Search results for: HIV transmission risks
3243 Transient Stability Improvement in Multi-Machine System Using Power System Stabilizer (PSS) and Static Var Compensator (SVC)
Authors: Khoshnaw Khalid Hama Saleh, Ergun Ercelebi
Abstract:
Increasingly complex modern power systems require stability, especially for transient and small disturbances. Transient stability plays a major role in stability during fault and large disturbance. This paper compares a power system stabilizer (PSS) and static Var compensator (SVC) to improve damping oscillation and enhance transient stability. The effectiveness of a PSS connected to the exciter and/or governor in damping electromechanical oscillations of isolated synchronous generator was tested. The SVC device is a member of the shunt FACTS (flexible alternating current transmission system) family, utilized in power transmission systems. The designed model was tested with a multi-machine system consisting of four machines six bus, using MATLAB/SIMULINK software. The results obtained indicate that SVC solutions are better than PSS.Keywords: FACTS, MATLAB/SIMULINK, multi-machine system, PSS, SVC, transient stability
Procedia PDF Downloads 4553242 Influence of Food Microbes on Horizontal Transfer of β-Lactam Resistance Genes between Salmonella Strains in the Mouse Gut
Authors: M. Ottenbrite, G. Yilmaz, J. Devenish, M. Kang, H. Dan, M. Lin, C. Lau, C. Carrillo, K. Bessonov, J. Nash, E. Topp, J. Guan
Abstract:
Consumption of food contaminated by antibiotic-resistant (AR) bacteria may lead to the transmission of AR genes in the gut microbiota and cause AR bacterial infection, a significant public health concern. However, information is limited on if and how background microbes from the food matrix (food microbes) may influence resistance transmission. Thus, we assessed the colonization of a β-lactam resistant Salmonella Heidelberg strain (donor) and a β-lactam susceptible S. Typhimurium strain (recipient) and the transfer of the resistance genes in the mouse gut in the presence or absence of food microbes that were derived from washing freshly-harvested carrots. Mice were pre-treated with streptomycin and then inoculated with both donor and recipient bacteria or recipient only. Fecal shedding of the donor, recipient, and transconjugant bacteria was enumerated using selective culture techniques. Transfer of AR genes was confirmed by whole genome sequencing. Gut microbial composition was determined by 16s rRNA amplicon sequencing. Significantly lower numbers of donors and recipients were shed from mice that were inoculated with food microbes compared to those without food microbe inoculation. S. Typhimurium transconjugants were only recovered from mice without inoculation of food microbes. A significantly higher survival rate was in mice with vs. without inoculation of food microbes. The results suggest that the food microbes may compete with both the donor and recipient Salmonella, limit their growth and reduce transmission of the β-lactam resistance gene in the mouse gut.Keywords: antibiotic resistance, gene transfer, gut microbiota, Salmonella infection
Procedia PDF Downloads 743241 Energy Efficient Massive Data Dissemination Through Vehicle Mobility in Smart Cities
Authors: Salman Naseer
Abstract:
One of the main challenges of operating a smart city (SC) is collecting the massive data generated from multiple data sources (DS) and to transmit them to the control units (CU) for further data processing and analysis. These ever-increasing data demands require not only more and more capacity of the transmission channels but also results in resource over-provision to meet the resilience requirements, thus the unavoidable waste because of the data fluctuations throughout the day. In addition, the high energy consumption (EC) and carbon discharges from these data transmissions posing serious issues to the environment we live in. Therefore, to overcome the issues of intensive EC and carbon emissions (CE) of massive data dissemination in Smart Cities, we propose an energy efficient and carbon reduction approach by utilizing the daily mobility of the existing vehicles as an alternative communications channel to accommodate the data dissemination in smart cities. To illustrate the effectiveness and efficiency of our approach, we take the Auckland City in New Zealand as an example, assuming massive data generated by various sources geographically scattered throughout the Auckland region to the control centres located in city centre. The numerical results show that our proposed approach can provide up to 5 times lower delay as transferring the large volume of data by utilizing the existing daily vehicles’ mobility than the conventional transmission network. Moreover, our proposed approach offers about 30% less EC and CE than that of conventional network transmission approach.Keywords: smart city, delay tolerant network, infrastructure offloading, opportunistic network, vehicular mobility, energy consumption, carbon emission
Procedia PDF Downloads 1423240 Environmental Pollution and Health Risks of Residents Living near Ewekoro Cement Factory, Ewekoro, Nigeria
Authors: Michael Ajide Oyinloye
Abstract:
The natural environment is made up of air, water and soil. The release of emission of industrial waste into anyone of the components of the environment causes pollution. Industrial pollution significantly threatens the inherent right of people, to the enjoyment of a safe and secure environment. The aim of this paper is to assess the effect of environmental pollution and health risks of residents living near Ewekoro Cement factory. The research made use of IKONOS imagery for Geographical Information System (GIS) to buffer and extract buildings that are less than 1 km to the plant, within 1 km to 5 km and above 5 km to the factory. Also, a questionnaire was used to elicit information on the socio-economic factors, the effect of environmental pollution on residents and measures adopted to control industrial pollution on the residents. Findings show that most buildings that between less than 1 km and 1 km to 5 km to the factory have high health risk in the study area. The study recommended total relocation for the residents of the study area to reduce risk health problems.Keywords: environmental pollution, health risk, GIS, satellite imagery, ewekoro
Procedia PDF Downloads 5423239 Cybersecurity Protection Structures: The Case of Lesotho
Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
Abstract:
The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team
Procedia PDF Downloads 1563238 Factors of Social Network Platform Usage and Privacy Risk: A Unified Theory of Acceptance and Use of Technology2 Model
Abstract:
The trust and use of social network platforms by users are instrumental factors that contribute to the platform’s sustainable development. Studying the influential factors of the use of social network platforms is beneficial for developing and maintaining a large user base. This study constructed an extended unified theory of acceptance and use of technology (UTAUT2) moderating model with perceived privacy risks to analyze the factors affecting the trust and use of social network platforms. 444 participants completed our 35 surveys, and we verified the survey results by structural equation model. Empirical results reveal the influencing factors that affect the trust and use of social network platforms, and the extended UTAUT2 model with perceived privacy risks increases the applicability of UTAUT2 in social network scenarios. Social networking platforms can increase their use rate by increasing the economics, functionality, entertainment, and privacy security of the platform.Keywords: perceived privacy risk, social network, trust, use, UTAUT2 model
Procedia PDF Downloads 983237 Analysis of Exponential Distribution under Step Stress Partially Accelerated Life Testing Plan Using Adaptive Type-I Hybrid Progressive Censoring Schemes with Competing Risks Data
Authors: Ahmadur Rahman, Showkat Ahmad Lone, Ariful Islam
Abstract:
In this article, we have estimated the parameters for the failure times of units based on the sampling technique adaptive type-I progressive hybrid censoring under the step-stress partially accelerated life tests for competing risk. The failure times of the units are assumed to follow an exponential distribution. Maximum likelihood estimation technique is used to estimate the unknown parameters of the distribution and tampered coefficient. Confidence interval also obtained for the parameters. A simulation study is performed by using Monte Carlo Simulation method to check the authenticity of the model and its assumptions.Keywords: adaptive type-I hybrid progressive censoring, competing risks, exponential distribution, simulation, step-stress partially accelerated life tests
Procedia PDF Downloads 3433236 Early Detection of Lymphedema in Post-Surgery Oncology Patients
Authors: Sneha Noble, Rahul Krishnan, Uma G., D. K. Vijaykumar
Abstract:
Breast-Cancer related Lymphedema is a major problem that affects many women. Lymphedema is the swelling that generally occurs in the arms or legs caused by the removal of or damage to lymph nodes as a part of cancer treatment. Treating it at the earliest possible stage is the best way to manage the condition and prevent it from leading to pain, recurrent infection, reduced mobility, and impaired function. So, this project aims to focus on the multi-modal approaches to identify the risks of Lymphedema in post-surgical oncology patients and prevent it at the earliest. The Kinect IR Sensor is utilized to capture the images of the body and after image processing techniques, the region of interest is obtained. Then, performing the voxelization method will provide volume measurements in pre-operative and post-operative periods in patients. The formation of a mathematical model will help in the comparison of values. Clinical pathological data of patients will be investigated to assess the factors responsible for the development of lymphedema and its risks.Keywords: Kinect IR sensor, Lymphedema, voxelization, lymph nodes
Procedia PDF Downloads 1383235 A Development of a Conceptual Framework for Safety Culture and Safety Risk Assessment: The Case of Chinese International Construction Projects under the “New Belt and Road” Initiative in Africa
Authors: Bouba Oumarou Aboubakar, HongXia Li, Sardar Annes Farooq
Abstract:
The Belt and Road Initiative’s success strongly depends on the safety of all the million workers on construction projects sites. As the new BRI is directed toward Africa and meets a completely different culture from the Chinese project managers, maintaining low risk for workers risks shall be closely related to cultural sharing and mutual understanding. This is why this work introduces a cultural-wise safety management framework for Chinese Construction projects in Africa. The theoretical contribution of this paper is an improved risk assessment framework that integrates language, culture and difficulty of controlling risk factors into one approach. Practically, this study provides not only a useful tool for project safety management practitioners but the full understanding of all risks that may arise in the BRI projects in Africa.Keywords: cultural-wise, safety culture, risk assessment, Chinese construction, BRI projects, Africa
