Search results for: early intervention services
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9376

Search results for: early intervention services

4816 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 359
4815 Managing the Cloud Procurement Process: Findings from a Case Study

Authors: Andreas Jede, Frank Teuteberg

Abstract:

Cloud computing (CC) has already gained overall appreciation in research and practice. Whereas the willingness to integrate cloud services in various IT environments is still unbroken, the previous CC procurement processes run mostly in an unorganized and non-standardized way. In practice, a sufficiently specific, yet applicable business process for the important acquisition phase is often lacking. And research does not appropriately remedy this deficiency yet. Therefore, this paper introduces a field-tested approach for CC procurement. Based on an extensive literature review and augmented by expert interviews, we designed a model that is validated and further refined through an in-depth real-life case study. For the detailed process description, we apply the event-driven process chain notation (EPC). The gained valuable insights into the case study may help CC research to shift to a more socio-technical area. For practice, next to giving useful organizational instructions we will provide extended checklists and lessons learned.

Keywords: cloud procurement process, IT-organization, event-driven process chain, in-depth case study

Procedia PDF Downloads 393
4814 Method for Evaluating the Monetary Value of a Customized Version of the Digital Twin for the Additive Manufacturing

Authors: Fabio Oettl, Sebastian Hoerbrand, Tobias Wittmeir, Johannes Schilp

Abstract:

By combining the additive manufacturing (AM)- process with digital concepts, like the digital twin (DT) or the downsized and basing concept of the digital part file (DPF), the competitiveness of additive manufacturing is enhanced and new use cases like decentral production are enabled. But in literature, one can´t find any quantitative approach for valuing the usage of a DT or DPF in AM. Out of this fact, such an approach will be developed within this paper in order to further promote or dissuade the usage of these concepts. The focus is set on the production as an early lifecycle phase, which means that the AM-production process gets analyzed regarding the potential advantages of using DPF in AM. These advantages are transferred to a monetary value with this approach. By calculating the costs of the DPF, an overall monetary value is a result. Thereon a tool, based on a simulation environment is constructed, where the algorithms are transformed into a program. The results of applying this tool show that an overall value of 20,81 € for the DPF can be realized for one special use case. For the future application of the DPF there is the recommendation to integrate especially sustainable information because out of this, a higher value of the DPF can be expected.

Keywords: additive manufacturing, digital concept costs, digital part file, digital twin, monetary value estimation

Procedia PDF Downloads 201
4813 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time

Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl

Abstract:

In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented.

Keywords: SQL injection, attacks, web application, accuracy, database

Procedia PDF Downloads 151
4812 Hydration Behavior of Belitic Cement in the Presence of Na₂CO₃, NaOH, KOH, and Water Glass

Authors: F. Amor, A. Bouregba, N. El Fami, A. Diouri

Abstract:

This study provides insights into the role of alkalis in modifying the hydration kinetics and microstructural development of β-dicalcium silicate, highlighting potential pathways for enhancing the performance of belite-based cements in various construction applications. It investigates the behavior of β-dicalcium silicates (β-Ca₂SiO₄) when hydrated in various alkaline environments, including deionized water and solutions containing 2M concentrations of Na₂CO₃, NaOH, KOH, and water glass. The dicalcium silicate was synthesized with laboratory reagents, calcium carbonate, and gel silica. The hydration process was carried out over different periods, ranging from 7 to 90 days. The hydrated samples were characterized using X-ray diffraction, infrared spectroscopy, and scanning electron microscopy, while the mechanical strength tests were performed at 28 and 90 days. The results indicate that the presence of alkalis significantly influences the hydration of belite cement. Early hydration is accelerated, which is evident from the faster dissolution of C₂S, a decrease in C₂S peaks, and the formation of C-S-H products, including sodium-containing C-(N)-S-H and potassium-containing C-(K)-S-H.

Keywords: dicalcium silicate, alkali activator, hydration, water glass, Na₂CO₃, NaOH, KOH

Procedia PDF Downloads 13
4811 Focusing of Technology Monitoring Activities Using Indicators

Authors: Günther Schuh, Christina König, Toni Drescher

Abstract:

One of the key factors for the competitiveness and market success of technology-driven companies is the timely provision of information about emerging technologies, changes in existing technologies, as well as relevant related changes in the market's structures and participants. Therefore, many companies conduct technology intelligence (TI) activities to ensure an early identification of appropriate technologies and other (weak) signals. One base activity of TI is technology monitoring, which is defined as the systematic tracking of developments within a specified topic of interest as well as related trends over a long period of time. Due to the very large number of dynamically changing parameters within the technological and the market environment of a company as well as their possible interdependencies, it is necessary to focus technology monitoring on specific indicators or other criteria, which are able to point out technological developments and market changes. In addition to the execution of a literature review on existing approaches, which mainly propose patent-based indicators, it is examined in this paper whether indicator systems from other branches such as risk management or economic research could be transferred to technology monitoring in order to enable an efficient and focused technology monitoring for companies.

