Search results for: communal practice network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8988

Search results for: communal practice network

4008 Unveiling the Realities of Marrying Too Young: Evidence from Child Brides in Sub-Saharan Africa and Infant Mortality Implications

Authors: Emmanuel Olamijuwon

Abstract:

Despite laws against child marriage - a violation against child rights, the practice remains widespread in sub-Saharan Africa and globally partly because of persistent poverty, gender inequality, protection and the need to reinforce family ties. Using pooled data from the recent demographic and health surveys of 20-sub-Saharan African countries with a regional representative sample of 36,943 girls under 18 years, this study explores the prevalence, pattern and infant mortality implications of this marriage type while also examining its regional variations. Indications from the study are that child marriage is still very high in the region with variations above one-tenth in West, Central and Southern Africa regions except in the East African region where only about 7% of children under 18 were already married. Preliminary findings also suggest that about one-in-ten infant deaths were to child brides many of whom were residing in poor households, rural residence, unemployed and have less than secondary education. Based on these findings, it is, therefore, important that government of African countries addresses critical issues through increased policies towards increasing enrollment of girl children in schools as many of these girls are not likely to have any economic benefit to the region if the observed pattern continues.

Keywords: child marriage, infant mortality, Africa, child brides

Procedia PDF Downloads 253
4007 Degradation Model for UK Railway Drainage System

Authors: Yiqi Wu, Simon Tait, Andrew Nichols

Abstract:

Management of UK railway drainage assets is challenging due to the large amounts of historical assets with long asset life cycles. A major concern for asset managers is to maintain the required performance economically and efficiently while complying with the relevant regulation and legislation. As the majority of the drainage assets are buried underground and are often difficult or costly to examine, it is important for asset managers to understand and model the degradation process in order to foresee the upcoming reduction in asset performance and conduct proactive maintenance accordingly. In this research, a Markov chain approach is used to model the deterioration process of rail drainage assets. The study is based on historical condition scores and characteristics of drainage assets across the whole railway network in England, Scotland, and Wales. The model is used to examine the effect of various characteristics on the probabilities of degradation, for example, the regional difference in probabilities of degradation, and how material and shape can influence the deterioration process for chambers, channels, and pipes.

Keywords: deterioration, degradation, markov models, probability, railway drainage

Procedia PDF Downloads 221
4006 A Comprehensive Study of Camouflaged Object Detection Using Deep Learning

Authors: Khalak Bin Khair, Saqib Jahir, Mohammed Ibrahim, Fahad Bin, Debajyoti Karmaker

Abstract:

Object detection is a computer technology that deals with searching through digital images and videos for occurrences of semantic elements of a particular class. It is associated with image processing and computer vision. On top of object detection, we detect camouflage objects within an image using Deep Learning techniques. Deep learning may be a subset of machine learning that's essentially a three-layer neural network Over 6500 images that possess camouflage properties are gathered from various internet sources and divided into 4 categories to compare the result. Those images are labeled and then trained and tested using vgg16 architecture on the jupyter notebook using the TensorFlow platform. The architecture is further customized using Transfer Learning. Methods for transferring information from one or more of these source tasks to increase learning in a related target task are created through transfer learning. The purpose of this transfer of learning methodologies is to aid in the evolution of machine learning to the point where it is as efficient as human learning.

Keywords: deep learning, transfer learning, TensorFlow, camouflage, object detection, architecture, accuracy, model, VGG16

Procedia PDF Downloads 149
4005 The Impact of Blended Learning on the Perception of High School Learners Towards Entrepreneurship

Authors: Rylyne Mande Nchu, Robertson Tengeh, Chux Iwu

Abstract:

Blended learning is a global phenomenon and is essential to many institutes of learning as an additional method of teaching that complements more traditional methods of learning. In this paper, the lack of practice of a blended learning approach to entrepreneurship education and how it impacts learners' perception of being entrepreneurial. E-learning is in its infancy within the secondary and high school sectors in South Africa. The conceptual framework of the study is based on theoretical aspects of systemic-constructivist learning implemented in an interactive online learning environment in an entrepreneurship education subject. The formative evaluation research was conducted implementing mixed methods of research (quantitative and qualitative) and it comprised a survey of high school learners and informant interviewing with entrepreneurs. Theoretical analysis of literature provides features necessary for creating interactive blended learning environments to be used in entrepreneurship education subject. Findings of the study show that learners do not always objectively evaluate their capacities. Special attention has to be paid to the development of learners’ computer literacy as well as to the activities that would bring online learning to practical training. Needs analysis shows that incorporating blended learning in entrepreneurship education may have a positive perception of entrepreneurship.

