Search results for: model laws
12116 BSYJ Promoting Homing and Differentiation of Mesenchymal Stem Cells at the Retina of Age-Related Macular Degeneration Model Mice Induced by Sodium Iodate
Authors: Lina Liang, Kai Xu, Jing Zhang
Abstract:
Purpose: Age-related macular degeneration (AMD) is a major leading cause of visual impairment and blindness with no cure currently established. Cell replacement is discussed as a potential therapy for AMD. Besides intravitreal injection and subretinal injection, intravenous administration has been explored as an alternative route. This study is to observe the effect of BSYJ, a traditional Chinese medicine on the homing and differentiation of mesenchymal stem cells transplanted via tail vein injection in an age-related macular degeneration mouse model. Methods: Four-week-old C57BL/6J mice were injected with 40 mg/kg NaIO₃ to induce age-related macular degeneration model. At the second day after NaIO₃ injection, 1×10⁷ GFP labeled bone marrow-derived mesenchymal stem cells (GFP-MSCs) were transplanted via tali vein injection into the experimental mice. Then the mice were randomly divided into two groups, gavaged with either BSYJ solution (BSYJ group, n=12) or distilled water (DW group, n=12). 12 age-matched healthy C57BL/6J mice were fed regularly as normal control. At day 7, day 14, and day 28 after treatment, retina flat mounting was used to detect the homing of mesenchymal stem cells at the retina. Double-labeling immunofluorescence was used to determine the differentiation of mesenchymal stem cells. Results: At 7, 14, 28 days after treatment, the numbers of GFP-MSCs detected by retina flatmount were 10.2 ± 2.5, 14.5 ± 3.4 and 18.7 ± 5.8, respectively in the distilled water group, while 15.7 ± 3.8, 32.3 ± 3.5 and 77.3 ± 6.4 in BSYJ group, the differences between the two groups were significant (p < 0.05). At 28 days after treatment, it was shown by double staining immunofluorescence that there were more GFP positive cells in the retina of BSYJ group than that of the DW group, but none of the cells expressed RPE specific genes such as RPE65 and CRALBP, or photoreceptor genes such as recoverin and rhodopsin either in BSYJ group or DW group. However, GFAP positive cells were found among the cells labeled with GFP, and the double labeling cells were much more in the BSYJ group than the distilled water group. Conclusion: BSYJ could promote homing of mesenchymal stem cells at the retina of age-related macular degeneration model mice induced by NaIO₃, and the differentiation towards to glial cells. Acknowledgement: National Natural Foundation of China (No: 81473736, 81674033,81973912).Keywords: BSYJ, differentiation, homing, mesenchymal stem cells
Procedia PDF Downloads 14412115 An Approach to Addressing Homelessness in Hong Kong: Life Story Approach
Authors: Tak Mau Simon Chan, Ying Chuen Lance Chan
Abstract:
Homelessness has been a popular and controversial debate in Hong Kong, a city which is densely populated and well-known for very expensive housing. The constitution of the homeless as threats to the community and environmental hygiene is ambiguous and debatable in the Hong Kong context. The lack of an intervention model is the critical research gap thus far, aside from the tangible services delivered. The life story approach (LSA), with its unique humanistic orientation, has been well applied in recent decades to depict the needs of various target groups, but not the homeless. It is argued that the life story approach (LSA), which has been employed by health professionals in the landscape of dementia, and health and social care settings, can be used as a reference in the local Chinese context through indigenization. This study, therefore, captures the viewpoints of service providers and users by constructing an indigenous intervention model that refers to the LSA in serving the chronically homeless. By informing 13 social workers and 27 homeless individuals in 8 focus groups whilst 12 homeless individuals have participated in individual in-depth interviews, a framework of LSA in homeless people is proposed. Through thematic analysis, three main themes of their life stories was generated, namely, the family, negative experiences and identity transformation. The three domains solidified framework that not only can be applied to the homeless, but also other disadvantaged groups in the Chinese context. Based on the three domains of family, negative experiences and identity transformation, the model is applied in the daily practices of social workers who help the homeless. The domain of family encompasses familial relationships from the past to the present to the speculated future with ten sub-themes. The domain of negative experiences includes seven sub-themes, with reference to the deviant behavior committed. The last domain, identity transformation, incorporates the awareness and redefining of one’s identity and there are a total of seven sub-themes. The first two domains are important components of personal histories while the third is more of an unknown, exploratory and yet to-be-redefined territory which has a more positive and constructive orientation towards developing one’s identity and life meaning. The longitudinal temporal dimension of moving from the past – present - future enriches the meaning making process, facilitates the integration of life experiences and maintains a more hopeful dialogue. The model is tested and its effectiveness is measured by using qualitative and quantitative methods to affirm the extent that it is relevant to the local context. First, it contributes to providing a clear guideline for social workers who can use the approach as a reference source. Secondly, the framework acts as a new intervention means to address problem saturated stories and the intangible needs of the homeless. Thirdly, the model extends the application to beyond health related issues. Last but not least, the model is highly relevant to the local indigenous context.Keywords: homeless, indigenous intervention, life story approach, social work practice
Procedia PDF Downloads 29612114 Phase II Monitoring of First-Order Autocorrelated General Linear Profiles
Authors: Yihua Wang, Yunru Lai
Abstract:
Statistical process control has been successfully applied in a variety of industries. In some applications, the quality of a process or product is better characterized and summarized by a functional relationship between a response variable and one or more explanatory variables. A collection of this type of data is called a profile. Profile monitoring is used to understand and check the stability of this relationship or curve over time. The independent assumption for the error term is commonly used in the existing profile monitoring studies. However, in many applications, the profile data show correlations over time. Therefore, we focus on a general linear regression model with a first-order autocorrelation between profiles in this study. We propose an exponentially weighted moving average charting scheme to monitor this type of profile. The simulation study shows that our proposed methods outperform the existing schemes based on the average run length criterion.Keywords: autocorrelation, EWMA control chart, general linear regression model, profile monitoring