Keywords: technology forecasting, technology indicator, technology intelligence, technology management, technology monitoring

Procedia PDF Downloads 470
4810 Earthquake Classification in Molluca Collision Zone Using Conventional Statistical Methods

Authors: H. J. Wattimanela, U. S. Passaribu, A. N. T. Puspito, S. W. Indratno

Abstract:

Molluca Collision Zone is located at the junction of the Eurasian plate, Australian, Pacific, and the Philippines. Between the Sangihe arc, west of the collision zone, and to the east of Halmahera arc is active collision and convex toward the Molluca Sea. This research will analyze the behavior of earthquake occurrence in Molluca Collision Zone related to the distributions of an earthquake in each partition regions, determining the type of distribution of a occurrence earthquake of partition regions, and the mean occurrence of earthquakes each partition regions, and the correlation between the partitions region. We calculate number of earthquakes using partition method and its behavioral using conventional statistical methods. The data used is the data type of shallow earthquakes with magnitudes ≥ 4 SR for the period 1964-2013 in the Molluca Collision Zone. From the results, we can classify partitioned regions based on the correlation into two classes: strong and very strong. This classification can be used for early warning system in disaster management.

Keywords: molluca collision zone, partition regions, conventional statistical methods, earthquakes, classifications, disaster management

Procedia PDF Downloads 498
4809 The Importance of Fruit Trees for Prescribed Burning in a South American Savanna

Authors: Rodrigo M. Falleiro, Joaquim P. L. Parime, Luciano C. Santos, Rodrigo D. Silva

Abstract:

The Cerrado biome is the most biodiverse savanna on the planet. Located in central Brazil, its preservation is seriously threatened by the advance of intensive agriculture and livestock. Conservation Units and Indigenous Lands are increasingly isolated and subject to mega wildfires. Among the characteristics of this savanna, we highlight the high rate of primary biomass production and the reduced occurrence of large grazing animals. In this biome, the predominant fauna is more dependent on the fruits produced by the dicotyledonous species in relation to other tropical savannas. Fire is a key element in the balance between mono and dicotyledons or between the arboreal and herbaceous strata. Therefore, applying fire regimes that maintain the balance between these strata without harming fruit production is essential in the conservation strategies of Cerrado's biodiversity. Recently, Integrated Fire Management has started to be implemented in Brazilian protected areas. As a result, management with prescribed burns has increasingly replaced strategies based on fire exclusion, which in practice have resulted in large wildfires, with highly negative impacts on fruit and fauna production. In the Indigenous Lands, these fires were carried out respecting traditional knowledge. The indigenous people showed great concern about the effects of fire on fruit plants and important animals. They recommended that the burns be carried out between April and May, as it would result in a greater production of edible fruits ("fruiting burning"). In other tropical savannas in the southern hemisphere, the preferential period tends to be later, in the middle of the dry season, when the grasses are dormant (June to August). However, in the Cerrado, this late period coincides with the flowering and sprouting of several important fruit species. To verify the best burning season, the present work evaluated the effects of fire on flowering and fruit production of theByrsonima sp., Mouriri pusa, Caryocar brasiliense, Anacardium occidentale, Pouteria ramiflora, Hancornia speciosa, Byrsonima verbascifolia, Anacardium humille and Talisia subalbens. The evaluations were carried out in the field, covering 31 Indigenous Lands that cover 104,241.18 Km², where 3,386 prescribed burns were carried out between 2015 and 2018. The burning periods were divided into early (carried out during the rainy season), modal or “fruiting” (carried out during the transition between seasons) and late (carried out in the middle of the dry season, when the grasses are dormant). The results corroborate the traditional knowledge, demonstrating that the modal burns result in higher rates of reproduction and fruit production. Late burns showed intermediate results, followed by early burns. We conclude that management strategies based mainly on forage production, which are usually applied in savannas populated by grazing ungulates, may not be the best management strategy for South American savannas. The effects of fire on fruit plants, which have a particular phenologicalsynchronization with the fauna cycle, also need to be observed during the prescription of burns.