Keywords: blended learning, entrepreneurship education, entrepreneurship intention, entrepreneurial skills

Procedia PDF Downloads 112
4004 The Behavior of Dam Foundation Reinforced by Stone Columns: Case Study of Kissir Dam-Jijel

Authors: Toufik Karech, Abderahmen Benseghir, Tayeb Bouzid

Abstract:

This work presents a 2D numerical simulation of an earth dam to assess the behavior of its foundation after a treatment by stone columns. This treatment aims to improve the bearing capacity, to increase the mechanical properties of the soil, to accelerate the consolidation, to reduce the settlements and to eliminate the liquefaction phenomenon in case of seismic excitation. For the evaluation of the pore pressures, the position of the phreatic line and the flow network was defined, and a seepage analysis was performed with the software MIDAS Soil Works. The consolidation calculation is performed through a simulation of the actual construction stages of the dam. These analyzes were performed using the Mohr-Coulomb soil model and the results are compared with the actual measurements of settlement gauges implanted in the dam. An analysis of the bearing capacity was conducted to show the role of stone columns in improving the bearing capacity of the foundation.

Keywords: earth dam, dam foundation, numerical simulation, stone columns, seepage analysis, consolidation, bearing capacity

Procedia PDF Downloads 190
4003 Mitigating Supply Chain Risk for Sustainability Using Big Data Knowledge: Evidence from the Manufacturing Supply Chain

Authors: Mani Venkatesh, Catarina Delgado, Purvishkumar Patel

Abstract:

The sustainable supply chain is gaining popularity among practitioners because of increased environmental degradation and stakeholder awareness. On the other hand supply chain, risk management is very crucial for the practitioners as it potentially disrupts supply chain operations. Prediction and addressing the risk caused by social issues in the supply chain is paramount importance to the sustainable enterprise. More recently, the usage of Big data analytics for forecasting business trends has been gaining momentum among professionals. The aim of the research is to explore the application of big data, predictive analytics in successfully mitigating supply chain social risk and demonstrate how such mitigation can help in achieving sustainability (environmental, economic & social). The method involves the identification and validation of social issues in the supply chain by an expert panel and survey. Later, we used a case study to illustrate the application of big data in the successful identification and mitigation of social issues in the supply chain. Our result shows that the company can predict various social issues through big data, predictive analytics and mitigate the social risk. We also discuss the implication of this research to the body of knowledge and practice.

Keywords: big data, sustainability, supply chain social sustainability, social risk, case study

Procedia PDF Downloads 408
4002 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 113
4001 Estimating X-Ray Spectra for Digital Mammography by Using the Expectation Maximization Algorithm: A Monte Carlo Simulation Study

Authors: Chieh-Chun Chang, Cheng-Ting Shih, Yan-Lin Liu, Shu-Jun Chang, Jay Wu

Abstract:

With the widespread use of digital mammography (DM), radiation dose evaluation of breasts has become important. X-ray spectra are one of the key factors that influence the absorbed dose of glandular tissue. In this study, we estimated the X-ray spectrum of DM using the expectation maximization (EM) algorithm with the transmission measurement data. The interpolating polynomial model proposed by Boone was applied to generate the initial guess of the DM spectrum with the target/filter combination of Mo/Mo and the tube voltage of 26 kVp. The Monte Carlo N-particle code (MCNP5) was used to tally the transmission data through aluminum sheets of 0.2 to 3 mm. The X-ray spectrum was reconstructed by using the EM algorithm iteratively. The influence of the initial guess for EM reconstruction was evaluated. The percentage error of the average energy between the reference spectrum inputted for Monte Carlo simulation and the spectrum estimated by the EM algorithm was -0.14%. The normalized root mean square error (NRMSE) and the normalized root max square error (NRMaSE) between both spectra were 0.6% and 2.3%, respectively. We conclude that the EM algorithm with transmission measurement data is a convenient and useful tool for estimating x-ray spectra for DM in clinical practice.

