Implementation of Public Procurement Principles at Tendering Stage: SME Contractors' Perspective

Authors: Charles Poleni Mukumba, Kahilu Kajimo-Shakantu

Abstract:

Purpose: Principles of public procurement are the foundation of good public procurement, representing best practices in delivering public services by the government and its organs. They provide guidance in the public procurement cycle to achieve the best value for public resources. Tendering stage in the procurement cycle is the most critical, as tendering information is made available to bidders. The paper evaluates the implementation of public procurement principles at the tendering stage. Design/Methodology/Approach: The research was conducted by using qualitative methods with 18 SME contractors in Lusaka as the sample. The samples are business owners and managers of purposively selected SME contractors. The collected data was analysed using thematic and content analysis. Findings: The findings indicate inconsistency in accessing information critical for tendering success by bidders. Further, the findings suggest that adjustments to technical specifications are made to suit certain preferred bidders by procuring officials. Research Limitations/Implications: The interviews were limited to SME contractors registered with the national council for construction and involved in public sector construction works in Lusaka, Zambia. Practical Implications: Implementing principles of public procurement at the tendering stage creates equal, open, and fair competition for the bidders in cost terms to deliver standardised and quality works to the public sector. Original/Value: The findings reveal how principles of public procurement play a critical role in enhancing the efficient performance of the procurement cycle at the tendering stage.

Keywords: evaluating, implementation, public procurement principles, tendering stage, SME contractors

Procedia PDF Downloads 82
8068 Research on Autonomous Controllability of BeiDou Navigation Satellite System Based on Knowledge Transformation

Authors: Hang Ju, Changmin Zhu

Abstract:

The development level of the BeiDou Navigation Satellite System (BDS) can strongly reflect national defense strength as an important spatial information infrastructure. BDS can be not only used for military purposes, such as intelligence gathering, nuclear explosion monitoring, emergency communications, but also for location services, transportation, mapping, precision agriculture. In order to ensure the national defense security and the wide application of BDS in civil and military areas, BDS must be autonomous and controllable. As a complex system of knowledge-intensive, knowledge transformation runs through the whole process of research and development, production, operation, and maintenance of BDS. Based on the perspective of knowledge transformation, this paper expounds on the meaning of socialization, externalization, combination, and internalization of knowledge transformation, and the coupling relationship of autonomy and control on the basis of analyzing the status quo and problems of the autonomy and control of BDS. The autonomous and controllable framework of BDS based on knowledge transformation is constructed from six dimensions of management capability, R&D capability, technical capability, manufacturing capability, service support capability, and application capability. It can provide support for the smooth implementation of information security policy, provide a reference for the autonomy and control of the upstream and downstream industrial chains in Beidou, and provide a reference for the autonomous and controllable research of aerospace components, military measurement test equipment, and other related industries.

Keywords: knowledge transformation, BeiDou Navigation Satellite System, autonomy and control, framework

Procedia PDF Downloads 182
8067 Critical Discourse Analysis Approach to the Post-Feminist Representations in Ecommerce Livestreamings of Lipsticks

Authors: Haiyan Huang, Jan Blommaert, Ellen Van Praet

Abstract:

The embrace of neoliberal economic system in China has engendered the entry of global commodity capitalism into domestic Chinese market and ushered in the post-feminism that is closely associated with consumerism from western culture. Chinese women are instilled and thus hold the belief of empowering themselves and expressing their individualism through consumption. To unravel the consumerist ideologies embedded in Li’s discursive practices, we rely on critical discourse analysis (CDA) as our research framework. The data analyses suggest that cosmopolitanism and class are two repeating themes when Li engages in persuading consumerist behaviors from the female audience. Through hints and cues such as “going on business trips”, “traveling abroad”, “international brands” and among others, Li provides the access to and possibility of imagining cosmopolitan and middle class identity for his audience. Such yearning for western culture and global citizen identity also implicates the aspiration for a well-off socioeconomic status, proving that post-feminism in China not only embodies western consumerism but also implicates the struggle of class movement. These defining elements of choice and freedom are well-situated in contemporary Chinese society where women are enjoying more educational and economic independence than before. However a closer examination reveals conflicts between hegemonic discourse of post-feminism and the status quo. First, propagating women’s power through consumption obscure the entrenched gender inequality in China. Philosophies such as employment discrimination, equal payment, education right, etc., the cornerstones of feminism did not exist in China, leading to historical gender issues unsolved. Second, the lengthy broadcastings (which normally last more than 2 hours) featured with big discounts on products beg the question who are the real audience of ecommerce livestreaming. Seemingly addressing to young well-off Chinese females, Li’s discursive practice can be targeting at young but not wealthy girls who aspire to mimic the lifestyle of middle class women. By selling the idea of empowering and constructing identity through consuming beauty products (e.g., lipsticks), capitalists are endeavoring to create the post-feminism illusion and cause anxieties among Chinese females. Through in-depth analyses of hegemonic discourse on ecommerce livestreaming of lipsticks, the paper contributes to a better understanding of post-feminism in contemporary China and meanwhile illustrates the problems Chinese women face in securing power and equality.