Keywords: cerrado biome, fire regimes, native fruits, prescribed burns

Procedia PDF Downloads 217
4808 Multiresolution Mesh Blending for Surface Detail Reconstruction

Authors: Honorio Salmeron Valdivieso, Andy Keane, David Toal

Abstract:

In the area of mechanical reverse engineering, processes often encounter difficulties capturing small, highly localized surface information. This could be the case if a physical turbine was 3D scanned for lifecycle management or robust design purposes, with interest on eroded areas or scratched coating. The limitation partly is due to insufficient automated frameworks for handling -localized - surface information during the reverse engineering pipeline. We have developed a tool for blending surface patches with arbitrary irregularities into a base body (e.g. a CAD solid). The approach aims to transfer small surface features while preserving their shape and relative placement by using a multi-resolution scheme and rigid deformations. Automating this process enables the inclusion of outsourced surface information in CAD models, including samples prepared in mesh handling software, or raw scan information discarded in the early stages of reverse engineering reconstruction.

Keywords: application lifecycle management, multiresolution deformation, reverse engineering, robust design, surface blending

Procedia PDF Downloads 139
4807 Generational Differences in Leadership and Motivation: A Multilevel Study of Federal Workers

Authors: Sally Selden, Jyoti Aggarwal

Abstract:

The research on generational expectations about leadership is developing, but little scholarship exists on this topic for public sector organizations. Given the size of the federal workforce, this research study fills an important gap in the knowledge base and will inform public organizations how to approach managing and leading a multigenerational workforce. The research objectives of this study are to explore leadership preferences and motivation within generations and to determine whether these qualities differ by type of federal agency (e.g., law enforcement, human services, etc.). This paper will review the research on generational differences, expectations, and leadership with a focus on studies of public organizations. Using hierarchical linear modeling (HLM), this study will examine how leadership and motivation vary by generation in the federal government workforce, controlling for other demographic characteristics. The study will also examine whether generational differences impact satisfaction and performance. The study will utilize the 2019 Federal Employee Viewpoint Survey.

Keywords: multigenerational workforce, leadership, generational differences, federal workforce

Procedia PDF Downloads 225
4806 Intimate Partner Violence and Risk of Obesity among Women

Authors: Fatemeh Abdollahi, Munn-Sann Lye, Jamshid Yazdani Charati, Mehran Zarghami

Abstract:

Both obesity and intimate partner violence (IPV) are growing health threats. This study aimed to assess the prevalence and risk factors of both IPV and obesity and their association. In this cross-sectional study, 530 women aged 16-65 years attending Mazandaran primary health centers were recruited through the stratified random sampling method (2019-2020). Data were collected using the modified World Health Organization Domestic Violence questionnaire, Perceived Stress Scale, and socio-demographic, obstetric, and anthropometric questionnaires. The data were analyzed using descriptive statistics, the chi-square test, and multiple logistic regression. The prevalence of overweight, obesity and psychological, physical, and sexual IPV were 47.6%, 26.7%, 70.4%, 17.9%, and 6.4%, respectively. Increasing women’s educational level and exposure to violence during their lifespan increased the odds of any type of IPV while living in a nuclear family reduced it. In groups of women who were subjected to any type of IPV and only psychological IPV, experiencing violence during the lifespan was significant in predicting obesity. The alarming prevalence of IPV and obesity-overweight in this study points to the need for collaborative socio-political and health intervention. The link between experiencing violence during lifespan and obesity in some subgroups of women highlights the detrimental consequences of chronic violence and the urgent need for effective preventive programs.

Keywords: intimate partner violence, body mass index, obesity, risk factor, women

Procedia PDF Downloads 102
4805 Policies and Practice of Refugee Education from Malaysian Perspective: Preliminary Findings

Authors: A. H. A. Hamid, N. A. Zainuddin, M. Y. M. Nor

Abstract:

Millions of child refugees leave their countries in the hope of better and safer lives particularly in the aspect of education. However, the education access for the child refugees is strongly depending on the policies made by the federal and local governments. Malaysia, in particular, is a country which does not have a specific educational policy that is inclusive of child refugees. Hence, this study explores the feasibility of possible educational policy that specifically caters the needs of child refugees in Malaysia. These are preliminary findings of a case study which involved thirty-five postgraduate students in a local university who undertook Educational Policy coursework and five teachers in a refugee community centre in Kuala Lumpur, Malaysia. Interviews were recorded, transcribed and thematically analysed in relation to issues highlighted in the refugee education literature. The findings showed that most of the informants felt there is an urgent need of a systematic intervention put in place by the local government to cater to the needs of equal education access to the child refugees. A further large scale study is needed in the near future by integrating different perspectives of relevant stakeholders for an effective, efficient and sustainable policy formulation and implementation related to child refugees in Malaysia. The findings may be of interests to the educators, the ministry of education, state education office, district education office, teachers, parents and surrounding communities for their awareness about the needs of refugee education and the feasibility of educational policy for child refugees in the country.