Keywords: digital mammography, expectation maximization algorithm, X-Ray spectrum, X-Ray

Procedia PDF Downloads 730
4000 The Impact of the Saudi New E-Commerce Law on Protecting E-Commerce Investments in Saudi Arabia

Authors: Faris Algarni

Abstract:

The Kingdom of Saudi Arabia adopted a new law of e-commerce on July 10, 2019, which is the first Saudi law regarding e-commerce. The practice of e-commerce has been started in Saudi Arabia a few years ago with no specific rules to govern e-commerce in the Kingdom. The adoption of the law raises the concern of the ability of the law to provide real protection to both the investors and the customers. Based on that, this article seeks to respond to some questions related to the protection of investors of e-commerce in Saudi Arabia, using a quantitative method through questionnaires to gather primary data. The study tried to find the impact of adopting a new Saudi law of e-commerce on the protection of the investors from the point of view of those investors. By answering this main question, this article provides an answer to the question of whether there is a need to reform the Saudi law of e-commerce to convince existing and potential foreign investors to invest in the Kingdom through e-commerce. Questions were put to the respondents to determine their level of satisfaction with the Saudi law of e-commerce and what reforms to that system would enhance the attractiveness of the Kingdom as an investment environment for e-commerce investors, based on the information gathered and the analysis of them. A key finding is that the law of e-commerce is a core factor in the decision of investors to continue investing in the e-commerce market in Saudi Arabia. A subsequent finding is that some of the respondents are not fully satisfied with the new law and think that the law provides more protection to the customers than the investors. So, they are suggesting some legal reforms to be implemented in the bylaw of e-commerce, which is not adopted yet in order to attract them to continue investing in the Kingdom.

Keywords: e-commerce, law, investors, protection, Saudi Arabia

Procedia PDF Downloads 129
3999 Optimal Reactive Power Dispatch under Various Contingency Conditions Using Whale Optimization Algorithm

Authors: Khaled Ben Oualid Medani, Samir Sayah

Abstract:

The Optimal Reactive Power Dispatch (ORPD) problem has been solved and analysed usually in the normal conditions. However, network collapses appear in contingency conditions. In this paper, ORPD under several contingencies is presented using the proposed method WOA. To ensure viability of the power system in contingency conditions, several critical cases are simulated in order to prevent and prepare the power system to face such situations. The results obtained are carried out in IEEE 30 bus test system for the solution of ORPD problem in which control of bus voltages, tap position of transformers and reactive power sources are involved. Moreover, another method, namely, Particle Swarm Optimization with Time Varying Acceleration Coefficient (PSO-TVAC) has been compared with the proposed technique. Simulation results indicate that the proposed WOA gives remarkable solution in terms of effectiveness in case of outages.

Keywords: optimal reactive power dispatch, power system analysis, real power loss minimization, contingency condition, metaheuristic technique, whale optimization algorithm

Procedia PDF Downloads 121
3998 Social Discussion Networks during the Covid-19 Pandemic: A Study of College Students Core Discussion Groups

Authors: Regan Harper, Song Yang, Douglas Adams

Abstract:

During the historically unprecedent time of Covid-19 pandemic, we survey college students with social issue generators to measure their core discussion groups. For the total 191 students, we elicit 847 conversation partners (alters) with our five social issue generators such as school closing, facemasks, collegiate sports, race and policing, and social inequality, producing an average of 4.43 alters per respondent. The core discussion groups of our sample are very gender balanced, with female alters slightly outnumbering male alters. However, the core discussion groups are racially homogenous, consisting of mostly white students (around or above 80 percent). Explanatory analyses reveal that gender and race of respondents significantly impact the size, gender composition, and racial composition of their core discussion networks. We discuss those major findings and implications of future studies in our conclusion section.

Keywords: core discussion groups, social issue generators, ego-centric network, Covid-19 pandemic

Procedia PDF Downloads 91
3997 Prosodic Characteristics of Post Traumatic Stress Disorder Induced Speech Changes

Authors: Jarek Krajewski, Andre Wittenborn, Martin Sauerland

Abstract:

This abstract describes a promising approach for estimating post-traumatic stress disorder (PTSD) based on prosodic speech characteristics. It illustrates the validity of this method by briefly discussing results from an Arabic refugee sample (N= 47, 32 m, 15 f). A well-established standardized self-report scale “Reaction of Adolescents to Traumatic Stress” (RATS) was used to determine the ground truth level of PTSD. The speech material was prompted by telling about autobiographical related sadness inducing experiences (sampling rate 16 kHz, 8 bit resolution). In order to investigate PTSD-induced speech changes, a self-developed set of 136 prosodic speech features was extracted from the .wav files. This set was adapted to capture traumatization related speech phenomena. An artificial neural network (ANN) machine learning model was applied to determine the PTSD level and reached a correlation of r = .37. These results indicate that our classifiers can achieve similar results to those seen in speech-based stress research.