Procedia PDF Downloads 46012113 Breast Cancer Detection Using Machine Learning Algorithms
Authors: Jiwan Kumar, Pooja, Sandeep Negi, Anjum Rouf, Amit Kumar, Naveen Lakra
Abstract:
In modern times where, health issues are increasing day by day, breast cancer is also one of them, which is very crucial and really important to find in the early stages. Doctors can use this model in order to tell their patients whether a cancer is not harmful (benign) or harmful (malignant). We have used the knowledge of machine learning in order to produce the model. we have used algorithms like Logistic Regression, Random forest, support Vector Classifier, Bayesian Network and Radial Basis Function. We tried to use the data of crucial parts and show them the results in pictures in order to make it easier for doctors. By doing this, we're making ML better at finding breast cancer, which can lead to saving more lives and better health care.Keywords: Bayesian network, radial basis function, ensemble learning, understandable, data making better, random forest, logistic regression, breast cancer
Procedia PDF Downloads 5212112 Dynamic Relaxation and Isogeometric Analysis for Finite Deformation Elastic Sheets with Combined Bending and Stretching
Authors: Nikhil Padhye, Ellen Kintz, Dan Dorci
Abstract:
Recent years have seen a rising interest in study and applications of materially uniform thin-structures (plates/shells) subject to finite-bending and stretching deformations. We introduce a well-posed 2D-model involving finite-bending and stretching of thin-structures to approximate the three-dimensional equilibria. Key features of this approach include: Non-Uniform Rational B-Spline (NURBS)-based spatial discretization for finite elements, method of dynamic relaxation to predict stable equilibria, and no a priori kinematic assumption on the deformation fields. The approach is validated against the benchmark problems,and the use of NURBS for spatial discretization facilitates exact spatial representation and computation of curvatures (due to C1-continuity of interpolated displacements) for this higher-order accuracy 2D-model.Keywords: Isogeometric Analysis, Plates/Shells , Finite Element Methods, Dynamic Relaxation
Procedia PDF Downloads 16812111 Managing Food Waste Behaviour in Saudi Arabia: Investigating the Role of Social Marketing
Authors: Suliman Al Balawi
Abstract:
Food waste is a significant problem in the Kingdom of Saudi Arabia (KSA). About SR13 billion worth of food is wasted per year in the KSA. From moral, social, and economic perspectives, it is essential to reduce the wastage of food. Although studies have identified the amount of food waste in the KSA, there is a lack of research on why people in the KSA waste food; thus, it is difficult to design efficient intervention programs to reduce food waste. This research investigates the key factors that influence the food waste behavior of the people of the KSA. A food waste behavior model is proposed in this study that has moral disengagement at the center of the model. Following a literature survey, it is hypothesised that religiosity, hedonic value, frugality, and trait cynicism are the antecedents of moral disengagement that are likely to impact the food waste behavior of the people of the KSA. The study further posits that an intervention strategy in the form of a social marketing campaign that focuses on lowering the level of moral disengagement could reduce the food waste behavior of the people of the KSA. This study will apply a pre-test/post-test experimental design (control group). A random sampling method will be used to select participants from the (employees of a chosen firm) in the KSA. The social marketing campaign will be run for six months through the Corporate Social Responsibility Department of the Company, and to analyse the experimental data, structural equation modeling (SEM) will be used. The outcomes of the study will demonstrate the effectiveness of a social marketing campaign for improving the food waste behavior of the people of the KSA and will ultimately lay the foundation for designing efficient intervention programs in the future. This study will contribute to the knowledge on food waste behavior by testing a newly proposed food waste behavior model in the KSA.Keywords: food waste, social marketing, Saudi Arabia, moral disengagement
Procedia PDF Downloads 18212110 ALEF: An Enhanced Approach to Arabic-English Bilingual Translation
Authors: Abdul Muqsit Abbasi, Ibrahim Chhipa, Asad Anwer, Saad Farooq, Hassan Berry, Sonu Kumar, Sundar Ali, Muhammad Owais Mahmood, Areeb Ur Rehman, Bahram Baloch
Abstract:
Accurate translation between structurally diverse languages, such as Arabic and English, presents a critical challenge in natural language processing due to significant linguistic and cultural differences. This paper investigates the effectiveness of Facebook’s mBART model, fine-tuned specifically for sequence-tosequence (seq2seq) translation tasks between Arabic and English, and enhanced through advanced refinement techniques. Our approach leverages the Alef Dataset, a meticulously curated parallel corpus spanning various domains to capture the linguistic richness, nuances, and contextual accuracy essential for high-quality translation. We further refine the model’s output using advanced language models such as GPT-3.5 and GPT-4, which improve fluency, coherence, and correct grammatical errors in translated texts. The fine-tuned model demonstrates substantial improvements, achieving a BLEU score of 38.97, METEOR score of 58.11, and TER score of 56.33, surpassing widely used systems such as Google Translate. These results underscore the potential of mBART, combined with refinement strategies, to bridge the translation gap between Arabic and English, providing a reliable, context-aware machine translation solution that is robust across diverse linguistic contexts.Keywords: natural language processing, machine translation, fine-tuning, Arabic-English translation, transformer models, seq2seq translation, translation evaluation metrics, cross-linguistic communication
Procedia PDF Downloads 712109 Singular Stochastic Control Model with Carrying Capacity of Population Management Policy for Squirrels in Durian Orchards
Authors: Sasiwimol Auepong, Raywat Tanadkithirun
Abstract:
In this work, the problem that squirrels ruin durian, which is an economical fruit in Thailand, is considered. We seek the strategy for the durian farmers to eliminate the squirrels under the consideration that squirrels also provide ecosystem service. The population dynamics of squirrels are constructed to have carrying capacity since we consider the population in a confined area. A performance index indicating the total benefit of a given elimination strategy is provided. It comprises the cost of countermeasures, the loss of resources, and the ecosystem service provided by squirrels. The optimal performance index is numerically solved through the variational inequality using the finite difference method. The optimal strategy to control the squirrel population is also given numerically.Keywords: controlled stochastic differential equation, durian, finite difference method, performance index, singular stochastic control model, squirrel
Procedia PDF Downloads 9012108 Biosignal Recognition for Personal Identification
Authors: Hadri Hussain, M.Nasir Ibrahim, Chee-Ming Ting, Mariani Idroas, Fuad Numan, Alias Mohd Noor
Abstract:
A biometric security system has become an important application in client identification and verification system. A conventional biometric system is normally based on unimodal biometric that depends on either behavioural or physiological information for authentication purposes. The behavioural biometric depends on human body biometric signal (such as speech) and biosignal biometric (such as electrocardiogram (ECG) and phonocardiogram or heart sound (HS)). The speech signal is commonly used in a recognition system in biometric, while the ECG and the HS have been used to identify a person’s diseases uniquely related to its cluster. However, the conventional biometric system is liable to spoof attack that will affect the performance of the system. Therefore, a multimodal biometric security system is developed, which is based on biometric signal of ECG, HS, and speech. The biosignal data involved in the biometric system is initially segmented, with each segment Mel Frequency Cepstral Coefficients (MFCC) method is exploited for extracting the feature. The Hidden Markov Model (HMM) is used to model the client and to classify the unknown input with respect to the modal. The recognition system involved training and testing session that is known as client identification (CID). In this project, twenty clients are tested with the developed system. The best overall performance at 44 kHz was 93.92% for ECG and the worst overall performance was ECG at 88.47%. The results were compared to the best overall performance at 44 kHz for (20clients) to increment of clients, which was 90.00% for HS and the worst overall performance falls at ECG at 79.91%. It can be concluded that the difference multimodal biometric has a substantial effect on performance of the biometric system and with the increment of data, even with higher frequency sampling, the performance still decreased slightly as predicted.Keywords: electrocardiogram, phonocardiogram, hidden markov model, mel frequency cepstral coeffiecients, client identification
Procedia PDF Downloads 28012107 A Model to Assess Sustainability Using Multi-Criteria Analysis and Geographic Information Systems: A Case Study
Authors: Antonio Boggia, Luisa Paolotti, Gianluca Massei, Lucia Rocchi, Elaine Pace, Maria Attard
Abstract:
The aim of this paper is to present a methodology and a computer model for sustainability assessment based on the integration of Multi-criteria Decision Analysis (MCDA) with a Geographic Information System (GIS). It presents the result of a study for the implementation of a model for measuring sustainability to address the policy actions for the improvement of sustainability at territory level. The aim is to rank areas in order to understand the specific technical and/or financial support that is required to develop sustainable growth. Assessing sustainable development is a multidimensional problem: economic, social and environmental aspects have to be taken into account at the same time. The tool for a multidimensional representation is a proper set of indicators. The set of indicators must be integrated into a model, that is an assessment methodology, to be used for measuring sustainability. The model, developed by the Environmental Laboratory of the University of Perugia, is called GeoUmbriaSUIT. It is a calculation procedure developed as a plugin working in the open-source GIS software QuantumGIS. The multi-criteria method used within GeoUmbriaSUIT is the algorithm TOPSIS (Technique for Order Preference by Similarity to Ideal Design), which defines a ranking based on the distance from the worst point and the closeness to an ideal point, for each of the criteria used. For the sustainability assessment procedure, GeoUmbriaSUIT uses a geographic vector file where the graphic data represent the study area and the single evaluation units within it (the alternatives, e.g. the regions of a country, or the municipalities of a region), while the alphanumeric data (attribute table), describe the environmental, economic and social aspects related to the evaluation units by means of a set of indicators (criteria). The use of the algorithm available in the plugin allows to treat individually the indicators representing the three dimensions of sustainability, and to compute three different indices: environmental index, economic index and social index. The graphic output of the model allows for an integrated assessment of the three dimensions, avoiding aggregation. The presence of separate indices and graphic output make GeoUmbriaSUIT a readable and transparent tool, since it doesn’t produce an aggregate index of sustainability as final result of the calculations, which is often cryptic and difficult to interpret. In addition, it is possible to develop a “back analysis”, able to explain the positions obtained by the alternatives in the ranking, based on the criteria used. The case study presented is an assessment of the level of sustainability in the six regions of Malta, an island state in the middle of the Mediterranean Sea and the southernmost member of the European Union. The results show that the integration of MCDA-GIS is an adequate approach for sustainability assessment. In particular, the implemented model is able to provide easy to understand results. This is a very important condition for a sound decision support tool, since most of the time decision makers are not experts and need understandable output. In addition, the evaluation path is traceable and transparent.Keywords: GIS, multi-criteria analysis, sustainability assessment, sustainable development
Procedia PDF Downloads 28912106 Fractional-Order PI Controller Tuning Rules for Cascade Control System
Authors: Truong Nguyen Luan Vu, Le Hieu Giang, Le Linh