Keywords: child refugees, educational policy, inclusive education, Malaysia

Procedia PDF Downloads 150
4804 A User Study on the Adoption of Context-Aware Destination Mobile Applications

Authors: Shu-Lu Hsu, Fang-Yi Chu

Abstract:

With the advances in information and communications technology, mobile context-aware applications have become powerful marketing tools. In Apple online store, there are numerous mobile applications (APPs) developed for destination tour. This study investigated the determinants of adoption of context-aware APPs for destination tour services. A model is proposed based on Technology Acceptance Model and privacy concern theory. The model was empirically tested based on a sample of 259 users of a tourism APP published by Kaohsiung Tourism Bureau, Taiwan. The results showed that the fitness of the model is well and, among all the factors, the perceived usefulness and perceived ease of use have the most significant influences on the intention to adopt context-aware destination APPs. Finally, contrary to the findings of previous literature, the effect of privacy concern on the adoption intention of context-aware APP is insignificant.

Keywords: mobile application, context-aware, privacy concern, TAM

Procedia PDF Downloads 258
4803 Machine Learning for Feature Selection and Classification of Systemic Lupus Erythematosus

Authors: H. Zidoum, A. AlShareedah, S. Al Sawafi, A. Al-Ansari, B. Al Lawati

Abstract:

Systemic lupus erythematosus (SLE) is an autoimmune disease with genetic and environmental components. SLE is characterized by a wide variability of clinical manifestations and a course frequently subject to unpredictable flares. Despite recent progress in classification tools, the early diagnosis of SLE is still an unmet need for many patients. This study proposes an interpretable disease classification model that combines the high and efficient predictive performance of CatBoost and the model-agnostic interpretation tools of Shapley Additive exPlanations (SHAP). The CatBoost model was trained on a local cohort of 219 Omani patients with SLE as well as other control diseases. Furthermore, the SHAP library was used to generate individual explanations of the model's decisions as well as rank clinical features by contribution. Overall, we achieved an AUC score of 0.945, F1-score of 0.92 and identified four clinical features (alopecia, renal disorders, cutaneous lupus, and hemolytic anemia) along with the patient's age that was shown to have the greatest contribution on the prediction.

Keywords: feature selection, classification, systemic lupus erythematosus, model interpretation, SHAP, Catboost

Procedia PDF Downloads 84
4802 Translation Training in the AI Era

Authors: Min Gao

Abstract:

In the past year, the advent of large language models (LLMs) has brought about a revolution in the language service industry, making it possible to efficiently produce more satisfactory and higher-quality translations. This is groundbreaking news for commercial companies involved in language services since much of a translator's work can now be completed by machines. However, it may be bad news for universities that provide translation training programs. They need to confront the challenges posed by AI in education by reconsidering issues such as the reform of traditional teaching methods, the translation ethics of students, and the new demands of the job market for their graduates. This article is an exploratory study of these issues based on the author's experiences in translation teaching. The research combines methods in the form of questionnaires and interviews. The findings include: (1) students may lose their motivation to learn in the AI era, but this can be compensated for by encouragement from the lecturer; (2) Translation ethics are not a serious problem in schools, considering the strict policies and regulations in place; (3) The role of translators has evolved in the new era, necessitating a reform of the traditional teaching methods.

Keywords: job market of translation, large language model, translation ethics, translation training

Procedia PDF Downloads 68
4801 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 357
4800 Energy Savings with the Use of LED Lights at the Wastewater Treatment Plant

Authors: Kishen Prathivadi

Abstract:

The Sewer Authority Mid-Coastside (SAM) is a Joint Powers Authority formed in 1976 and provides secondary wastewater treatment to an average flow of 2.0 million gallons per day. SAM owns and operates a Wastewater Treatment Plant (WWTP) and a sanitary sewage collection system that collects sewage from its three member agencies: the City of Half Moon Bay, the Granada Community Services District and Montara Water and Sanitary District. The Sewer Authority Mid-Coastside (SAM) partnered with Pacific Gas & Electric, and its contractor GEL America, to review and replace all inefficient lighting fixtures and bulbs at the SAM treatment plant and administrative office. The project focused on replacing old and inefficient lighting fixtures and bulbs, reducing annual operating and maintenance costs, and reducing SAM’s carbon footprint. The project resulted in a 55% overall energy reduction, higher light quality and acuity, and a total operational savings of $495,000 over ten years.