Keywords: speech prosody, PTSD, machine learning, feature extraction

Procedia PDF Downloads 90
3996 Reproduction of New Media Art Village around NTUT: Heterotopia of Visual Culture Art Education

Authors: Yu Cheng-Yu

Abstract:

‘Heterotopia’, ‘Visual Cultural Art Education’ and ‘New Media’ of these three subjects seemingly are irrelevant. In fact, there are synchronicity and intertextuality inside. In addition to visual culture, art education inspires students the ability to reflect on popular culture image through visual culture teaching strategies in school. We should get involved in the community to construct the learning environment that conveys visual culture art. This thesis attempts to probe the heterogeneity of space and value from Michel Foucault and to research sustainable development strategy in ‘New Media Art Village’ heterogeneity from Jean Baudrillard, Marshall McLuhan's media culture theory and social construction ideology. It is possible to find a new media group that can convey ‘Visual Culture Art Education’ around the National Taipei University of Technology in this commercial district that combines intelligent technology, fashion, media, entertainment, art education, and marketing network. Let the imagination and innovation of ‘New Media Art Village’ become ‘implementable’ and new media Heterotopia of inter-subjectivity with the engagement of big data and digital media. Visual culture art education will also bring aesthetics into the community by New Media Art Village.

Keywords: social construction, heterogeneity, new media, big data, visual culture art education

Procedia PDF Downloads 248
3995 SCANet: A Workflow for Single-Cell Co-Expression Based Analysis

Authors: Mhaned Oubounyt, Jan Baumbach

Abstract:

Differences in co-expression networks between two or multiple cells (sub)types across conditions is a pressing problem in single-cell RNA sequencing (scRNA-seq). A key challenge is to define those co-variations that differ between or among cell types and/or conditions and phenotypes to examine small regulatory networks that can explain mechanistic differences. To this end, we developed SCANet, an all-in-one Python package that uses state-of-the-art algorithms to facilitate the workflow of a combined single-cell GCN (Gene Correlation Network) and GRN (Gene Regulatory Networks) pipeline, including inference of gene co-expression modules from scRNA-seq, followed by trait and cell type associations, hub gene detection, co-regulatory networks, and drug-gene interactions. In an example case, we illustrate how SCANet can be applied to identify regulatory drivers behind a cytokine storm associated with mortality in patients with acute respiratory illness. SCANet is available as a free, open-source, and user-friendly Python package that can be easily integrated into systems biology pipelines.

Keywords: single-cell, co-expression networks, drug-gene interactions, co-regulatory networks

Procedia PDF Downloads 150
3994 Estimating the Effect of Fluid in Pressing Process

Authors: A. Movaghar, R. A. Mahdavinejad

Abstract:

To analyze the effect of various parameters of fluid on the material properties such as surface and depth defects and/or cracks, it is possible to determine the affection of pressure field on these specifications. Stress tensor analysis is also able to determine the points in which the probability of defection creation is more. Besides, from pressure field, it is possible to analyze the affection of various fluid specifications such as viscosity and density on defect created in the material. In this research, the concerned boundary conditions are analyzed first. Then the solution network and stencil used are mentioned. With the determination of relevant equation on the fluid flow between notch and matrix and their discretion according to the governed boundary conditions, these equations can be solved. Finally, with the variation creations on fluid parameters such as density and viscosity, the affection of these variations can be determined on pressure field. In this direction, the flowchart and solution algorithm with their results as vortex and current function contours for two conditions with most applications in pressing process are introduced and discussed.

Keywords: pressing, notch, matrix, flow function, vortex

Procedia PDF Downloads 290
3993 Effects of Six Weeks of Moderate-Intensity Aerobic Training with a Pomegranate Juice on Plasma Leptin in Women with Type 2 Diabetes

Authors: M. Golzade Gangraj, A. Abdi, H.faraji

Abstract:

Aim: The aim of this study was to evaluate the effects of six weeks of moderate-intensity aerobic exercise with pomegranate juice (PJ) on plasma leptin in adult women selection of type-2 diabetes. Methods: Survey postmenopausal diabetic women aged 45 to 60 years in the city of Babylon, who coordinated Diabetes Association presented the city, among them 34 were selected as subjects were randomly divided into four groups: control, PJ, practice and PJ. Experimental groups consisted of 6 weeks of aerobic exercise training program three times a week for at least 45 minutes per meeting. Two days before and after the training period in the fasting state (12 h) blood samples from the brachial vein was performed in a sitting position. Results: Results showed that aerobic exercise with consumption of pomegranate juice alone and interaction with each significantly decrease levels of leptin plasma in older women with type 2 diabetes compared to control group. Conclusion: According to the research findings can be stated the exercise with pomegranate juice beneficially effects fat tissue and decreases plasma leptin in adult women with type 2 diabetes and thereby reduce risk of cardiovascular disease.