Keywords: Chinese women, critical discourse analysis, ecommerce livestreaming, post-feminism

Procedia PDF Downloads 122
8066 Landscape Classification in North of Jordan by Integrated Approach of Remote Sensing and Geographic Information Systems

Authors: Taleb Odeh, Nizar Abu-Jaber, Nour Khries

Abstract:

The southern part of Wadi Al Yarmouk catchment area covers north of Jordan. It locates within latitudes 32° 20’ to 32° 45’N and longitudes 35° 42’ to 36° 23’ E and has an area of about 1426 km2. However, it has high relief topography where the elevation varies between 50 to 1100 meter above sea level. The variations in the topography causes different units of landforms, climatic zones, land covers and plant species. As a results of these different landscapes units exists in that region. Spatial planning is a major challenge in such a vital area for Jordan which could not be achieved without determining landscape units. However, an integrated approach of remote sensing and geographic information Systems (GIS) is an optimized tool to investigate and map landscape units of such a complicated area. Remote sensing has the capability to collect different land surface data, of large landscape areas, accurately and in different time periods. GIS has the ability of storage these land surface data, analyzing them spatially and present them in form of professional maps. We generated a geo-land surface data that include land cover, rock units, soil units, plant species and digital elevation model using ASTER image and Google Earth while analyzing geo-data spatially were done by ArcGIS 10.2 software. We found that there are twenty two different landscape units in the study area which they have to be considered for any spatial planning in order to avoid and environmental problems.

Keywords: landscape, spatial planning, GIS, spatial analysis, remote sensing

Procedia PDF Downloads 523
8065 Students Awareness on Reproductive Health Education in Sri Lanka

Authors: Ayomi Indika Irugalbandara

Abstract:

Reproductive Health (RE) education among Sri Lankan Adolescents (comprising one fifth inner population) remains unsatisfactory despite 91.8% of them completing primary education & 56.2 % receiving post secondary level education. The main reason for this large population not receiving satisfactory RH education is traditional values and longstanding taboos surrounding sexuality. The current study was undertaken with there objectives. The relevance of achieving them being to formulate RH educational policies and programs that address a sizable and sensitive chunk of the population thereby achieving the goal of mental and social well being and not merely the absence of reproductive disease or infirmity. This research was a descriptive study, using random sampling technique, sample of the study consisting of 160 adolescent in the age group of 16-19, studying in government schools in Sri Lanka. Questionnaire was the main instrument of data collection, qualitative and quantitative techniques were used in data analysis. According to the data it was revealed that a majority has some idea about RH education. While this awareness had been provided by the school, the source of information had been Health and Physical Education. The entire sample mentioned that more RH information, than was provided, should be given and everybody wanted further knowledge regarding sexuality, and in depth information on it was essential. About 96 adolescents were of the opinion that their behavior was respectful to elders and 64 felt embarrassed while communicating with elders regarding RH issues. About their preferred sources of information, both genders named health providers as their first choice, followed by family members and friends. The internet was cited by a few boys; less than 5 percent cited religious figures. More than 50% of respondents had no knowledge about abortion and they were unaware of dangerous abortion. The practice of abortion was reported among zero percent. Although every member of the sample did not possess knowledge of the scientific process involved in abortion, all of them totally rejected the idea of destroying a foetus. Adolescence is a critical period in the life of girls and boys and sexuality education empowers young people to protect their health and well-being. Schools have the proper staff, and environment for learning. It might be stated that the greater segment of individuals entering adolescents and going through their adolescence are still in the school. This becomes the reason why it is mandatory that the school should be geared to handle this critical stage of the students. Adolescents or those approaching adolescence are best educated by the relevant parents, but this being quite a sensitive issue in the socio cultural context, it is somewhat doubtful whether all parents are prepared to handle this candidly, due either to lack of knowledge or absence of the appropriate state of mind. As such it is best that seminars/workshops be conducted to enlighten parents on handling HR issues related to their adolescent children. Apart from the awareness on HR provided through the school curriculum a greater impact can be brought about through street dramas, exhibitions etc. specific to HR. Finally the researcher would like to suggest that Sunday schools be harnessed for the provision of HR education linked with cultural values, ethics, and social well-being.

Keywords: reproductive health, awareness, perception, school curriculum

Procedia PDF Downloads 543
8064 Groundwater Potential in the Central Part of Al Jabal Al Akhdar Area, Ne Libya

Authors: Maged El Osta, Milad Masoud

Abstract:

Al Jabal Al Akhdar in the north-eastern part of Libya represents a region with promising ecological underpinning for grazing and other agricultural developments. The groundwater potential of both Upper Cretaceous and Eocene aquifers was studied based the available literature and a complete database for about 112 water wells drilled in the period 2003-2009. In this research, the hydrogeological methods will be integrated with the Geographic Information System (GIS) that played a main role in highlighting the spatial characteristics of the groundwater system. The results indicate that the depth to water for the Upper Cretaceous aquifer ranges from 150 to 458 m, and the piezometric surface decreases from over 500 m (m.s.l) in the northern parts to -20 m (m.s.l) in southeastern part. Salinity ranges between 303 and 1329 mg/l indicating that groundwater belongs to the slightly fresh water class. In the Eocene aquifer, the depth to groundwater ranges from 120 to 290.5 m and the potentiometric level decreases gradually southwards from 220 to -51 m (m.s.l) and characterized by steep slope in the southeastern part of the study area, where the aquifer characterized by relatively high productivity (specific capacity ranges between 10.08 and 332.3 m2/day). The groundwater salinity within this aquifer ranges between 198 and 2800 mg/l (fresh to brackish water class). The annual average rainfall (from 280 to 500 mm) plays a significant role in the recharge of the two aquifers. The priority of groundwater quality and potentiality increases towards the central and northern portions of the concerned area.