Keywords: energy savings, LED, lighting, electrical

Procedia PDF Downloads 139
4799 The Role of Social Media in Activating Youth Participation in the Community

Authors: Raya Hamed Hilal Al Maamari

Abstract:

The Gulf societies have been undergoing radical changes due to the technology transfer. It altered the humanities attitudes, especially, youth habits as they have become an addicted to using social media. This study aimed to find out the ratio of social media in guiding youth to participate with government’s institutions in decision-making and developing their societies. The study considered a descriptive study, social survey method was used on a sample of 100 young from different gulf countries, using an electronic questionnaire, as well as, some interviews with famous leaders of youth groups. Finally, the researcher suggested some effective ways activate youth efforts using social media in an effective manner to plan for the development policy in the community. The findings illustrated that social media plays a vital role in encouraging youth to participate enthusiastically in providing services. Noticeably, social media contains large numbers of youth. Therefore, the influences will be widely and feasible. Moreover, the study indicated the fact that most of the youth teamwork started in social media. Then, it has been growing in the real society.

Keywords: community, participation, social media, youth

Procedia PDF Downloads 375
4798 Antioxidant Effects of Regular Aerobic Exercise in Postmenopausal Women with Type 2 Diabetes Mellitus

Authors: Parvin Farzanegi

Abstract:

Background: Diabetes is a metabolic disorder associated with increased free radicals and oxidative stress. The evidence indicates that physical inactivity is a modifiable behavioral risk factor for a wide range of chronic disorders such as diabetes mellitus. We investigated the effects of eight-week aerobic exercise on some antioxidant enzyme activities in postmenopausal women with type 2 diabetes mellitus (T2DM). Methods: sixteen sedentary postmenopausal women with T2DM were randomly assigned to the control (n=8; CG) and exercise group (n=8; EG). The exercise consisted of progressive aerobic training at a moderate intensity (50-70% of the maximum heart rate), for 25-60 min/day, and 3 days/week for 8 weeks. Age, sex, and body mass index were similar in the two groups. Antioxidant status was evaluated by measuring the superoxide dismutase (SOD) and catalase (CAT) activity. Also levels of malondialdehyde (MDA) as an index of lipid peroxidation and glucose in the plasma were measured before and after the intervention. Results: Following the 8 weeks of exercise training, the plasma MDA and glucose levels were significantly reduced in EG compared to CG (P=0.001 and P=0.011 respectively). However, SOD (P=0.017) and CAT (P=0.011) activities were increased in EG compared to CG. Conclusion: The present study suggests regular aerobic exercise appears can exert protective effects against oxidative stress due to its ability to increase antioxidant defense and glucose control in postmenopausal women with T2DM.

Keywords: aerobic exercise, antioxidant, diabetes mellitus, type 2

Procedia PDF Downloads 170
4797 The SEMONT Monitoring and Risk Assessment of Environmental EMF Pollution

Authors: Dragan Kljajic, Nikola Djuric, Karolina Kasas-Lazetic, Danka Antic

Abstract:

Wireless communications have been expanded very fast in recent decades. This technology relies on an extensive network of base stations and antennas, using radio frequency signals to transmit information. Devices that use wireless communication, while offering various services, basically act as sources of non-ionizing electromagnetic fields (EMF). Such devices are permanently present in the human vicinity and almost constantly radiate, causing EMF pollution of the environment. This fact has initiated development of modern systems for observation of the EMF pollution, as well as for risk assessment. This paper presents the Serbian electromagnetic field monitoring network – SEMONT, designed for automated, remote and continuous broadband monitoring of EMF in the environment. Measurement results of the SEMONT monitoring at one of the test locations, within the main campus of the University of Novi Sad, are presented and discussed, along with corresponding exposure assessment of the general population, regarding the Serbian legislation.