Procedia PDF Downloads 1073234 The Effect Analysis of Monetary Instruments through Islamic Banking Financing Channel toward Economic Growth in Indonesia, Period January 2008-December 2015
Authors: Sobar M. Johari, Ida Putri Anjarsari
Abstract:
In the transmission of monetary instrument towards real sector of the economy, Bank Indonesia as monetary authority has developed Islamic Bank Indonesia Certificate (abbreviated as SBIS) as an instrument in Islamic open market operation. One of the monetary transmission channels could take place through financing channel from which the fund is used as the source of banking financing. This study aims to analyse the impact of Islamic monetary instrument towards output or economic growth. Data used in this research is taken from Bank Indonesia and Central Board of Statistics for the period of January 2008 until December 2015. The study employs Granger Causality Test, Vector Error Correction Model (VECM), Impulse Response Function (IRF) technique and Forecast Error Variance Decomposition (FEVD) as its analytical methods. The results show that, first, the transmission mechanism of banking financing channel are not linked to output. Second, estimation results of VECM show that SBIS, PUAS, and FIN have significant impact in the long term towards output. When there is monetary shock, output or economic growth could be recovered and stabilized in the short term. FEVD results show that Islamic banking financing contributes 1.33 percent to increase economic growth.Keywords: Islamic monetary instrument, Islamic banking financing channel, economic growth, Vector Error Correction Model (VECM)
Procedia PDF Downloads 2813233 Potyviruses Genomic Analysis and Complete Evaluation
Authors: Narin Salehiyan, Ramin Ghasemi Shayan
Abstract:
The largest genus of plant viruses, the potyvirus, is responsible for significant crop losses. Potyviruses are aphid sent in a nonpersistent way, and some of them are likewise seed communicated. As significant microorganisms, potyviruses are substantially more examined than other plant infections having a place with different genera, and their review covers numerous parts of plant virology, like utilitarian portrayal of viral proteins, sub-atomic communication with hosts and vectors, structure, scientific classification, development, the study of disease transmission, and determination. Biotechnological utilizations of potyviruses are likewise being investigated. During this last ten years, significant advances have been made in the comprehension of the sub-atomic science of these infections and the elements of their different proteins. Potyvirus multiplication, movement, and transmission, as well as potyvirus/plant compatible interactions, including pathogenicity and symptom determinants, are updated following a general overview of the family Potyviridae and the potyviral proteins. it end the survey giving data on biotechnological uses of potyviruses.Keywords: virology, poty, virus, genome, genetic
Procedia PDF Downloads 733232 Ultra-Low Chromatic Dispersion, Low Confinement Loss, and Low Nonlinear Effects Index-Guiding Photonic Crystal Fiber
Authors: S. Olyaee, M. Seifouri, A. Nikoosohbat, M. Shams Esfand Abadi
Abstract:
Photonic Crystal Fibers (PCFs) can be used in optical communications as transmission lines. For this reason, the PCFs with low confinement loss, low chromatic dispersion, and low nonlinear effects are highly suitable transmission media. In this paper, we introduce a new design of index-guiding photonic crystal fiber (IG-PCF) with ultra-low chromatic dispersion, low nonlinearity effects, and low confinement loss. Relatively low dispersion is achieved in the wavelength range of 1200 to 1600 nm using the proposed design. According to the new structure of IG-PCF presented in this study, the chromatic dispersion slope is -30(ps/km.nm) and the confinement loss reaches below 10-7 dB/km. While in the wavelength range mentioned above at the same time an effective area of more than 50.2μm2 is obtained.Keywords: optical communication systems, index-guiding, dispersion, confinement loss, photonic crystal fiber
Procedia PDF Downloads 6093231 The Effect of COVID-19 Transmission, Lockdown Measures, and Vaccination on Stock Market Returns
Authors: Belhouchet Selma, Ben Amar Anis
Abstract:
We examine the impact of COVID-19 transmission, containment measures, and vaccination growth on daily stock market returns for the G7 countries (Canada, France, Germany, Italy, Japan, the United Kingdom, and the United States) from January 22, 2020, to August 31, 2021, more than a year and a half after COVID-19. For this objective, we use panel pooled ordinary least squares regressions. Our findings indicate that the spread of the pandemic has a negative impact on the daily performance of the world's seven main stock markets. Government measures to improve stock market returns are no longer successful. Furthermore, our findings demonstrate that immunization efforts in G7 nations do not increase stock market performance in these countries. A variety of robustness tests back up our conclusions. Our findings have far-reaching implications for investors, governments, and regulators not only in the G7 countries but also in all developed countries and all countries globally.Keywords: COVID-19, G7 stock market, containment measures, vaccination