Keywords: Eocene and Upper Cretaceous aquifers, rainfall, potentiality, Geographic Information System (GIS)

Procedia PDF Downloads 216
8063 Critically Analyzing the Application of Big Data for Smart Transportation: A Case Study of Mumbai

Authors: Tanuj Joshi

Abstract:

Smart transportation is fast emerging as a solution to modern cities’ approach mobility issues, delayed emergency response rate and high congestion on streets. Present day scenario with Google Maps, Waze, Yelp etc. demonstrates how information and communications technologies controls the intelligent transportation system. This intangible and invisible infrastructure is largely guided by the big data analytics. On the other side, the exponential increase in Indian urban population has intensified the demand for better services and infrastructure to satisfy the transportation needs of its citizens. No doubt, India’s huge internet usage is looked as an important resource to guide to achieve this. However, with a projected number of over 40 billion objects connected to the Internet by 2025, the need for systems to handle massive volume of data (big data) also arises. This research paper attempts to identify the ways of exploiting the big data variables which will aid commuters on Indian tracks. This study explores real life inputs by conducting survey and interviews to identify which gaps need to be targeted to better satisfy the customers. Several experts at Mumbai Metropolitan Region Development Authority (MMRDA), Mumbai Metro and Brihanmumbai Electric Supply and Transport (BEST) were interviewed regarding the Information Technology (IT) systems currently in use. The interviews give relevant insights and requirements into the workings of public transportation systems whereas the survey investigates the macro situation.

Keywords: smart transportation, mobility issue, Mumbai transportation, big data, data analysis

Procedia PDF Downloads 172
8062 Text Localization in Fixed-Layout Documents Using Convolutional Networks in a Coarse-to-Fine Manner

Authors: Beier Zhu, Rui Zhang, Qi Song

Abstract:

Text contained within fixed-layout documents can be of great semantic value and so requires a high localization accuracy, such as ID cards, invoices, cheques, and passports. Recently, algorithms based on deep convolutional networks achieve high performance on text detection tasks. However, for text localization in fixed-layout documents, such algorithms detect word bounding boxes individually, which ignores the layout information. This paper presents a novel architecture built on convolutional neural networks (CNNs). A global text localization network and a regional bounding-box regression network are introduced to tackle the problem in a coarse-to-fine manner. The text localization network simultaneously locates word bounding points, which takes the layout information into account. The bounding-box regression network inputs the features pooled from arbitrarily sized RoIs and refine the localizations. These two networks share their convolutional features and are trained jointly. A typical type of fixed-layout documents: ID cards, is selected to evaluate the effectiveness of the proposed system. These networks are trained on data cropped from nature scene images, and synthetic data produced by a synthetic text generation engine. Experiments show that our approach locates high accuracy word bounding boxes and achieves state-of-the-art performance.

Keywords: bounding box regression, convolutional networks, fixed-layout documents, text localization

Procedia PDF Downloads 190
8061 Development and Testing of Health Literacy Scales for Chinese Primary and Secondary School Students

Authors: Jiayue Guo, Lili You

Abstract:

Background: Children and adolescent health are crucial for both personal well-being and the nation's future health landscape. Health Literacy (HL) is important in enabling adolescents to self-manage their health, a fundamental step towards health empowerment. However, there are limited tools for assessing HL among elementary and junior high school students. This study aims to construct and validate a test-based HL scale for Chinese students, offering a scientific reference for cross-cultural HL tool development. Methods: We conducted a cross-sectional online survey. Participants were recruited from a stratified cluster random sampling method, a total of 4189 Chinese in-school primary and secondary students. The development of the scale was completed by defining the concept of HL, establishing the item indicator system, screening items (7 health content dimensions), and evaluating reliability and validity. Delphi method expert consultation was used to screen items, the Rasch model was conducted for quality analysis, and Cronbach’s alpha coefficient was used to examine the internal consistency. Results: We developed four versions of the HL scale, each with a total score of 100, encompassing seven key health areas: hygiene, nutrition, physical activity, mental health, disease prevention, safety awareness, and digital health literacy. Each version measures four dimensions of health competencies: knowledge, skills, motivation, and behavior. After the second round of expert consultation, the average importance score of each item by experts is 4.5–5.0, and the coefficient of variation is 0.000–0.174. The knowledge and skills dimensions are judgment-based and multiple-choice questions, with the Rasch model confirming unidimensionality at a 5.7% residual variance. The behavioral and motivational dimensions, measured with scale-type items, demonstrated internal consistency via Cronbach's alpha and strong inter-item correlation with KMO values of 0.924 and 0.787, respectively. Bartlett's test of sphericity, with p-values <0.001, further substantiates the scale's reliability. Conclusions: The new test-based scale, designed to evaluate competencies within a multifaceted framework, aligns with current international adolescent literacy theories and China's health education policies, focusing not only on knowledge acquisition but also on the application of health-related thinking and behaviors. The scale can be used as a comprehensive tool for HL evaluation and a reference for other countries.