Keywords: EMF monitoring, exposure assessment, sensor nodes, wireless network

Procedia PDF Downloads 264
4796 Urban Security through Urban Transformation: Case of Saraycik District

Authors: Emir Sunguroglu, Merve Sunguroglu, Yesim Aliefendioglu, Harun Tanrivermis

Abstract:

Basic human needs range from physiological needs such as food, water and shelter to safety needs such as security, protection from natural disasters and even urban terrorism which are extant and not fulfilled even in urban areas where people live civilly in large communities. These basic needs when arose in urban life lead to a different kind of crime set defined as urban crimes. Urban crimes mostly result from differences between socioeconomic conditions in society. Income inequality increases tendency towards urban crimes. Especially in slum areas and suburbs, urban crimes not only threaten public security but they also affect deliverance of public services. It is highlighted that, construction of urban security against problems caused by urban crimes is not only achieved by involvement of urban security in security of the community but also comprises juridical development and staying above a level of legal standards concurrently. The idea of urban transformation emerged as interventions to demolishment and rebuilding of built environment to solve the unhealthy urban environment, inadequate infrastructure and socioeconomic problems came up during the industrialization process. Considering the probability of urbanization process driving citizens to commit crimes, The United Nations Commission on Human Security’s focus on this theme is conferred to be a proper approach. In this study, the analysis and change in security before, through and after urban transformation, which is one of the tools related to urbanization process, is strived to be discussed through the case of Sincan County Saraycik District. The study also aims to suggest improvements to current legislation on public safety, urban resilience, and urban transformation. In spite of Saraycik District residing in a developing County in Ankara, Turkey, from urbanization perspective as well as socioeconomic and demographic indicators the District exhibits a negative view throughout the County and the country. When related to the county, rates of intentional harm reports, burglary reports, the offense of libel and threat reports and narcotic crime reports are higher. The District is defined as ‘crime hotspot’. Interviews with residents of Saraycik claim that the greatest issue of the neighborhood is Public Order and Security (82.44 %). The District becomes prominent with negative aspects, especially with the presence of unlicensed constructions, occurrence of important social issues such as crime and insecurity and complicated lives of inhabitants from poverty and low standard conditions of living. Additionally, the social structure and demographic properties and crime and insecurity of the field have been addressed in this study. Consequently, it is claimed that urban crime rates were related to level of education, employment and household income, poverty trap, physical condition of housing and structuration, accessibility of public services, security, migration, safety in terms of disasters and emphasized that urban transformation is one of the most important tools in order to provide urban security.

Keywords: urban security, urban crimes, urban transformation, Saraycik district

Procedia PDF Downloads 304
4795 Narratives of Cultural Encounters Revisited: Moroccan Entertainers beyond Borders (1840-1920)

Authors: Lhoussain Simour

Abstract:

This paper discusses the reordering and reorientation Moroccan Oossified and frozen histories in national and colonial archives. It attempts to reexamine Moroccan non-canonical voices beyond borders, their forgotten experiences and itineraries, with the aim of uncovering cultural discourses pertaining to early cultural and artistic interactions between Morocco and the western countries, namely Britain and America. In fact, less attention has been given to the presence of Moroccan entertainers beyond borders in the archives of history. Moroccan historians and cultural critics seem to have paid little critical consideration to Moroccan artistic encounters with the west, Europe and America as a case in point. They have overlooked to deal with travel performances, professional entertainments, and artistic spectacles, initiated by acrobats, as instances of visual cross-cultural encounters between Morocco and the west. The narratives of these professional artists have hardly found their ways into historiographical writing. This contribution attempts to locate the contesting beginnings of Moroccan professional entertainers in western show business in the nineteenth century which witnessed intricate artistic, discursive and cultural junctures by emphasizing connections between theatrical performances, ethnic exhibition and world fair expositions. Moroccan professional performances grew in Europe and America within a zealous context marked by the rise of a paradigmatic racial consciousness that sought to authenticate and legitimate ethnic discourses of power and exclusion. The ethnic taxonomies and racial hierarchies governed by ethnographic and anthropological documentation fueled up entertainment venues and popular theatrical performances and helped in developing a distinctive view about Self and Other paradigms. Moroccan travelers started their journeys to visit European and American countries to exhibit their acrobatics acts. They, in a certain sense, continued, albeit in varying degrees and circumstances, the whole tradition of travel initiated previously by their ancestor diplomats and ambassadors. Professional entertainers embarked on daring journeys across the Mediterranean and the Atlantic to discover new geographies and cultural spaces, and perform their spectacles beyond borders. These travelers left rich archival documents that reflect important cultural and historical moments. The routes of travel started from the margins of the empire towards metropolitan centers of nineteenth century Europe and America included Moroccan women travelers as acrobats and dancing professional artists as well. These also crossed the straits of Gibraltar and journeyed through the Atlantic Ocean to visit western countries. Moroccan women travelers took part in various Euro-American theatre performances and in circus shows as early as 1850 according to newspapers archives and passengers shipping lists. Najat Amburg, Zahar Ben Tahar, Torquia, Fadma, and many more whose names are now lost to us, moved freely in various western capital cities to entertain nineteenth century western audiences.