Abstract:
The fractional–order proportional integral (FOPI) controller tuning rules based on the fractional calculus for the cascade control system are systematically proposed in this paper. Accordingly, the ideal controller is obtained by using internal model control (IMC) approach for both the inner and outer loops, which gives the desired closed-loop responses. On the basis of the fractional calculus, the analytical tuning rules of FOPI controller for the inner loop can be established in the frequency domain. Besides, the outer loop is tuned by using any integer PI/PID controller tuning rules in the literature. The simulation study is considered for the stable process model and the results demonstrate the simplicity, flexibility, and effectiveness of the proposed method for the cascade control system in compared with the other methods.Keywords: Bode’s ideal transfer function, fractional calculus, fractional–order proportional integral (FOPI) controller, cascade control system
Procedia PDF Downloads 37712105 A Model for Adaptive Online Quiz: QCitra
Authors: Rosilah Hassan, Karam Dhafer Mayoof, Norngainy Mohd Tawil, Shamshubaridah Ramlee
Abstract:
Application of adaptive online quiz system and a design are performed in this paper. The purpose of adaptive quiz system is to establish different questions automatically for each student and measure their competence on a definite area of discipline. This model determines students competencies in cases like distant-learning which experience challenges frequently. Questions are specialized to allow clear deductions about student gains; they are able to identify student competencies more effectively. Also, negative effects of questions requiring higher knowledge than competency over student’s morale and self-confidence are dismissed. The advantage of the system in the quiz management requires less total time for measuring and is more flexible. Self sufficiency of the system in terms of repeating, planning and assessment of the measurement process allows itself to be used in the individual education sets. Adaptive quiz technique prevents students from distraction and motivation loss, which is led by the questions with quite lower hardness level than student’s competency.Keywords: e-learning, adaptive system, security, quiz database
Procedia PDF Downloads 45012104 Determination of the Relative Humidity Profiles in an Internal Micro-Climate Conditioned Using Evaporative Cooling
Authors: M. Bonello, D. Micallef, S. P. Borg
Abstract:
Driven by increased comfort standards, but at the same time high energy consciousness, energy-efficient space cooling has become an essential aspect of building design. Its aims are simple, aiming at providing satisfactory thermal comfort for individuals in an interior space using low energy consumption cooling systems. In this context, evaporative cooling is both an energy-efficient and an eco-friendly cooling process. In the past two decades, several academic studies have been performed to determine the resulting thermal comfort produced by an evaporative cooling system, including studies on temperature profiles, air speed profiles, effect of clothing and personnel activity. To the best knowledge of the authors, no studies have yet considered the analysis of relative humidity (RH) profiles in a space cooled using evaporative cooling. Such a study will determine the effect of different humidity levels on a person's thermal comfort and aid in the consequent improvement designs of such future systems. Under this premise, the research objective is to characterise the resulting different RH profiles in a chamber micro-climate using the evaporative cooling system in which the inlet air speed, temperature and humidity content are varied. The chamber shall be modelled using Computational Fluid Dynamics (CFD) in ANSYS Fluent. Relative humidity shall be modelled using a species transport model while the k-ε RNG formulation is the proposed turbulence model that is to be used. The model shall be validated with measurements taken using an identical test chamber in which tests are to be conducted under the different inlet conditions mentioned above, followed by the verification of the model's mesh and time step. The verified and validated model will then be used to simulate other inlet conditions which would be impractical to conduct in the actual chamber. More details of the modelling and experimental approach will be provided in the full paper The main conclusions from this work are two-fold: the micro-climatic relative humidity spatial distribution within the room is important to consider in the context of investigating comfort at occupant level; and the investigation of a human being's thermal comfort (based on Predicted Mean Vote – Predicted Percentage Dissatisfied [PMV-PPD] values) and its variation with different locations of relative humidity values. The study provides the necessary groundwork for investigating the micro-climatic RH conditions of environments cooled using evaporative cooling. Future work may also target the analysis of ways in which evaporative cooling systems may be improved to better the thermal comfort of human beings, specifically relating to the humidity content around a sedentary person.Keywords: chamber micro-climate, evaporative cooling, relative humidity, thermal comfort
Procedia PDF Downloads 15512103 Risk-Based Regulation as a Model of Control in the South African Meat Industry
Authors: R. Govender, T. C. Katsande, E. Madoroba, N. M. Thiebaut, D. Naidoo
Abstract:
South African control over meat safety is managed by the Department of Agriculture, Forestry and Fisheries (DAFF). Veterinary services department in each of the nine provinces in the country is tasked with overseeing the farm and abattoir segments of the meat supply chain. Abattoirs are privately owned. The number of abattoirs over the years has increased. This increase has placed constraints on government resources required to monitor these abattoirs. This paper presents empirical research results on the hygienic processing of meat in high and low throughout abattoirs. This paper presents a case for the adoption of risk-based regulation as a method of government control over hygiene and safe meat processing at abattoirs in South Africa. Recommendations are made to the DAFF regarding policy considerations on risk-based regulation as a model of control in South Africa.Keywords: risk-based regulation, abattoir, food control, meat safety
Procedia PDF Downloads 31312102 Automated Driving Deep Neural Networks Model Accuracy and Performance Assessment in a Simulated Environment
Authors: David Tena-Gago, Jose M. Alcaraz Calero, Qi Wang
Abstract:
The evolution and integration of automated vehicles have become more and more tangible in recent years. State-of-the-art technological advances in the field of camera-based Artificial Intelligence (AI) and computer vision greatly favor the performance and reliability of the Advanced Driver Assistance System (ADAS), leading to a greater knowledge of vehicular operation and resembling human behavior. However, the exclusive use of this technology still seems insufficient to control vehicular operation at 100%. To reveal the degree of accuracy of the current camera-based automated driving AI modules, this paper studies the structure and behavior of one of the main solutions in a controlled testing environment. The results obtained clearly outline the lack of reliability when using exclusively the AI model in the perception stage, thereby entailing using additional complementary sensors to improve its safety and performance.Keywords: accuracy assessment, AI-driven mobility, artificial intelligence, automated vehicles
Procedia PDF Downloads 11312101 Effect of Non-Fat Solid Ratio on Bloom Formation in Untempered Chocolate
Authors: Huanhuan Zhao, Bryony J. James
Abstract:
The relationship between the non-fat solid ratio and bloom formation in untempered chocolate was investigated using two types of chocolate: model chocolate made of varying cocoa powder ratios (46, 49.5 and 53%) and cocoa butter, and commercial Lindt chocolate with varying cocoa content (70, 85 and 90%). X-ray diffraction and colour measurement techniques were used to examine the polymorphism of cocoa butter and the surface whiteness index (WI), respectively. The polymorphic transformation of cocoa butter was highly correlated with the changes of WI during 30 days of storage since it led to the redistribution of fat within the chocolate matrix and resulted in a bloomed surface. The change in WI indicated a similar bloom rate in the chocolates, but the model chocolates with a higher cocoa powder ratio had more pronounced total bloom. This is due to a higher ratio of non-fat solid particles on the surface resulting in microscopic changes in morphology. The ratio of non-fat solids is an important factor in determining the extent of bloom but not the bloom rate.Keywords: untempered chocolate, microstructure of bloom, polymorphic transformation, surface whiteness
Procedia PDF Downloads 34612100 Time-Dependent Analysis of Composite Steel-Concrete Beams Subjected to Shrinkage
Authors: Rahal Nacer, Beghdad Houda, Tehami Mohamed, Souici Abdelaziz
Abstract:
Although the shrinkage of the concrete causes undesirable parasitic effects to the structure, it can then harm the resistance and the good appearance of the structure. Long term behaviourmodelling of steel-concrete composite beams requires the use of the time variable and the taking into account of all the sustained stress history of the concrete slab constituting the cross section. The work introduced in this article is a theoretical study of the behaviour of composite beams with respect to the phenomenon of concrete shrinkage. While using the theory of the linear viscoelasticity of the concrete, and on the basis of the rate of creep method, in proposing an analytical model, made up by a system of two linear differential equations, emphasizing the effects caused by shrinkage on the resistance of a steel-concrete composite beams. Results obtained from the application of the suggested model to a steel-concrete composite beam are satisfactory.Keywords: composite beams, shrinkage, time, rate of creep method, viscoelasticity theory
Procedia PDF Downloads 52812099 A Conceptual Model of the Factors Affecting Saudi Citizens' Use of Social Media to Communicate with the Government
Authors: Reemiah Alotaibi, Muthu Ramachandran, Ah-Lian Kor, Amin Hosseinian-Far
Abstract:
In the past decade, developers of Web 2.0 technologies have shown increasing interest in the topic of e-government. There has been a rapid growth in social media technology because of its significant role in backing up some essential social needs. Its importance and power is derived from its capacity to support two-way communication. Governments are curious to get engaged in these websites, hoping to benefit from the new forms of communication and interaction offered by such technology. Greater participation by the public can be viewed as a chief indicator of effective government communication. Yet, the level of public participation in government 2.0 is not quite satisfactory. In general, it is still at the early stage in most developing countries, including Saudi Arabia. Although it is a fact that Saudi people are among the most active in using social media, the number of people who use social media to communicate with the public institutions is not high. Furthermore, most of the governmental organisations are not using social media tools to communicate with the public. They use these platforms to disseminate information. Our study focuses on the factors affecting citizens’ adoption of social media in Saudi Arabia. Our research question is: what are the factors affecting Saudi citizens’ use of social media to communicate with the government? To answer this research question, the research aims to validate the UTAUT model for examining social media tools from the citizen perspective. An amendment will be proposed to fit the adoption of social media platforms as a communication channel in government by using a developed conceptual model which integrates constructs from the UTAUT model and others external variables based on the literature review. The set of potential factors that affect these citizens' decisions to adopt social media to communicate with their government has been identified as perceived encouragement, trust and cultural influence. The connection between the above-mentioned constructs from the basis for the research hypothesis will be examined in the light of a quantitative methodology. Data collection will be performed through a survey targeting a number of Saudi citizens who are social media users. The data collected from the primary survey will later be analysed by using statistical methods. The outcomes of this research project are argued to have potential contributions to the fields of social media and e-Government adoption, both on the theoretical and practical levels. It is believed that this research project is the first of its type that attempts to identify the factors that affect citizens’ adoption of social media to communicate with the government. The importance of identifying these factors stems from the potential use of them to enhance the government’s implementation of social media and help in making more accurate decisions and strategies based on comprehending the most important factors that affect citizens’ decisions.Keywords: social media, adoption, citizen, UTAUT model
Procedia PDF Downloads 41812098 Intrusion Detection in Cloud Computing Using Machine Learning