Keywords: adolescent health, Chinese, health literacy, rasch model, scale development

Procedia PDF Downloads 22
8060 Need for a Tailor Made HIV Prevention Services to the Migrants Community: Evidence from Implementing Migrant Service Delivery System (MSDS) among Migrant Workers, National AIDS Control Program, and India

Authors: Debasish Chowdhury, Sunil Mekale, Sarvanamurthy Sakthivel, Sukhvinder Kaur, Rambabu Khambampati, Ashok Agarwal

Abstract:

Introduction: The migrant intervention in India was initiated during the National AIDS Control Program (NACP) Phase-2 (2002-2007). HIV Sentinel surveillance Studies (HSS) conducted in 2012-13 indicated higher HIV prevalence among migrants (0.99%) compared to general populations (0.35%). Migrants continue to bear a heightened risk of HIV infection which results from the condition and structure of the migration process. USAID PHFI-PIPPSE project in collaboration with the National AIDS Control Organization (NACO) developed a unique system called Migrant Service Delivery System (MSDS) to capture migrants profile with respect to their risk profile and to provide tailor made services to them. Description: MSDS is a web-based system, designed and implemented to increase service uptake among migrants through evidence based planning. 110 destination migrants Targeted Intervention (TI) from 11 states were selected for study with varied target populations in terms of occupations; to understand occupation related risk behaviors among the migrants. Occupation wise registration data of high risk vulnerable migrants were analyzed through MSDS for the period April 2014–June 2016. Analysis was made on specific indicators among these occupational groups to understand the risk behavior and their vulnerability to HIV and STIs. Findings: Out of total HIV positive migrant’s workers (N= 847) enrolled in MSDS HIV rate is found to be highest among Auto-Rickshaw (18.66%) followed by Daily wage laborers (14.46%), Loom workers (10.73%), Industrial workers (10.04%) and Construction worker 7.93%. With 45.14% positivity, industrial workers are found to be most vulnerable to Sexually Transmitted Infections (STIs) (N=10057) among all occupational categories followed by loom workers (16.28%), Skilled worker (Furniture, Jeweler)-7.14%, daily wage laborers (5.45%). Conclusion: MSDS is an effective tool to assess migrants’ risk and their vulnerability to HIV for designing evidence informed program. This system calls for a replication across all destination TIs by NACO for differential strategies for different occupation groups to ensure better yield through scientific planning of intervention among high risk and high vulnerable migrants.

Keywords: migrants, migrant service delivery system, risk, vulnerability

Procedia PDF Downloads 266
8059 Mass Media Products Consumption Patterns in Rural South-South, Nigeria Communities

Authors: Inemesit Akpan Umoren, Aniekan James Akpan

Abstract:

Media practitioners and information managers have often erroneously operated on the premise that media messages are received as disseminated to the extent that audiences of whatever background assimilate the content uniformly. This does not subsist since media audiences are often segmented in terms of educational level, social category, place of residence, gender, among others. While those who are highly educated, live in urban areas and are of highest standing are more likely to have direct access to the media, those in the rural areas and of low education and standing, may not have direct or easy access. These, therefore, informed the study to establish the consumption patterns of mass media products by residents of rural communities in south-south, Nigeria. The study, which was anchored on the multi-step flow and social categories theories, adopted a survey research design and a sample of 383 using Mayer’s 1979 guide drawn from nine rural communities in the south-south, Nigeria states of Akwa Ibom, Rivers and Edo. Findings among others showed that while a negligible percentage is highly exposed to media messages of all types, a greater member depend on opinion leaders, social groups, drinking joints, among other such for filtered content. It was concluded that since rural or community media organizations are very vital in ensuring media content get to all audience without necessarily being passing through intermediaries. Among the recommendations was that information managers and media organizations should always have in mind the ruralites while packaging their contents even in the mainstream media.

Keywords: consumption, media, media product, pattern

Procedia PDF Downloads 141
8058 Numerical Solution of Momentum Equations Using Finite Difference Method for Newtonian Flows in Two-Dimensional Cartesian Coordinate System

Authors: Ali Ateş, Ansar B. Mwimbo, Ali H. Abdulkarim

Abstract:

General transport equation has a wide range of application in Fluid Mechanics and Heat Transfer problems. In this equation, generally when φ variable which represents a flow property is used to represent fluid velocity component, general transport equation turns into momentum equations or with its well known name Navier-Stokes equations. In these non-linear differential equations instead of seeking for analytic solutions, preferring numerical solutions is a more frequently used procedure. Finite difference method is a commonly used numerical solution method. In these equations using velocity and pressure gradients instead of stress tensors decreases the number of unknowns. Also, continuity equation, by integrating the system, number of equations is obtained as number of unknowns. In this situation, velocity and pressure components emerge as two important parameters. In the solution of differential equation system, velocities and pressures must be solved together. However, in the considered grid system, when pressure and velocity values are jointly solved for the same nodal points some problems confront us. To overcome this problem, using staggered grid system is a referred solution method. For the computerized solutions of the staggered grid system various algorithms were developed. From these, two most commonly used are SIMPLE and SIMPLER algorithms. In this study Navier-Stokes equations were numerically solved for Newtonian flow, whose mass or gravitational forces were neglected, for incompressible and laminar fluid, as a hydro dynamically fully developed region and in two dimensional cartesian coordinate system. Finite difference method was chosen as the solution method. This is a parametric study in which varying values of velocity components, pressure and Reynolds numbers were used. Differential equations were discritized using central difference and hybrid scheme. The discritized equation system was solved by Gauss-Siedel iteration method. SIMPLE and SIMPLER were used as solution algorithms. The obtained results, were compared for central difference and hybrid as discritization methods. Also, as solution algorithm, SIMPLE algorithm and SIMPLER algorithm were compared to each other. As a result, it was observed that hybrid discritization method gave better results over a larger area. Furthermore, as computer solution algorithm, besides some disadvantages, it can be said that SIMPLER algorithm is more practical and gave result in short time. For this study, a code was developed in DELPHI programming language. The values obtained in a computer program were converted into graphs and discussed. During sketching, the quality of the graph was increased by adding intermediate values to the obtained result values using Lagrange interpolation formula. For the solution of the system, number of grid and node was found as an estimated. At the same time, to indicate that the obtained results are satisfactory enough, by doing independent analysis from the grid (GCI analysis) for coarse, medium and fine grid system solution domain was obtained. It was observed that when graphs and program outputs were compared with similar studies highly satisfactory results were achieved.