Keywords: archives, cultural encounters, self and other, Morocco, travel, Moroccan acrobats, Moorish dancing women

Procedia PDF Downloads 172
4794 Significance of Tridimensional Volume of Tumor in Breast Cancer Compared to Conventional TNM Stage

Authors: Jaewoo Choi, Ki-Tae Hwang, Eunyoung Ko

Abstract:

Backgrounds/Aims: Patients with breast cancer are currently classified according to TNM stage. Nevertheless, the actual volume would be mis-estimated, and it would bring on inappropriate diagnosis. Tridimensional volume-stage derived from the ellipsoid formula was presented as useful measure. Methods: The medical records of 480 consecutive breast cancer between January 2001 and March 2013 were retrospectively reviewed. All patients were divided into three groups according to tumor volume by receiver operating characteristic analysis, and the ranges of each volume-stage were that V1 was below 2.5 cc, V2 was exceeded 2.5 and below 10.9 cc, and V3 was exceeded 10.9 cc. We analyzed outcomes of volume-stage and compared disease-free survival (DFS) and overall survival (OS) between size-stage and volume-stage with variant intrinsic factor. Results: In the T2 stage, there were patients who had a smaller volume than 4.2 cc known as maximum value of T1. These findings presented that patients in T1c had poorer DFS than T2-lesser (mean of DFS 48.7 vs. 51.8, p = 0.011). Such is also the case in OS (mean of OS 51.1 vs. 55.3, p = 0.006). The cumulative survival curves for V1, V2 compared T1, T2 showed similarity in DFS (HR 1.9 vs. 1.9), and so did it for V3 compared T3 (HR 3.5 vs. 2.6) significantly. Conclusion: This study demonstrated that tumor volume had good feasibility on the prognosis of patients with breast cancer. We proposed that volume-stage should be considered for an additional stage indicator, particularly in early breast cancer.

Keywords: breast cancer, tridimensional volume of tumor, TNM stage, volume stage

Procedia PDF Downloads 403
4793 Intrusion Detection Based on Graph Oriented Big Data Analytics

Authors: Ahlem Abid, Farah Jemili

Abstract:

Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.

Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud

Procedia PDF Downloads 147
4792 Thermalytix: An Advanced Artificial Intelligence Based Solution for Non-Contact Breast Screening

Authors: S. Sudhakar, Geetha Manjunath, Siva Teja Kakileti, Himanshu Madhu

Abstract:

Diagnosis of breast cancer at early stages has seen better clinical and survival outcomes. Survival rates in developing countries like India are very low due to accessibility and affordability issues of screening tests such as Mammography. In addition, Mammography is not much effective in younger women with dense breasts. This leaves a gap in current screening methods. Thermalytix is a new technique for detecting breast abnormality in a non-contact, non-invasive way. It is an AI-enabled computer-aided diagnosis solution that automates interpretation of high resolution thermal images and identifies potential malignant lesions. The solution is low cost, easy to use, portable and is effective in all age groups. This paper presents the results of a retrospective comparative analysis of Thermalytix over Mammography and Clinical Breast Examination for breast cancer screening. Thermalytix was found to have better sensitivity than both the tests, with good specificity as well. In addition, Thermalytix identified all malignant patients without palpable lumps.

Keywords: breast cancer screening, radiology, thermalytix, artificial intelligence, thermography

Procedia PDF Downloads 291
4791 Splenic Artery Aneurysms: A Rare, Insidious Cause of Abdominal Pain

Authors: Christopher Oyediran, Nicola Ubayasiri, Christopher Gough

Abstract:

Splenic artery aneurysms are often clinically occult, occasionally identified incidentally with imaging. The pathogenesis of aneurysms is complex, but certain factors are thought to contribute to their development. Given the potential fatal complications of rupture, a high index of suspicion is required to make an early diagnosis. We present a case of a 36-year-old female with a history of endometriosis and multiple sclerosis who presented to the Emergency Department with sudden onset epigastric pain and collapse. On arrival, she was pale and clammy with profound tachycardia and hypotension. An ultrasound done in the resuscitation department revealed abdominal free fluid. She was resuscitated with blood and transferred for emergent laparotomy. Laparotomy revealed massive haemoperitoneum from the spleen. She underwent emergency splenectomy and inspection of the spleen revealed a splenic artery aneurysm. She received our massive transfusion protocol followed by a short stay on ITU, making a good post-operative recovery and was discharged home a week later.