Authors: Faiza Babur Khan, Sohail Asghar
Abstract:
With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.Keywords: cloud security, threats, machine learning, random forest, classification
Procedia PDF Downloads 32012097 Global Healthcare Village Based on Mobile Cloud Computing
Authors: Laleh Boroumand, Muhammad Shiraz, Abdullah Gani, Rashid Hafeez Khokhar
Abstract:
Cloud computing being the use of hardware and software that are delivered as a service over a network has its application in the area of health care. Due to the emergency cases reported in most of the medical centers, prompt for an efficient scheme to make health data available with less response time. To this end, we propose a mobile global healthcare village (MGHV) model that combines the components of three deployment model which include country, continent and global health cloud to help in solving the problem mentioned above. In the creation of continent model, two (2) data centers are created of which one is local and the other is global. The local replay the request of residence within the continent, whereas the global replay the requirements of others. With the methods adopted, there is an assurance of the availability of relevant medical data to patients, specialists, and emergency staffs regardless of locations and time. From our intensive experiment using the simulation approach, it was observed that, broker policy scheme with respect to optimized response time, yields a very good performance in terms of reduction in response time. Though, our results are comparable to others when there is an increase in the number of virtual machines (80-640 virtual machines). The proportionality in increase of response time is within 9%. The results gotten from our simulation experiments shows that utilizing MGHV leads to the reduction of health care expenditures and helps in solving the problems of unqualified medical staffs faced by both developed and developing countries.Keywords: cloud computing (MCC), e-healthcare, availability, response time, service broker policy
Procedia PDF Downloads 37712096 An Application of Extreme Value Theory as a Risk Measurement Approach in Frontier Markets
Authors: Dany Ng Cheong Vee, Preethee Nunkoo Gonpot, Noor Sookia
Abstract:
In this paper, we consider the application of Extreme Value Theory as a risk measurement tool. The Value at Risk, for a set of indices, from six Stock Exchanges of Frontier markets is calculated using the Peaks over Threshold method and the performance of the model index-wise is evaluated using coverage tests and loss functions. Our results show that 'fat-tailedness' alone of the data is not enough to justify the use of EVT as a VaR approach. The structure of the returns dynamics is also a determining factor. This approach works fine in markets which have had extremes occurring in the past thus making the model capable of coping with extremes coming up (Colombo, Tunisia and Zagreb Stock Exchanges). On the other hand, we find that indices with lower past than present volatility fail to adequately deal with future extremes (Mauritius and Kazakhstan). We also conclude that using EVT alone produces quite static VaR figures not reflecting the actual dynamics of the data.Keywords: extreme value theory, financial crisis 2008, value at risk, frontier markets
Procedia PDF Downloads 27612095 Ontology-Driven Knowledge Discovery and Validation from Admission Databases: A Structural Causal Model Approach for Polytechnic Education in Nigeria
Authors: Bernard Igoche Igoche, Olumuyiwa Matthew, Peter Bednar, Alexander Gegov
Abstract:
This study presents an ontology-driven approach for knowledge discovery and validation from admission databases in Nigerian polytechnic institutions. The research aims to address the challenges of extracting meaningful insights from vast amounts of admission data and utilizing them for decision-making and process improvement. The proposed methodology combines the knowledge discovery in databases (KDD) process with a structural causal model (SCM) ontological framework. The admission database of Benue State Polytechnic Ugbokolo (Benpoly) is used as a case study. The KDD process is employed to mine and distill knowledge from the database, while the SCM ontology is designed to identify and validate the important features of the admission process. The SCM validation is performed using the conditional independence test (CIT) criteria, and an algorithm is developed to implement the validation process. The identified features are then used for machine learning (ML) modeling and prediction of admission status. The results demonstrate the adequacy of the SCM ontological framework in representing the admission process and the high predictive accuracies achieved by the ML models, with k-nearest neighbors (KNN) and support vector machine (SVM) achieving 92% accuracy. The study concludes that the proposed ontology-driven approach contributes to the advancement of educational data mining and provides a foundation for future research in this domain.Keywords: admission databases, educational data mining, machine learning, ontology-driven knowledge discovery, polytechnic education, structural causal model
Procedia PDF Downloads 6212094 Mapping of Geological Structures Using Aerial Photography
Authors: Ankit Sharma, Mudit Sachan, Anurag Prakash
Abstract:
Rapid growth in data acquisition technologies through drones, have led to advances and interests in collecting high-resolution images of geological fields. Being advantageous in capturing high volume of data in short flights, a number of challenges have to overcome for efficient analysis of this data, especially while data acquisition, image interpretation and processing. We introduce a method that allows effective mapping of geological fields using photogrammetric data of surfaces, drainage area, water bodies etc, which will be captured by airborne vehicles like UAVs, we are not taking satellite images because of problems in adequate resolution, time when it is captured may be 1 yr back, availability problem, difficult to capture exact image, then night vision etc. This method includes advanced automated image interpretation technology and human data interaction to model structures and. First Geological structures will be detected from the primary photographic dataset and the equivalent three dimensional structures would then be identified by digital elevation model. We can calculate dip and its direction by using the above information. The structural map will be generated by adopting a specified methodology starting from choosing the appropriate camera, camera’s mounting system, UAVs design ( based on the area and application), Challenge in air borne systems like Errors in image orientation, payload problem, mosaicing and geo referencing and registering of different images to applying DEM. The paper shows the potential of using our method for accurate and efficient modeling of geological structures, capture particularly from remote, of inaccessible and hazardous sites.Keywords: digital elevation model, mapping, photogrammetric data analysis, geological structures