Keywords: aerobic exercise, pomegranate, leptin, diabetes

Procedia PDF Downloads 441
3992 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things

Authors: James Kaweesa

Abstract:

The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.

Keywords: cyber-threats, iot, intrusion detection system, networks

Procedia PDF Downloads 80
3991 Knowledge Representation Based on Interval Type-2 CFCM Clustering

Authors: Lee Myung-Won, Kwak Keun-Chang

Abstract:

This paper is concerned with knowledge representation and extraction of fuzzy if-then rules using Interval Type-2 Context-based Fuzzy C-Means clustering (IT2-CFCM) with the aid of fuzzy granulation. This proposed clustering algorithm is based on information granulation in the form of IT2 based Fuzzy C-Means (IT2-FCM) clustering and estimates the cluster centers by preserving the homogeneity between the clustered patterns from the IT2 contexts produced in the output space. Furthermore, we can obtain the automatic knowledge representation in the design of Radial Basis Function Networks (RBFN), Linguistic Model (LM), and Adaptive Neuro-Fuzzy Networks (ANFN) from the numerical input-output data pairs. We shall focus on a design of ANFN in this paper. The experimental results on an estimation problem of energy performance reveal that the proposed method showed a good knowledge representation and performance in comparison with the previous works.

Keywords: IT2-FCM, IT2-CFCM, context-based fuzzy clustering, adaptive neuro-fuzzy network, knowledge representation

Procedia PDF Downloads 322
3990 Relationships among Parentification, Self-Differentiation, and Ambivalence over Emotional Expression for Children of Migratory Families

Authors: Wan-Chun Chang, Yi-Jung Lee

Abstract:

Due to cultural factors, expressing emotions may not be encouraged in collectivist cultures, which emphasize the needs of the group over the needs of the individual. This phenomenon is more prominent for children of migratory families. Due to the absence of one parent, children were often parentified by adults, which then impacted on their self-differentiation process. It made them more difficult to express their needs and emotions freely and openly. This study aimed to investigate the meditation effect of self-differentiation between parentification, and ambivalence over emotional expression for children of migratory families in Taiwan. Participants included 460 (326 females, 134 males) Taiwanese adults (age 18-25 years). The data were collected through questionnaires and analyzed using descriptive statistics and multiple regression analysis. The questionnaire included informed consent form, 'Filial Responsibility Scale-Adult', 'Chinese version of the Differentiation of Self Inventory', 'Ambivalence over Emotion Expressiveness Questionnaire', and the demographic sheet. Results indicated that self-differentiation mediated the relationship between parentified experience and ambivalence over emotional expression. In other words, parentified experience itself does not have the power to affect ambivalence over emotional expression. Only by affecting self-differentiation can it make an actual difference. The results were as expected and confirmed the hypothesis. Implications for clinical practice, research, and training were discussed.

Keywords: ambivalence over emotional expression, children of migratory families, parentification, self-differentiation

Procedia PDF Downloads 133
3989 Rejuvenating Cultural Energy: Forging Pathways to Alternative Ecological and Development Paradigms

Authors: Aldrin R. Logdat

Abstract:

The insights and wisdom of the Alangan Mangyans offer valuable guidance for developing alternative ecological and development frameworks. Their reverence for the sacredness of the land, rooted in their traditional cosmology, guides their harmonious relationship with nature. Through their practice of swidden farming, ecosystem preservation takes precedence as they carefully manage agricultural activities and allow for forest regeneration. This approach aligns with natural processes, reflecting their profound understanding of the natural world. Similar to early advocates like Aldo Leopold, the emphasis is on shifting our perception of land from a commodity to a community. The indigenous wisdom of the Alangan Mangyans provides practical and sustainable approaches to preserving the interdependence of the biotic community and ecosystems. By integrating their cultural heritage, we can transcend the prevailing anthropocentric mindset and foster a meaningful and sustainable connection with nature. The revitalization of cultural energy and the embrace of alternative frameworks require learning from indigenous peoples like the Alangan Mangyans, where reverence for the land and the recognition of the interconnectedness between humanity and nature are prioritized. This paves the way for a future where harmony with nature and the well-being of the Earth community prevail.