Keywords: finite difference method, GCI analysis, numerical solution of the Navier-Stokes equations, SIMPLE and SIMPLER algoritms

Procedia PDF Downloads 386
8057 The Challenge of Assessing Social AI Threats

Authors: Kitty Kioskli, Theofanis Fotis, Nineta Polemi

Abstract:

The European Union (EU) directive Artificial Intelligence (AI) Act in Article 9 requires that risk management of AI systems includes both technical and human oversight, while according to NIST_AI_RFM (Appendix C) and ENISA AI Framework recommendations, claim that further research is needed to understand the current limitations of social threats and human-AI interaction. AI threats within social contexts significantly affect the security and trustworthiness of the AI systems; they are interrelated and trigger technical threats as well. For example, lack of explainability (e.g. the complexity of models can be challenging for stakeholders to grasp) leads to misunderstandings, biases, and erroneous decisions. Which in turn impact the privacy, security, accountability of the AI systems. Based on the NIST four fundamental criteria for explainability it can also classify the explainability threats into four (4) sub-categories: a) Lack of supporting evidence: AI systems must provide supporting evidence or reasons for all their outputs. b) Lack of Understandability: Explanations offered by systems should be comprehensible to individual users. c) Lack of Accuracy: The provided explanation should accurately represent the system's process of generating outputs. d) Out of scope: The system should only function within its designated conditions or when it possesses sufficient confidence in its outputs. Biases may also stem from historical data reflecting undesired behaviors. When present in the data, biases can permeate the models trained on them, thereby influencing the security and trustworthiness of the of AI systems. Social related AI threats are recognized by various initiatives (e.g., EU Ethics Guidelines for Trustworthy AI), standards (e.g. ISO/IEC TR 24368:2022 on AI ethical concerns, ISO/IEC AWI 42105 on guidance for human oversight of AI systems) and EU legislation (e.g. the General Data Protection Regulation 2016/679, the NIS 2 Directive 2022/2555, the Directive on the Resilience of Critical Entities 2022/2557, the EU AI Act, the Cyber Resilience Act). Measuring social threats, estimating the risks to AI systems associated to these threats and mitigating them is a research challenge. In this paper it will present the efforts of two European Commission Projects (FAITH and THEMIS) from the HorizonEurope programme that analyse the social threats by building cyber-social exercises in order to study human behaviour, traits, cognitive ability, personality, attitudes, interests, and other socio-technical profile characteristics. The research in these projects also include the development of measurements and scales (psychometrics) for human-related vulnerabilities that can be used in estimating more realistically the vulnerability severity, enhancing the CVSS4.0 measurement.

Keywords: social threats, artificial Intelligence, mitigation, social experiment

Procedia PDF Downloads 59
8056 Modelling Agricultural Commodity Price Volatility with Markov-Switching Regression, Single Regime GARCH and Markov-Switching GARCH Models: Empirical Evidence from South Africa

Authors: Yegnanew A. Shiferaw

Abstract:

Background: commodity price volatility originating from excessive commodity price fluctuation has been a global problem especially after the recent financial crises. Volatility is a measure of risk or uncertainty in financial analysis. It plays a vital role in risk management, portfolio management, and pricing equity. Objectives: the core objective of this paper is to examine the relationship between the prices of agricultural commodities with oil price, gas price, coal price and exchange rate (USD/Rand). In addition, the paper tries to fit an appropriate model that best describes the log return price volatility and estimate Value-at-Risk and expected shortfall. Data and methods: the data used in this study are the daily returns of agricultural commodity prices from 02 January 2007 to 31st October 2016. The data sets consists of the daily returns of agricultural commodity prices namely: white maize, yellow maize, wheat, sunflower, soya, corn, and sorghum. The paper applies the three-state Markov-switching (MS) regression, the standard single-regime GARCH and the two regime Markov-switching GARCH (MS-GARCH) models. Results: to choose the best fit model, the log-likelihood function, Akaike information criterion (AIC), Bayesian information criterion (BIC) and deviance information criterion (DIC) are employed under three distributions for innovations. The results indicate that: (i) the price of agricultural commodities was found to be significantly associated with the price of coal, price of natural gas, price of oil and exchange rate, (ii) for all agricultural commodities except sunflower, k=3 had higher log-likelihood values and lower AIC and BIC values. Thus, the three-state MS regression model outperformed the two-state MS regression model (iii) MS-GARCH(1,1) with generalized error distribution (ged) innovation performs best for white maize and yellow maize; MS-GARCH(1,1) with student-t distribution (std) innovation performs better for sorghum; MS-gjrGARCH(1,1) with ged innovation performs better for wheat, sunflower and soya and MS-GARCH(1,1) with std innovation performs better for corn. In conclusion, this paper provided a practical guide for modelling agricultural commodity prices by MS regression and MS-GARCH processes. This paper can be good as a reference when facing modelling agricultural commodity price problems.