Procedia PDF Downloads 68612093 The Implementation of Character Education in Code Riverbanks, Special Region of Yogyakarta, Indonesia
Authors: Ulil Afidah, Muhamad Fathan Mubin, Firdha Aulia
Abstract:
Code riverbanks Yogyakarta is a settlement area with middle to lower social classes. Socio-economic situation is affecting the behavior of society. This research aimed to find and explain the implementation and the assessment of character education which were done in elementary schools in Code riverside, Yogyakarta region of Indonesia. This research is a qualitative research which the subjects were the kids of Code riverbanks, Yogyakarta. The data were collected through interviews and document studies and analyzed qualitatively using the technique of interactive analysis model of Miles and Huberman. The results show that: (1) The learning process of character education was done by integrating all aspects such as democratic and interactive learning session also introducing role model to the students. 2) The assessment of character education was done by teacher based on teaching and learning process and an activity in outside the classroom that was the criterion on three aspects: Cognitive, affective and psychomotor.Keywords: character, Code riverbanks, education, Yogyakarta
Procedia PDF Downloads 24812092 Designing the Maturity Model of Smart Digital Transformation through the Foundation Data Method
Authors: Mohammad Reza Fazeli
Abstract:
Nowadays, the fourth industry, known as the digital transformation of industries, is seen as one of the top subjects in the history of structural revolution, which has led to the high-tech and tactical dominance of the organization. In the face of these profits, the undefined and non-transparent nature of the after-effects of investing in digital transformation has hindered many organizations from attempting this area of this industry. One of the important frameworks in the field of understanding digital transformation in all organizations is the maturity model of digital transformation. This model includes two main parts of digital transformation maturity dimensions and digital transformation maturity stages. Mediating factors of digital maturity and organizational performance at the individual (e.g., motivations, attitudes) and at the organizational level (e.g., organizational culture) should be considered. For successful technology adoption processes, organizational development and human resources must go hand in hand and be supported by a sound communication strategy. Maturity models are developed to help organizations by providing broad guidance and a roadmap for improvement. However, as a result of a systematic review of the literature and its analysis, it was observed that none of the 18 maturity models in the field of digital transformation fully meet all the criteria of appropriateness, completeness, clarity, and objectivity. A maturity assessment framework potentially helps systematize assessment processes that create opportunities for change in processes and organizations enabled by digital initiatives and long-term improvements at the project portfolio level. Cultural characteristics reflecting digital culture are not systematically integrated, and specific digital maturity models for the service sector are less clearly presented. It is also clearly evident that research on the maturity of digital transformation as a holistic concept is scarce and needs more attention in future research.Keywords: digital transformation, organizational performance, maturity models, maturity assessment
Procedia PDF Downloads 10712091 Re-Victimization of Sex Trafficking Victims in Canada: Literature Review
Authors: Adrianna D. Hendricks
Abstract:
This paper examines the factors that contribute to the re-traumatization of victims of sex trafficking within the Canadian context. Sex trafficking occurring domestically in Canada is severely under-researched, stigmatized, and under-prosecuted, leading to the re-traumatization of victims by various levels of government. This is in part due to the Canadian criminal justice system unethically utilizing prostitution laws in cases of sex trafficking and partially due to the unaddressed stigmatization victims face within the justice system itself. Utilizing evidence from a current literature review, personal correspondence, and personal life experiences, this paper will demonstrate the need for victim involvement in policy reform. The current literature review was done through an academic database search using the terms: “Sex Trafficking, Exploitation, Canada”, with the limitation of articles written within the last 5 years and written within the Canadian context. Overall, from the results, only eight articles precisely matched the criteria. The current literature argues strongly and unanimously for more research and education of professionals who have close contact with high-risk populations (doctors, police officers, social workers, etc.) to protect both minors and adults from being sexually trafficked. Additionally, for women and girls who do not have Canadian citizenship, the fear of deportation becomes a barrier to disclosing exploitation experiences to professionals. There is a desperate need for more research done in tandem with survivors and victims to inform policymaking in a meaningful way. The researcher is a survivor of sex trafficking both as a youth and as an adult, giving the researcher a unique insight into the realities of the criminal justice system for victims of sex trafficking. There is a clear need for professionals in positions of power to be re-educated about the realities of sex-trafficking, and what it means for the victims. Congruent to the current research the author calls for: standardized professional training for people in healthcare, police officers, court officials, and victim services; with the additional layers of victim involvement in creation of professional education training, and victim involvement in research. Justice for victims/survivors can only be obtained if they have been consulted and believed. Without meaningful consultation with survivors, victims who are both minors and adults will continue to fall through the cracks in policy.Keywords: Canadian policy, re-traumatization, sex-trafficking, stigmatization
Procedia PDF Downloads 6612090 A Novel Rapid Well Control Technique Modelled in Computational Fluid Dynamics Software
Authors: Michael Williams
Abstract:
The ability to control a flowing well is of the utmost important. During the kill phase, heavy weight kill mud is circulated around the well. While increasing bottom hole pressure near wellbore formation, the damage is increased. The addition of high density spherical objects has the potential to minimise this near wellbore damage, increase bottom hole pressure and reduce operational time to kill the well. This operational time saving is seen in the rapid deployment of high density spherical objects instead of building high density drilling fluid. The research aims to model the well kill process using a Computational Fluid Dynamics software. A model has been created as a proof of concept to analyse the flow of micron sized spherical objects in the drilling fluid. Initial results show that this new methodology of spherical objects in drilling fluid agrees with traditional stream lines seen in non-particle flow. Additional models have been created to demonstrate that areas of higher flow rate around the bit can lead to increased probability of wash out of formations but do not affect the flow of micron sized spherical objects. Interestingly, areas that experience dimensional changes such as tool joints and various BHA components do not appear at this initial stage to experience increased velocity or create areas of turbulent flow, which could lead to further borehole stability. In conclusion, the initial models of this novel well control methodology have not demonstrated any adverse flow patterns, which would conclude that this model may be viable under field conditions.Keywords: well control, fluid mechanics, safety, environment
Procedia PDF Downloads 17112089 Series Network-Structured Inverse Models of Data Envelopment Analysis: Pitfalls and Solutions
Authors: Zohreh Moghaddas, Morteza Yazdani, Farhad Hosseinzadeh
Abstract:
Nowadays, data envelopment analysis (DEA) models featuring network structures have gained widespread usage for evaluating the performance of production systems and activities (Decision-Making Units (DMUs)) across diverse fields. By examining the relationships between the internal stages of the network, these models offer valuable insights to managers and decision-makers regarding the performance of each stage and its impact on the overall network. To further empower system decision-makers, the inverse data envelopment analysis (IDEA) model has been introduced. This model allows the estimation of crucial information for estimating parameters while keeping the efficiency score unchanged or improved, enabling analysis of the sensitivity of system inputs or outputs according to managers' preferences. This empowers managers to apply their preferences and policies on resources, such as inputs and outputs, and analyze various aspects like production, resource allocation processes, and resource efficiency enhancement within the system. The results obtained can be instrumental in making informed decisions in the future. The top result of this study is an analysis of infeasibility and incorrect estimation that may arise in the theory and application of the inverse model of data envelopment analysis with network structures. By addressing these pitfalls, novel protocols are proposed to circumvent these shortcomings effectively. Subsequently, several theoretical and applied problems are examined and resolved through insightful case studies.Keywords: inverse models of data envelopment analysis, series network, estimation of inputs and outputs, efficiency, resource allocation, sensitivity analysis, infeasibility
Procedia PDF Downloads 5112088 The Effects of an Exercise Program Integrated with the Transtheoretical Model on Pain and Trunk Muscle Endurance of Rice Farmers with Chronic Low Back Pain
Authors: Thanakorn Thanawat, Nomjit Nualnetr
Abstract:
Background and Purpose: In Thailand, rice farmers have the most prevalence of low back pain when compared with other manual workers. Exercises have been suggested to be a principal part of treatment programs for low back pain. However, the programs should be tailored to an individual’s readiness to change categorized by a behavioral approach. This study aimed to evaluate a difference between the responses of rice farmers with chronic low back pain who received an exercise program integrated with the transtheoretical model of behavior change (TTM) and those of the comparison group regarding severity of pain and trunk muscle endurance. Materials and Methods: An 8-week exercise program was conducted to rice farmers with chronic low back pain who were randomized to either the TTM (n=62, 52 woman and 10 men, mean age ± SD 45.0±5.4 years) or non-TTM (n=64, 53 woman and 11 men, mean age ± SD 44.7±5.4 years) groups. All participants were tested for their severity of pain and trunk (abdominal and back) muscle endurance at baseline (week 0) and immediately after termination of the program (week 8). Data were analysed by using descriptive statistics and student’s t-tests. The results revealed that both TTM and non-TTM groups could decrease their severity of pain and improve trunk muscle endurance after participating in the 8-week exercise program. When compared with the non-TTM group, however, the TTM showed a significantly greater increase in abdominal muscle endurance than did the non-TTM (P=0.004, 95% CI -12.4 to -2.3). Conclusions and Clinical Relevance: An exercise program integrated with the TTM could provide benefits to rice farmers with chronic low back pain. Future studies with a longitudinal design and more outcome measures such as physical performance and quality of life are suggested to reveal further benefits of the program.Keywords: chronic low back pain, transtheoretical model, rice farmers, exercise program
Procedia PDF Downloads 38312087 Shield Tunnel Excavation Simulation of a Case Study Using a So-Called 'Stress Relaxation' Method
Authors: Shengwei Zhu, Alireza Afshani, Hirokazu Akagi
Abstract:
Ground surface settlement induced by shield tunneling is addressing increasing attention as shield tunneling becomes a popular construction technique for tunnels in urban areas. This paper discusses a 2D longitudinal FEM simulation of a tunneling case study in Japan (Tokyo Metro Yurakucho Line). Tunneling-induced field data was already collected and is used here for comparison and evaluating purposes. In this model, earth pressure, face pressure, backfilling grouting, elastic tunnel lining, and Mohr-Coulomb failure criterion for soil elements are considered. A method called ‘stress relaxation’ is also exploited to simulate the gradual tunneling excavation. Ground surface settlements obtained from numerical results using the introduced method are then compared with the measurement data.Keywords: 2D longitudinal FEM model, tunneling case study, stress relaxation, shield tunneling excavation
Procedia PDF Downloads 330