Keywords: Alangan Mangyans, ecological frameworks, sacredness of the land, cultural energy

Procedia PDF Downloads 103
3988 Kauffman Model on a Network of Containers

Authors: Johannes J. Schneider, Mathias S. Weyland, Peter Eggenberger Hotz, William D. Jamieson, Oliver Castell, Alessia Faggian, Rudolf M. Füchslin

Abstract:

In the description of the origin of life, there are still some open gaps, e.g., the formation of macromolecules cannot be fully explained so far. The Kauffman model proposes the existence of autocatalytic sets of macromolecules which mutually catalyze reactions leading to each other’s formation. Usually, this model is simulated in one well-stirred pot only, with a continuous inflow of small building blocks, from which larger molecules are created by a set of catalyzed ligation and cleavage reactions. This approach represents the picture of the primordial soup. However, the conditions on the early Earth must have differed geographically, leading to spatially different outcomes whether a specific reaction could be performed or not. Guided by this picture, the Kauffman model is simulated in a large number of containers in parallel, with neighboring containers being connected by diffusion. In each container, only a subset of the overall reaction set can be performed. Under specific conditions, this approach leads to a larger probability for the existence of an autocatalytic metabolism than in the original Kauffman model.

Keywords: agglomeration, autocatalytic set, differential equation, Kauffman model

Procedia PDF Downloads 58
3987 The Passive Recipient – How the Pupil Comes across in Local Swedish Health Policy Documents

Authors: Zofia Hammerin, Goran Basic, Disa Bergnehr

Abstract:

Ever since the Ottawa charter in 1986, health promotion through schools has been stressed across the globe. Both in the global and national discourse, schools are made responsible not only for providing education but also for working with pupil health and well-being. In Sweden, where the study is set, it is emphasized in national directives that promoting pupil health should be part of the school practice. Since the Swedish school system is decentralized, these directives need to be interpreted and recontextualized locally. This study aims to explore how the student comes across in Swedish local health policy documents. The data consists of 37 such documents called student health plans collected from different high schools throughout Sweden. The analysis was inspired by critical discourse analysis, and tentative results are divided into two main themes; the invisible actor and the passive recipient. The pupil is largely invisible in the documents, and the discourse instead focuses on school health service staff and, to some extent, the teachers. When the pupils are visible, they mainly come across as passive recipients of health promoting actions. Since participation, taking action, and feeling empowered are key aspects of health promotion, the findings could impact the pupils’ possibilities for health and well-being.

Keywords: health promotion, high school, student, sweden

Procedia PDF Downloads 101
3986 Combined Safety and Cybersecurity Risk Assessment for Intelligent Distributed Grids

Authors: Anders Thorsén, Behrooz Sangchoolie, Peter Folkesson, Ted Strandberg

Abstract:

As more parts of the power grid become connected to the internet, the risk of cyberattacks increases. To identify the cybersecurity threats and subsequently reduce vulnerabilities, the common practice is to carry out a cybersecurity risk assessment. For safety classified systems and products, there is also a need for safety risk assessments in addition to the cybersecurity risk assessment in order to identify and reduce safety risks. These two risk assessments are usually done separately, but since cybersecurity and functional safety are often related, a more comprehensive method covering both aspects is needed. Some work addressing this has been done for specific domains like the automotive domain, but more general methods suitable for, e.g., intelligent distributed grids, are still missing. One such method from the automotive domain is the Security-Aware Hazard Analysis and Risk Assessment (SAHARA) method that combines safety and cybersecurity risk assessments. This paper presents an approach where the SAHARA method has been modified in order to be more suitable for larger distributed systems. The adapted SAHARA method has a more general risk assessment approach than the original SAHARA. The proposed method has been successfully applied on two use cases of an intelligent distributed grid.