Procedia PDF Downloads 1003230 Low Nonlinear Effects Index-Guiding Nanostructured Photonic Crystal Fiber
Authors: S. Olyaee, M. Seifouri, A. Nikoosohbat, M. Shams Esfand Abadi
Abstract:
Photonic Crystal Fibers (PCFs) can be used in optical communications as transmission lines. For this reason, the PCFs with low confinement loss, low chromatic dispersion, and low nonlinear effects are highly suitable transmission media. In this paper, we introduce a new design of index-guiding nanostructured photonic crystal fiber (IG-NPCF) with ultra-low chromatic dispersion, low nonlinearity effects, and low confinement loss. Relatively low dispersion is achieved in the wavelength range of 1200 to 1600nm using the proposed design. According to the new structure of nanostructured PCF presented in this study, the chromatic dispersion slope is -30(ps/km.nm) and the confinement loss reaches below 10-7 dB/km. While in the wavelength range mentioned above at the same time an effective area of more than 50.2μm2 is obtained.Keywords: optical communication systems, nanostructured, index-guiding, dispersion, confinement loss, photonic crystal fiber
Procedia PDF Downloads 5603229 The Structuring of Economic of Brazilian Innovation and the Institutional Proposal to the Legal Management for Global Conformity to Treat the Technological Risks
Authors: Daniela Pellin, Wilson Engelmann
Abstract:
Brazil has sought to accelerate your development through technology and innovation as a response to the global influences, which has received in internal management practices. For this, it had edited the Brazilian Law of Innovation 13.243/2016. However observing the Law overestimated economic aspects the respective application will not consider the stakeholders and the technological risks because there is no legal treatment. The economic exploitation and the technological risks must be controlled by limits of democratic system to find better social development to contribute with the economics agents for making decision to conform with global directions. The research understands this is a problem to face given the social particularities of the country because there has been the literal import of the North American Triple Helix Theory consolidated in developed countries and the negative consequences when applied in developing countries. Because of this symptomatic scenario, it is necessary to create adjustment to conduct the management of the law besides social democratic interests to increase the country development. For this, therefore, the Government will have to adopt some conducts promoting side by side with universities, civil society and companies, informational transparency, catch of partnerships, create a Confort Letter document for preparation to ensure the operation, joint elaboration of a Manual of Good Practices, make accountability and data dissemination. Also the Universities must promote informational transparency, drawing up partnership contracts and generating revenue, development of information. In addition, the civil society must do data analysis about proposals received for discussing to give opinion related. At the end, companies have to give public and transparent information about investments and economic benefits, risks and innovation manufactured. The research intends as a general objective to demonstrate that the efficiency of the propeller deployment will be possible if the innovative decision-making process goes through the institutional logic. As specific objectives, the American influence must undergo some modifications to better suit the economic-legal incentives to potentiate the development of the social system. The hypothesis points to institutional model for application to the legal system can be elaborated based on emerging characteristics of the country, in such a way that technological risks can be foreseen and there will be global conformity with attention to the full development of society as proposed by the researchers.The method of approach will be the systemic-constructivist with bibliographical review, data collection and analysis with the construction of the institutional and democratic model for the management of the Law.Keywords: development, governance of law, institutionalization, triple helix
Procedia PDF Downloads 1403228 Impact of Node Density and Transmission Range on the Performance of OLSR and DSDV Routing Protocols in VANET City Scenarios
Authors: Yassine Meraihi, Dalila Acheli, Rabah Meraihi
Abstract:
Vehicular Ad hoc Network (VANET) is a special case of Mobile Ad hoc Network (MANET) used to establish communications and exchange information among nearby vehicles and between vehicles and nearby fixed infrastructure. VANET is seen as a promising technology used to provide safety, efficiency, assistance and comfort to the road users. Routing is an important issue in Vehicular Ad Hoc Network to find and maintain communication between vehicles due to the highly dynamic topology, frequently disconnected network and mobility constraints. This paper evaluates the performance of two most popular proactive routing protocols OLSR and DSDV in real city traffic scenario on the basis of three metrics namely Packet delivery ratio, throughput and average end to end delay by varying vehicles density and transmission range.Keywords: DSDV, OLSR, quality of service, routing protocols, VANET