Keywords: aneurysm, human chorionic gonadotrophin (hCG), resuscitation, laparotomy

Procedia PDF Downloads 431
4790 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting

Authors: Emily Stamm, Neil Smyth, Elizabeth O'Sullivan

Abstract:

In Identity-Based Encryption (IBE), an identity, such as a username, email address, or domain name, acts as the public key. IBE consolidates the PKI by eliminating the repetitive process of requesting public keys for each message encryption. Two of the most popular schemes are Sakai-Kasahara (SAKKE), which is based on elliptic curve pairings, and the Ducas, Lyubashevsky, and Prest lattice scheme (DLP- Lattice), which is based on quantum-secure lattice cryptography. In or- der to embed the schemes in a standard enterprise setting, both schemes are implemented as shared system libraries and integrated into a REST service that functions at the enterprise level. The performance of both schemes as libraries and services is compared, and the practicalities of implementation and application are discussed. Our performance results indicate that although SAKKE has the smaller key and ciphertext sizes, DLP-Lattice is significantly faster overall and we recommend it for most enterprise use cases.

Keywords: identity-based encryption, post-quantum cryptography, lattice-based cryptography, IBE

Procedia PDF Downloads 136
4789 Critical Design - Concepts, Methods and Practices for Innovative Societal Relationships

Authors: Martina Maria Keitsch

Abstract:

Critical Design (CD) confronts traditional design practice. Instead of reproducing and reinforcing contemporary perceptions of products and services, CD seeks to challenge them with the goal to stimulate debates and visions on societal innovation. CD methods comprise, among other narratives and design of critical objects. The oral presentation is based on a study that discusses concepts, methods, and applications of CD links CD to traditional design, and identifies CD benefits and challenges for design research and practice. The objective of the study is to introduce CD as an alternative for design researchers and practitioners supplementing commercially oriented design approaches. The study utilizes a literature review on CD concepts and methods based on current publications and online documents and illustrates CD practice with help of selected case studies. Findings of the study indicate that CD contribute, among others, to create new societal roles for designers, foster innovative relationships between designers and users, and encourage creativity through imaginative aesthetics.

Keywords: critical design, postmodern design theories, narratives, rhizome

Procedia PDF Downloads 171
4788 Welfare State and Income Distribution to School-Age Children

Authors: Kanyarat Bussaban, Siriporn Poolsuwan

Abstract:

This study is conducted with the objective to prove how the distorted distribution of welfare affects the quality of school-age children lives differently in the case of an urban community in Bangkok. 334 samples are households from Suan Oi and Ratchapatubtim communities. The study of sample communities found the difference between two community areas that are close. The people of Suan Oi community are economically better off people than the people of the Ratchapatubtim community. They share the benefits of using most services except the welfare of a child’s education. The resulting analysis of the variability in quality of life of the school age children indicate that heads of the households are women looking for quality of life benefits when the compulsory school age is less. A study of the two communities suggests that the inequality in income distribution currently affects the quality of life of school-age children.

Keywords: inequality, income distribution, quality of school-age children lives, welfare state

Procedia PDF Downloads 373
4787 Retaining Users in a Commercially-Supported Social Network

Authors: Sasiphan Nitayaprapha

Abstract:

A commercially-supported social network has become an emerging channel for an organization to communicate with and provide services to customers. The success of the commercially-supported social network depends on the ability of the organization to keep the customers in participating in the network. Drawing from the theories of information adoption, information systems continuance, and web usability, the author develops a model to explore how a commercially-supported social network can encourage customers to continue participating and using the information in the network. The theoretical model will be proved through an online survey of customers using the commercially-supported social networking sites of several high technology companies operating in the same sector. The result will be compared with previous studies to learn about the explanatory power of the research model, and to identify the main factors determining users’ intention to continue using a commercially-supported social network. Theoretical and practical implications, and limitations are discussed.

Keywords: social network, information adoption, information systems continuance, web usability, user satisfaction

Procedia PDF Downloads 316