Keywords: intelligent distribution grids, threat analysis, risk assessment, safety, cybersecurity

Procedia PDF Downloads 153
3985 The Effects of Separating Inferior Alveolar Neurovascular Bundles on Osteogenesis of Tissue-Engineered Bone and Vascularization

Authors: Lin Feng, E. Lingling, Hongchen Liu

Abstract:

In order to evaluate the effects of autologous blood vessels and nerves on vascularization. A dog model of tissue-engineered bone vascularization was established by constructing inferior alveolar neurovascular bundles through the mandibular canal. Sixteen 12-month-old healthy beagles were randomly divided into two groups (n=8). Group A retained inferior alveolar neurovascular bundles, and Group B retained inferior alveolar nerves. Bone marrow mesenchymal stem cells were injected into β-tricalcium phosphate to prepare internal tissue-engineered bone scaffold. A personalized titanium mesh was then prepared by rapid prototyping and fixed by external titanium scaffold. Two dogs in each group were sacrificed on the 30th, 45th, 60th, and 90th postoperative days respectively. The bone was visually examined, scanned by CT, and subjected to HE staining, immunohistochemical staining, vascular casting and PCR to detect the changes in osteogenesis and vascularization.The two groups had similar outcomes in regard to osteogenesis and vascularization (P>0.05) both showed remarkable regenerative capacities. The model of tissue-engineered bone vascularization is potentially applicable in clinical practice to allow satisfactory osteogenesis and vascularization.

Keywords: inferior alveolar neurovascular bundle, osteogenesis, tissue-engineered bone, vascularization

Procedia PDF Downloads 390
3984 Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking

Authors: Haowei Chen, Kaiqi Xiong

Abstract:

This paper aims to answer how malware will propagate in Wireless Mesh Networks (WMNs) and how communication radius and distributed density of nodes affects the process of spreading. The above analysis is essential for devising network-wide strategies to counter malware. We answer these questions by developing an improved dynamical system that models malware propagation in the area where nodes were uniformly distributed. The proposed model captures both the spatial and temporal dynamics regarding the malware spreading process. Equilibrium and stability are also discussed based on the threshold of the system. If the threshold is less than one, the infected nodes disappear, and if the threshold is greater than one, the infected nodes asymptotically stabilize at the endemic equilibrium. Numerical simulations are investigated about communication radius and distributed density of nodes in WMNs, which allows us to draw various insights that can be used to guide security defense.

Keywords: Bluetooth security, malware propagation, wireless mesh networks, stability analysis

Procedia PDF Downloads 98
3983 Selection of Intensity Measure in Probabilistic Seismic Risk Assessment of a Turkish Railway Bridge

Authors: M. F. Yilmaz, B. Ö. Çağlayan

Abstract:

Fragility curve is an effective common used tool to determine the earthquake performance of structural and nonstructural components. Also, it is used to determine the nonlinear behavior of bridges. There are many historical bridges in the Turkish railway network; the earthquake performances of these bridges are needed to be investigated. To derive fragility curve Intensity measures (IMs) and Engineering demand parameters (EDP) are needed to be determined. And the relation between IMs and EDP are needed to be derived. In this study, a typical simply supported steel girder riveted railway bridge is studied. Fragility curves of this bridge are derived by two parameters lognormal distribution. Time history analyses are done for selected 60 real earthquake data to determine the relation between IMs and EDP. Moreover, efficiency, practicality, and sufficiency of three different IMs are discussed. PGA, Sa(0.2s) and Sa(1s), the most common used IMs parameters for fragility curve in the literature, are taken into consideration in terms of efficiency, practicality and sufficiency.

Keywords: railway bridges, earthquake performance, fragility analyses, selection of intensity measures

Procedia PDF Downloads 357
3982 Perception and Knowledge of the Jordanian Society of Occupational Therapy

Authors: Wesam Darawsheh

Abstract:

Background: there are scarcity of studies done to investigate the level of knowledge and the level of awareness and perception of Jordanians about occupational therapy (OT). Aim: to investigate the level of awareness of lay people, clients receiving services and healthcare professionals of OT, identify the common misconceptions about OT, and to explore ways whereby the knowledge and awareness about OT can be increased. Methodology: a cross sectional design was employed in this study where a survey was distributed in the Northern, Southern, Western, Eastern provinces and the Middle (capital city: Amman) province of Jordan. The survey consisted of eight section and 61 questions that aims to investigate the demographics of participants, self evaluation concerning knowledge and awareness about OT, sources of knowledge about OT, the perception of the aims, fields of practice, OT settings, misconceptions about OT, and suggestion to improve knowledge and awareness about OT. Results: A total of 829 participants were enrolled in this study: 459 lay people, 155 clients who are currently receiving OT services, 215 healthcare professionals. About 57% of the participants did not hear about OT, and 48% of those who reported to hear about OT did not have sufficient knowledge about it. There are several misconceptions associated with OT. The statistical analysis was executed using IBM SPSS software, Version 22.0 (SPSS, Chicago, USA). Conclusion: it is the responsibility of OTRs to increase the knowledge and awareness about OT in Jordan. This is required for the profession to proliferate and to be given its status.