Procedia PDF Downloads 4703227 Modal Analysis for Optimal Location of Doubly Fed Induction-Generator-Based Wind Farms for Reduction of Small Signal Oscillation
Authors: Meet Patel, Darshan Patel, Nilay Shah
Abstract:
Excess growth of wind-based renewable energy sources is required to identify the optimal location and damping capacity of doubly fed induction-generator-based (DFIG) wind farms while it penetrates into the transmission network. In this analysis, various ratings of DFIG wind farms are penetrated into the Single Machine Infinite Bus (SMIB ) at a different distance of the transmission line. On the basis of detailed examinations, a prime position is evaluated to maximize the stability of overall systems. A damping controller is designed at an optimum location to mitigate the small oscillations. The proposed model was validated using eigenvalue analysis, calculation of the participation factor, and time-domain simulation.Keywords: DFIG, small signal stability, eigenvalues, time domain simulation
Procedia PDF Downloads 1133226 Qualitative Inquiry for Understanding Factors Associated to Intergenerational Transmission of Child Maltreatment
Authors: Marie-Claude Richard, Amelie Bolduc-Mokhtar, Mathieu Parent
Abstract:
People who have experienced maltreatment in childhood subsequently face many parenting issues of their own, in particular when it comes to distancing themselves from the abusive behaviors they were exposed and had access to positive role models. Few studies have explored the factors explaining the ability to break the generational cycle of child maltreatment. However, deeper knowledge of the factors associated with intergenerational discontinuity could facilitate the development of innovative interventions and increase the preventive potential of existing programs. This poster presentation will be about a better understanding of the intergenerational transmission of maltreatment (IGTM) from the perspective of both youth protection workers and parents receiving child protection services. The data used to meet this goal were collected from a group interview with eight youth protection workers whose caseloads involved IGTM situations and through semi-structured interviews with four parents with a history of child protection services and who were currently receiving such services for at least one of their children. In the view of the youth protection workers, the IGTM refers to everything that is transmitted and not transmitted from one generation to the next within a family. The study participants painted quite a bleak portrait of the families affected by IGTM. However, three main avenues of intervention were mentioned by the participants: working within the network, favoring long-term interventions and being empathic. The results also show that the mothers were in a trajectory of intergenerational discontinuity in child maltreatment. Support from their families and friends as well as from formal support services brought out some possible explanatory factors for intergenerational discontinuity in child maltreatment. From a prevention perspective, developing meaningful and trusting relationships seems a source of resilience for parents who were placed in the care of the child protection system as children. The small number of participants limits the generalizability of these results. The difficulty of recruiting parents is a substantial challenge regarding gaining knowledge on the intergenerational transmission of child maltreatment. Future studies should examine this question and seek to develop effective strategies to help recruit study participants.Keywords: child maltreatment, intergenerational transmission, prevention, qualitative data
Procedia PDF Downloads 1923225 Providing Additional Advantages for STATCOM in Power Systems by Integration of Energy Storage Device
Authors: Reza Sedaghati
Abstract:
The use of Flexible AC Transmission System (FACTS) devices in a power system can potentially overcome limitations of the present mechanically controlled transmission system. Also, the advance of technology makes possible to include new energy storage devices in the electrical power system. The integration of Superconducting Magnetic Energy Storage (SMES) into Static Synchronous Compensator (STATCOM) can lead to increase their flexibility in improvement of power system dynamic behaviour by exchanging both active and reactive powers with power grids. This paper describes structure and behaviour of SMES, specifications and performance principles of the STATCOM/SMES compensator. Moreover, the benefits and effectiveness of integrated SMES with STATCOM in power systems is presented. Also, the performance of the STATCOM/SMES compensator is evaluated using an IEEE 3-bus system through the dynamic simulation by PSCAD/EMTDC software.Keywords: STATCOM/SMES compensator, chopper, converter, energy storage system, power systems
Procedia PDF Downloads 5653224 Recurrent Neural Networks for Complex Survival Models
Authors: Pius Marthin, Nihal Ata Tutkun
Abstract:
Survival analysis has become one of the paramount procedures in the modeling of time-to-event data. When we encounter complex survival problems, the traditional approach remains limited in accounting for the complex correlational structure between the covariates and the outcome due to the strong assumptions that limit the inference and prediction ability of the resulting models. Several studies exist on the deep learning approach to survival modeling; moreover, the application for the case of complex survival problems still needs to be improved. In addition, the existing models need to address the data structure's complexity fully and are subject to noise and redundant information. In this study, we design a deep learning technique (CmpXRnnSurv_AE) that obliterates the limitations imposed by traditional approaches and addresses the above issues to jointly predict the risk-specific probabilities and survival function for recurrent events with competing risks. We introduce the component termed Risks Information Weights (RIW) as an attention mechanism to compute the weighted cumulative incidence function (WCIF) and an external auto-encoder (ExternalAE) as a feature selector to extract complex characteristics among the set of covariates responsible for the cause-specific events. We train our model using synthetic and real data sets and employ the appropriate metrics for complex survival models for evaluation. As benchmarks, we selected both traditional and machine learning models and our model demonstrates better performance across all datasets.Keywords: cumulative incidence function (CIF), risk information weight (RIW), autoencoders (AE), survival analysis, recurrent events with competing risks, recurrent neural networks (RNN), long short-term memory (LSTM), self-attention, multilayers perceptrons (MLPs)
Procedia PDF Downloads 893223 Experimental Study on Floating Breakwater Anchored by Piles
Authors: Yessi Nirwana Kurniadi, Nira Yunita Permata
Abstract:
Coastline is vulnerable to coastal erosion which damage infrastructure and buildings. Floating breakwaters are applied in order to minimize material cost but still can reduce wave height. In this paper, we investigated floating breakwater anchored by piles based on experimental study in the laboratory with model scale 1:8. Two type of floating model were tested with several combination wave height, wave period and surface water elevation to determined transmission coefficient. This experimental study proved that floating breakwater with piles can prevent wave height up to 27 cm. The physical model shows that ratio of depth to wave length is less than 0.6 and ratio of model width to wave length is less than 0.3. It is confirmed that if those ratio are less than those value, the transmission coefficient is 0.5. The result also showed that the first type model of floating breakwater can reduce wave height by 60.4 % while the second one can reduce up to 55.56 %.Keywords: floating breakwater, experimental study, pile, transimission coefficient
Procedia PDF Downloads 5303222 Perceptions of Mothers on Their Role in the Prevention of the Spread of Human Immunodeficiency Virus to Their Children and Childcare Received in the Healthcare Facility in a Rural Area
Authors: Sibusiso Buthelezi, Rugira Regis Marie-Modeste, Deliwe Rene Phetlhu
Abstract:
Introduction: Mother-to-child transmission persists owing to inadequate implementation of prevention of mother-to-child transmission programmes, particularly in rural areas. To achieve a target of zero new HIV infection in children born from women living with HIV, the involvement of mothers and caregivers is undeniable. Therefore, there is a need to explore the views of the mothers because of the role they play in their own right when it comes to preventing their children from contracting HIV by consistently adhering to the guidelines of the prevention of mother-to-child transmission programme. Thus, this study sought to explore and describe the perceptions of mothers on their role in the prevention of HIV to their children exposed to HIV and further explore their perceptions of the childcare received in the healthcare facility. Methods: The study was conducted in November-December 2019 in Ngaka Modiri Molema in North West Province in South Africa. A qualitative exploratory, descriptive research design was used. Purposive sampling was used to select the mothers of children exposed to HIV during the mother`s clinic attendance. Data collection was done through semi-structured individual interviews with mothers of children exposed to HIV. Colaizzi`s method of data analysis was used to analyse data in this study. Results: Seven themes emerged from data analysis, namely: health benefits from coming to the healthcare facility, communication, information needs, attitude of healthcare workers, healthcare administration system, the role of a mother, and disclosure of HIV status. Conclusion: This study revealed systematic gaps that exist in the programme, which hinder the childcare services of children exposed to HIV and socio-economically related hindrances. Mothers’ roles, such as exclusive breastfeeding, taking their own medication, and child follow-up visits, remain inadequate. The study findings show that there is a need to develop a contextual-tailored intervention strategy that would improve the implementation of prevention of mother-to-child transmission in rural areas.Keywords: children exposed to HIV, mothers’ role to prevent MTCT, mothers’ perceptions on childcare, PMTCT in rural areas
Procedia PDF Downloads 1003221 Enzyme Linked Immuno Sorbent Assay Based Detection of Aflatoxin M1 and Ochratoxin A in Raw Milk in Punjab, India
Authors: Pallavi Moudgil, J. S. Bedi, R. S. Aulakh, J. P. S. Gill
Abstract:
Mycotoxins in milk are of major public health concern. The present study was envisaged with an aim to monitor the occurrence of aflatoxin M1 and ochratoxin A in raw milk samples collected from individual animals from dairy farms located in Punjab (India). A total of 168 raw milk samples were collected and analysed using competitive ELISA kits. Out of these, 9 (5.4%) samples were found positive for aflatoxin M1 with the mean concentration of 0.006-0.13 ng/ml and 2 (1.2%) samples exceeded the established maximum residue limit of 0.05 ng/ml established by the European Union. For ochratoxin A, 2 (0.1%) samples were found positive with the mean concentration of 0.61-0.83 ng/ml with both the samples below the established maximum residue limit of 2 ng/ml. The results showed that the milk of dairy cattle is safe with respect to ochratoxin A contamination but occurrence of aflatoxin M1 above maximum residue limit suggested that feed contaminated with mycotoxins might have been offered to dairy cattle that can pose serious health risks to consumers.Keywords: Aflatoxin M1, health risks, maximum residue limit, milk, Ochratoxin A
Procedia PDF Downloads 4823220 Identification of CLV for Online Shoppers Using RFM Matrix: A Case Based on Features of B2C Architecture
Authors: Riktesh Srivastava
Abstract:
Online Shopping have established an astonishing evolution in the last few years. And it is now apparent that B2C architecture is becoming progressively imperative channel for even traditional brick and mortar type traders as well. In this completion knowing customers and predicting behavior are extremely important. More important, when any customer logs onto the B2C architecture, the traces of their buying patterns can be stored and used for future predictions. Such a prediction is called Customer Lifetime Value (CLV). Earlier, we used Net Present Value to do so, however, it ignores two important aspects of B2C architecture, “market risks” and “big amount of customer data”. Now, we use RFM- Recency, Frequency and Monetary Value to estimate the CLV, and as the term exemplifies, market risks, is well sheltered. Big Data Analysis is also roofed in RFM, which gives real exploration of the Big Data and lead to a better estimation for future cash flow from customers. In the present paper, 6 factors (collected from varied sources) are used to determine as to what attracts the customers to the B2C architecture. For these 6 factors, RFM is computed for 3 years (2013, 2014 and 2015) respectively. CLV and Revenue are the two parameters defined using RFM analysis, which gives the clear picture of the future predictions.Keywords: CLV, RFM, revenue, recency, frequency, monetary value
Procedia PDF Downloads 2203219 Application of Failure Mode and Effects Analysis (FMEA) on the Virtual Process Hazard Analysis of Acetone Production Process
Authors: Princes Ann E. Prieto, Denise F. Alpuerto, John Rafael C. Unlayao, Neil Concibido, Monet Concepcion Maguyon-Detras
Abstract:
Failure Mode and Effects Analysis (FMEA) has been used in the virtual Process Hazard Analysis (PHA) of the Acetone production process through the dehydrogenation of isopropyl alcohol, for which very limited process risk assessment has been published. In this study, the potential failure modes, effects, and possible causes of selected major equipment in the process were identified. During the virtual FMEA mock sessions, the risks in the process were evaluated and recommendations to reduce and/or mitigate the process risks were formulated. The risk was estimated using the calculated risk priority number (RPN) and was classified into four (4) levels according to their effects on acetone production. Results of this study were also used to rank the criticality of equipment in the process based on the calculated criticality rating (CR). Bow tie diagrams were also created for the critical hazard scenarios identified in the study.Keywords: chemical process safety, failure mode and effects analysis (FMEA), process hazard analysis (PHA), process safety management (PSM)
Procedia PDF Downloads 1373218 A Differential Detection Method for Chip-Scale Spin-Exchange Relaxation Free Atomic Magnetometer
Authors: Yi Zhang, Yuan Tian, Jiehua Chen, Sihong Gu
Abstract:
Chip-scale spin-exchange relaxation free (SERF) atomic magnetometer makes use of millimeter-scale vapor cells micro-fabricated by Micro-electromechanical Systems (MEMS) technique and SERF mechanism, resulting in the characteristics of high spatial resolution and high sensitivity. It is useful for biomagnetic imaging including magnetoencephalography and magnetocardiography. In a prevailing scheme, circularly polarized on-resonance laser beam is adapted for both pumping and probing the atomic polarization. And the magnetic-field-sensitive signal is extracted by transmission laser intensity enhancement as a result of atomic polarization increase on zero field level crossing resonance. The scheme is very suitable for integration, however, the laser amplitude modulation (AM) noise and laser frequency modulation to amplitude modulation (FM-AM) noise is superimposed on the photon shot noise reducing the signal to noise ratio (SNR). To suppress AM and FM-AM noise the paper puts forward a novel scheme which adopts circularly polarized on-resonance light pumping and linearly polarized frequency-detuning laser probing. The transmission beam is divided into transmission and reflection beams by a polarization analyzer, the angle between the analyzer's transmission polarization axis and frequency-detuning laser polarization direction is set to 45°. The magnetic-field-sensitive signal is extracted by polarization rotation enhancement of frequency-detuning laser which induces two beams intensity difference increase as the atomic polarization increases. Therefore, AM and FM-AM noise in two beams are common-mode and can be almost entirely canceled by differential detection. We have carried out an experiment to study our scheme. The experiment reveals that the noise in the differential signal is obviously smaller than that in each beam. The scheme is promising to be applied for developing more sensitive chip-scale magnetometer.Keywords: atomic magnetometer, chip scale, differential detection, spin-exchange relaxation free