Keywords: commodity prices, MS-GARCH model, MS regression model, South Africa, volatility

Procedia PDF Downloads 198
8055 SPBAC: A Semantic Policy-Based Access Control for Database Query

Authors: Aaron Zhang, Alimire Kahaer, Gerald Weber, Nalin Arachchilage

Abstract:

Access control is an essential safeguard for the security of enterprise data, which controls users’ access to information resources and ensures the confidentiality and integrity of information resources [1]. Research shows that the more common types of access control now have shortcomings [2]. In this direction, to improve the existing access control, we have studied the current technologies in the field of data security, deeply investigated the previous data access control policies and their problems, identified the existing deficiencies, and proposed a new extension structure of SPBAC. SPBAC extension proposed in this paper aims to combine Policy-Based Access Control (PBAC) with semantics to provide logically connected, real-time data access functionality by establishing associations between enterprise data through semantics. Our design combines policies with linked data through semantics to create a "Semantic link" so that access control is no longer per-database and determines that users in each role should be granted access based on the instance policy, and improves the SPBAC implementation by constructing policies and defined attributes through the XACML specification, which is designed to extend on the original XACML model. While providing relevant design solutions, this paper hopes to continue to study the feasibility and subsequent implementation of related work at a later stage.

Keywords: access control, semantic policy-based access control, semantic link, access control model, instance policy, XACML

Procedia PDF Downloads 83
8054 Optimization for Autonomous Robotic Construction by Visual Guidance through Machine Learning

Authors: Yangzhi Li

Abstract:

Network transfer of information and performance customization is now a viable method of digital industrial production in the era of Industry 4.0. Robot platforms and network platforms have grown more important in digital design and construction. The pressing need for novel building techniques is driven by the growing labor scarcity problem and increased awareness of construction safety. Robotic approaches in construction research are regarded as an extension of operational and production tools. Several technological theories related to robot autonomous recognition, which include high-performance computing, physical system modeling, extensive sensor coordination, and dataset deep learning, have not been explored using intelligent construction. Relevant transdisciplinary theory and practice research still has specific gaps. Optimizing high-performance computing and autonomous recognition visual guidance technologies improves the robot's grasp of the scene and capacity for autonomous operation. Intelligent vision guidance technology for industrial robots has a serious issue with camera calibration, and the use of intelligent visual guiding and identification technologies for industrial robots in industrial production has strict accuracy requirements. It can be considered that visual recognition systems have challenges with precision issues. In such a situation, it will directly impact the effectiveness and standard of industrial production, necessitating a strengthening of the visual guiding study on positioning precision in recognition technology. To best facilitate the handling of complicated components, an approach for the visual recognition of parts utilizing machine learning algorithms is proposed. This study will identify the position of target components by detecting the information at the boundary and corner of a dense point cloud and determining the aspect ratio in accordance with the guidelines for the modularization of building components. To collect and use components, operational processing systems assign them to the same coordinate system based on their locations and postures. The RGB image's inclination detection and the depth image's verification will be used to determine the component's present posture. Finally, a virtual environment model for the robot's obstacle-avoidance route will be constructed using the point cloud information.

Keywords: robotic construction, robotic assembly, visual guidance, machine learning

Procedia PDF Downloads 84
8053 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 206
8052 Scoping Review of the Potential to Embed Mental Health Impact in Global Challenges Research

Authors: Netalie Shloim, Brian Brown, Siobhan Hugh-Jones, Jane Plastow, Diana Setiyawati, Anna Madill

Abstract:

In June 2021, the World Health Organization launched its guidance and technical packages on community mental health services, stressing a human rights-based approach to care. This initiative stems from an increasing acknowledgment of the role mental health plays in achieving the Sustainable Development Goals. Nevertheless, mental health remains a relatively neglected research area and the estimates for untreated mental disorders in low-and-middle-income countries (LMICs) are as high as 78% for adults. Moreover, the development sector and research programs too often side-line mental health as a privilege in the face of often immediate threats to life and livelihood. As a way of addressing this problem, this study aimed to examine past or ongoing GCRF projects to see if there were opportunities where mental health impact could have been achieved without compromising a study's main aim and without overburdening a project. Projects funded by the UKRI Global Challenges Research Fund (GCRF) were analyzed. This program was initiated in 2015 to support cutting-edge research that addresses the challenges faced by developing countries. By the end of May 2020, a total of 15,279 projects were funded of which only 3% had an explicit mental health focus. A sample of 36 non-mental-health-focused projects was then sampled for diversity across research council, challenge portfolio and world region. Each of these 36 projects was coded by two coders for opportunities to embed mental health impact. To facilitate coding, the literature was inspected for dimensions relevant to LMIC settings. Three main psychological and three main social dimensions were identified: promote a positive sense of self; promote positive emotions, safe expression and regulation of challenging emotions, coping strategies, and help-seeking; facilitate skills development; and facilitate community-building; preserve sociocultural identity; support community mobilization. Coding agreement was strong on missed opportunities for mental health impact on the three social dimensions: support community mobilization (92%), facilitate community building (83%), preserve socio-cultural identity (70%). Coding agreement was reasonably strong on missed opportunities for mental health impact on the three psychological dimensions: promote positive emotions (67%), facilitate skills development (61%), positive sense of self (58%). In order of frequency, the agreed perceived opportunities from the highest to lowest are: support community mobilization, facilitate community building, facilitate skills development, promote a positive sense of self, promote positive emotions, preserve sociocultural identity. All projects were considered to have an opportunity to support community mobilization and to facilitate skills development by at least one coder. Findings provided support that there were opportunities to embed mental health impact in research across the range of development sectors and identifies what kind of missed opportunities are most frequent. Hence, mainstreaming mental health has huge potential to tackle the lack of priority and funding it has attracted traditionally. The next steps are to understand the barriers to mainstreaming mental health and to work together to overcome them.

Keywords: GCRF, mental health, psychosocial wellbeing, LMIC

Procedia PDF Downloads 172
8051 Extraction and Electrochemical Behaviors of Au(III) using Phosphonium-Based Ionic Liquids

Authors: Kyohei Yoshino, Masahiko Matsumiya, Yuji Sasaki

Abstract:

Recently, studies have been conducted on Au(III) extraction using ionic liquids (ILs) as extractants or diluents. ILs such as piperidinium, pyrrolidinium, and pyridinium have been studied as extractants for noble metal extractions. Furthermore, the polarity, hydrophobicity, and solvent miscibility of these ILs can be adjusted depending on their intended use. Therefore, the unique properties of ILs make them functional extraction media. The extraction mechanism of Au(III) using phosphonium-based ILs and relevant thermodynamic studies are yet to be reported. In the present work, we focused on the mechanism of Au(III) extraction and related thermodynamic analyses using phosphonium-based ILs. Triethyl-n-pentyl, triethyl-n-octyl, and triethyl-n-dodecyl phosphonium bis(trifluoromethyl-sulfonyl)amide, [P₂₂₂ₓ][NTf₂], (X = 5, 8, and 12) were investigated for Au(III) extraction. The IL–Au complex was identified as [P₂₂₂₅][AuCl₄] using UV–Vis–NIR and Raman spectroscopic analyses. The extraction behavior of Au(III) was investigated with a change in the [P₂₂₂ₓ][NTf₂]IL concentration from 1.0 × 10–4 to 1.0 × 10–1 mol dm−3. The results indicate that Au(III) can be easily extracted by the anion-exchange reaction in the [P₂₂₂ₓ][NTf₂]IL. The slope range 0.96–1.01 on the plot of log D vs log[P₂₂₂ₓ][NTf2]IL indicates the association of one mole of IL with one mole of [AuCl4−] during extraction. Consequently, [P₂₂₂ₓ][NTf₂] is an anion-exchange extractant for the extraction of Au(III) in the form of anions from chloride media. Thus, this type of phosphonium-based IL proceeds via an anion exchange reaction with Au(III). In order to evaluate the thermodynamic parameters on the Au(III) extraction, the equilibrium constant (logKₑₓ’) was determined from the temperature dependence. The plot of the natural logarithm of Kₑₓ’ vs the inverse of the absolute temperature (T–1) yields a slope proportional to the enthalpy (ΔH). By plotting T–1 vs lnKₑₓ’, a line with a slope range 1.129–1.421 was obtained. Thus, the result indicated that the extraction reaction of Au(III) using the [P₂₂₂ₓ][NTf₂]IL (X=5, 8, and 12) was exothermic (ΔH=-9.39〜-11.81 kJ mol-1). The negative value of TΔS (-4.20〜-5.27 kJ mol-1) indicates that microscopic randomness is preferred in the [P₂₂₂₅][NTf₂]IL extraction system over [P₂₂₂₁₂][NTf₂]IL. The total negative alternation in Gibbs energy (-5.19〜-6.55 kJ mol-1) for the extraction reaction would thus be relatively influenced by the TΔS value on the number of carbon atoms in the alkyl side length, even if the efficiency of ΔH is significantly influenced by the total negative alternations in Gibbs energy. Electrochemical analysis revealed that extracted Au(III) can be reduced in two steps: (i) Au(III)/Au(I) and (ii) Au(I)/Au(0). The diffusion coefficients of the extracted Au(III) species in [P₂₂₂ₓ][NTf₂] (X = 5, 8, and 12) were evaluated from 323 to 373 K using semi-integral and semi-differential analyses. Because of the viscosity of the IL medium, the diffusion coefficient of the extracted Au(III) increases with increasing alkyl chain length. The 4f7/2 spectrum based on X-ray photoelectron spectroscopy revealed that the Au electrodeposits obtained after 10 cycles of continuous extraction and electrodeposition were in the metallic state.