Keywords: knowledge, occupational therapy misconceptions, healthcare professionals, lay people, Jordan

Procedia PDF Downloads 362
3981 Enhancing Learning Ability among Deaf Students by Using Photographic Images

Authors: Aidah Alias, Mustaffa Halabi Azahari, Adzrool Idzwan Ismail, Salasiah Ahmad

Abstract:

Education is one of the most important elements in a human life. Educations help us in learning and achieve new things in life. The ability of hearing gave us chances to hear voices and it is important in our communication. Hearing stories told by others; hearing news and music to create our creative and sense; seeing and hearing make us understand directly the message trying to deliver. But, what will happen if we are born deaf or having hearing loss while growing up? The objectives of this paper are to identify the current practice in teaching and learning among deaf students and to analyse an appropriate method in enhancing learning process among deaf students. A case study method was employed by using methods of observation and interview to selected deaf students and teachers. The findings indicated that the suitable method of teaching for deaf students is by using pictures and body movement. In other words, by combining these two medium of images and body movement, the best medium that the study suggested is by using video or motion pictures. The study concluded and recommended that video or motion pictures is recommended medium to be used in teaching and learning for deaf students.

Keywords: deaf, photographic images, visual communication, education, learning ability

Procedia PDF Downloads 284
3980 The Impact of the General Data Protection Regulation on Human Resources Management in Schools

Authors: Alexandra Aslanidou

Abstract:

The General Data Protection Regulation (GDPR), concerning the protection of natural persons within the European Union with regard to the processing of personal data and on the free movement of such data, became applicable in the European Union (EU) on 25 May 2018 and transformed the way personal data were being treated under the Data Protection Directive (DPD) regime, generating sweeping organizational changes to both public sector and business. A social practice that is considerably influenced in the way of its day-to-day operations is Human Resource (HR) management, for which the importance of GDPR cannot be underestimated. That is because HR processes personal data coming in all shapes and sizes from many different systems and sources. The significance of the proper functioning of an HR department, specifically in human-centered, service-oriented environments such as the education field, is decisive due to the fact that HR operations in schools, conducted effectively, determine the quality of the provided services and consequently have a considerable impact on the success of the educational system. The purpose of this paper is to analyze the decisive role that GDPR plays in HR departments that operate in schools and in order to practically evaluate the aftermath of the Regulation during the first months of its applicability; a comparative use cases analysis in five highly dynamic schools, across three EU Member States, was attempted.

Keywords: general data protection regulation, human resource management, educational system

Procedia PDF Downloads 100
3979 Analysis of the AZF Region in Slovak Men with Azoospermia

Authors: J. Bernasovská, R. Lohajová Behulová, E. Petrejčiková, I. Boroňová, I. Bernasovský

Abstract:

Y chromosome microdeletions are the most common genetic cause of male infertility and screening for these microdeletions in azoospermic or severely oligospermic men is now standard practice. Analysis of the Y chromosome in men with azoospermia or severe oligozoospermia has resulted in the identification of three regions in the euchromatic part of the long arm of the human Y chromosome (Yq11) that are frequently deleted in men with otherwise unexplained spermatogenic failure. PCR analysis of microdeletions in the AZFa, AZFb and AZFc regions of the human Y chromosome is an important screening tool. The aim of this study was to analyse the type of microdeletions in men with fertility disorders in Slovakia. We evaluated 227 patients with azoospermia and with normal karyotype. All patient samples were analyzed cytogenetically. For PCR amplification of sequence-tagged sites (STS) of the AZFa, AZFb and AZFc regions of the Y chromosome was used Devyser AZF set. Fluorescently labeled primers for all markers in one multiplex PCR reaction were used and for automated visualization and identification of the STS markers we used genetic analyzer ABi 3500xl (Life Technologies). We reported 13 cases of deletions in the AZF region 5,73%. Particular types of deletions were recorded in each region AZFa,b,c .The presence of microdeletions in the AZFc region was the most frequent. The study confirmed that percentage of microdeletions in the AZF region is low in Slovak azoospermic patients, but important from a prognostic view.

Keywords: AZF, male infertility, microdeletions, Y chromosome

Procedia PDF Downloads 373