Procedia PDF Downloads 1703217 Understanding Tacit Knowledge and DIKW
Authors: Bahadir Aydin
Abstract:
Today it is difficult to reach accurate knowledge because of mass data. This huge data makes the environment more and more caotic. Data is a main piller of intelligence. There is a close tie between knowledge and intelligence. Information gathered from different sources can be modified, interpreted and classified by using knowledge development process. This process is applied in order to attain intelligence. Within this process the effect of knowledge is crucial. Knowledge is classified as explicit and tacit knowledge. Tacit knowledge can be seen as "only the tip of the iceberg”. This tacit knowledge accounts for much more than we guess in all intelligence cycle. If the concept of intelligence scrutinized, it can be seen that it contains risks, threats as well as success. The main purpose for all organization is to be succesful by eliminating risks and threats. Therefore, there is a need to connect or fuse existing information and the processes which can be used to develop it. By the help of process the decision-maker can be presented with a clear holistic understanding, as early as possible in the decision making process. Planning, execution and assessments are the key functions that connects to information to knowledge. Altering from the current traditional reactive approach to a proactive knowledge development approach would reduce extensive duplication of work in the organization. By new approach to this process, knowledge can be used more effectively.Keywords: knowledge, intelligence cycle, tacit knowledge, KIDW
Procedia PDF Downloads 5193216 Jitter Based Reconstruction of Transmission Line Pulse Using On-Chip Sensor
Authors: Bhuvnesh Narayanan, Bernhard Weiss, Tvrtko Mandic, Adrijan Baric
Abstract:
This paper discusses a method to reconstruct internal high-frequency signals through subsampling techniques in an IC using an on-chip sensor. Though there are existing methods to internally probe and reconstruct high frequency signals through subsampling techniques; these methods have been applicable mainly for synchronized systems. This paper demonstrates a method for making such non-intrusive on-chip reconstructions possible also in non-synchronized systems. The TLP pulse is used to demonstrate the experimental validation of the concept. The on-chip sensor measures the voltage in an internal node. The jitter in the input pulse causes a varying pulse delay with respect to the on-chip sampling command. By measuring this pulse delay and by correlating it with the measured on-chip voltage, time domain waveforms can be reconstructed, and the influence of the pulse on the internal nodes can be better understood.Keywords: on-chip sensor, jitter, transmission line pulse, subsampling
Procedia PDF Downloads 1453215 Improving Tower Grounding and Insulation Level vs. Line Surge Arresters for Protection of Subtransmission Lines
Authors: Navid Eghtedarpour, Mohammad Reza Hasani
Abstract:
Since renewable wind power plants are usually installed in mountain regions and high-level lands, they are often prone to lightning strikes and their hazardous effects. Although the transmission line is protected using guard wires in order to prevent the lightning surges to strike the phase conductors, the back-flashover may also occur due to tower footing resistance. A combination of back-flashover corrective methods, tower-footing resistance reduction, insulation level improvement, and line arrester installation, are analyzed in this paper for back-flashover rate reduction of a double-circuit 63 kV line in the south region of Fars province. The line crosses a mountain region in some sections with a moderate keraunic level, whereas tower-footing resistance is substantially high at some towers. Consequently, an exceptionally high back-flashover rate is recorded. A new method for insulation improvement is studied and employed in the current study. The method consists of using a composite-type creepage extender in the string. The effectiveness of this method for insulation improvement of the string is evaluated through the experimental test. Simulation results besides monitoring the one-year operation of the 63-kV line show that due to technical, practical, and economic restrictions in operated sub-transmission lines, a combination of corrective methods can lead to an effective solution for the protection of transmission lines against lightning.Keywords: lightning protection, BF rate, grounding system, insulation level, line surge arrester
Procedia PDF Downloads 1303214 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches
Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar
Abstract:
Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework
Procedia PDF Downloads 120