Keywords: au(III), electrodeposition, phosphonium-based ionic liquids, solvent extraction

Procedia PDF Downloads 98
8050 Normalized Difference Vegetation Index and Normalize Difference Chlorophyll Changes with Different Irrigation Levels on Sillage Corn

Authors: Cenk Aksit, Suleyman Kodal, Yusuf Ersoy Yildirim

Abstract:

Normalized Difference Vegetation Index (NDVI) is a widely used index in the world that provides reference information, such as the health status of the plant, and the density of the vegetation in a certain area, by making use of the electromagnetic radiation reflected from the plant surface. On the other hand, the chlorophyll index provides reference information about the chlorophyll density in the plant by making use of electromagnetic reflections at certain wavelengths. Chlorophyll concentration is higher in healthy plants and decreases as plant health decreases. This study, it was aimed to determine the changes in Normalize Difference Vegetation Index (NDVI) and Normalize Difference Chlorophyll (NDCI) of silage corn irrigated with subsurface drip irrigation systems under different irrigation levels. In 5 days irrigation interval, the daily potential plant water consumption values were collected, and the calculated amount was applied to the full irrigation and 3 irrigation water levels as irrigation water. The changes in NDVI and NDCI of silage corn irrigated with subsurface drip irrigation systems under different irrigation levels were determined. NDVI values have changed according to the amount of irrigation water applied, and the highest NDVI value has been reached in the subject where the most water is applied. Likewise, it was observed that the chlorophyll value decreased in direct proportion to the amount of irrigation water as the plant approached the harvest.

Keywords: NDVI, NDCI, sub-surface drip irrigation, silage corn, deficit irrigation

Procedia PDF Downloads 92
8049 Saadi: The Matter of Reality and Imagination

Authors: Mozhde Shafie, Nahid Naderi, Mandana Mangeli

Abstract:

Is it true to say that Saadi was an idealized embodiment of his moral teachings in Gulistan and Boustan? The body of criticism on Saadi’s works suggests that his biography provides no clear and valid information to judge about the extent to which Saadi acted what he preached. His moral teachings depict a sort of individual and social morality which is defined in relation to power and falls in the category of political ethics. Political ethics appear as for the noble and the subordinate in Gulistan and Boustan. Ethics for the noble include all his teachings for governors and rulers in eulogies. On the other hand, ethics for the subordinate include all his suggestions for the public in relation to power position. Here, Saadi puts forward some conservative recommendations that trigger some contemporary critical commentaries. However, there are some cases where he takes up a third person narrative position to narrate the story of a king and a mendicant. In these stories, the mendicant is a witty man with bitter criticism on society, implying that one should relinquish earthly pleasures and advantages if he wants his criticism to be acceptable. First person narratives fall in two categories determinate and indeterminate narratives. Indirect speeches reflecting biographical facts are indeterminate narratives which give no information about the poet’s personality. Other narratives are more of an autobiography that report probable observations. These latter narratives demonstrate Saadi as a man quick at repartee that feels free to disclose his poverty and some cases of impiety. Therefore, they provide no idealized picture of the poet in terms of ethical principles.

Keywords: Saadi, ethics, Boustan, Gulistan, first-person narrative

Procedia PDF Downloads 401
8048 Reading as Moral Afternoon Tea: An Empirical Study on the Compensation Effect between Literary Novel Reading and Readers’ Moral Motivation

Authors: Chong Jiang, Liang Zhao, Hua Jian, Xiaoguang Wang

Abstract:

The belief that there is a strong relationship between reading narrative and morality has generally become the basic assumption of scholars, philosophers, critics, and cultural critics. The virtuality constructed by literary novels inspires readers to regard the narrative as a thinking experiment, creating the distance between readers and events so that they can freely and morally experience the positions of different roles. Therefore, the virtual narrative combined with literary characteristics is always considered as a "moral laboratory." Well-established findings revealed that people show less lying and deceptive behaviors in the morning than in the afternoon, called the morning morality effect. As a limited self-regulation resource, morality will be constantly depleted with the change of time rhythm under the influence of the morning morality effect. It can also be compensated and restored in various ways, such as eating, sleeping, etc. As a common form of entertainment in modern society, literary novel reading gives people more virtual experience and emotional catharsis, just as a relaxing afternoon tea that helps people break away from fast-paced work, restore physical strength, and relieve stress in a short period of leisure. In this paper, inspired by the compensation control theory, we wonder whether reading literary novels in the digital environment could replenish a kind of spiritual energy for self-regulation to compensate for people's moral loss in the afternoon. Based on this assumption, we leverage the social annotation text content generated by readers in digital reading to represent the readers' reading attention. We then recognized the semantics and calculated the readers' moral motivation expressed in the annotations and investigated the fine-grained dynamics of the moral motivation changing in each time slot within 24 hours of a day. Comprehensively comparing the division of different time intervals, sufficient experiments showed that the moral motivation reflected in the annotations in the afternoon is significantly higher than that in the morning. The results robustly verified the hypothesis that reading compensates for moral motivation, which we called the moral afternoon tea effect. Moreover, we quantitatively identified that such moral compensation can last until 14:00 in the afternoon and 21:00 in the evening. In addition, it is interesting to find that the division of time intervals of different units impacts the identification of moral rhythms. Dividing the time intervals by four-hour time slot brings more insights of moral rhythms compared with that of three-hour and six-hour time slot.

Keywords: digital reading, social annotation, moral motivation, morning morality effect, control compensation

Procedia PDF Downloads 145