Search results for: Gautier List
583 Fairness in Recommendations Ranking: From Pairwise Approach to Listwise Approach
Authors: Patik Joslin Kenfack, Polyakov Vladimir Mikhailovich
Abstract:
Machine Learning (ML) systems are trained using human generated data that could be biased by implicitly containing racist, sexist, or discriminating data. ML models learn those biases or even amplify them. Recent research in work on has begun to consider issues of fairness. The concept of fairness is extended to recommendation. A recommender system will be considered fair if it doesn’t under rank items of protected group (gender, race, demographic...). Several metrics for evaluating fairness concerns in recommendation systems have been proposed, which take pairs of items as ‘instances’ in fairness evaluation. It doesn’t take in account the fact that the fairness should be evaluated across a list of items. The paper explores a probabilistic approach that generalize pairwise metric by using a list k (listwise) of items as ‘instances’ in fairness evaluation, parametrized by k. We also explore new regularization method based on this metric to improve fairness ranking during model training.Keywords: Fairness, Recommender System, Ranking, Listwise Approach
Procedia PDF Downloads 148582 The Fight against Pollution of Heavy Metals
Authors: K. Menad, A. Feddag, M. A. Hassnaoui
Abstract:
We are living in a time and in a world heavily polluted. In the list of the great dangers awaiting the man can be placed on top of the list pollution by heavy metals: lead, mercury, cadmium, etc. Fatigue, Depression, Thyroid disorder, Alzheimer's, Parkinson's, Cancer, are some of the health problems caused by heavy metal pollution. The environmental protection has long since become a major political and economic issue. Among the priorities, include safeguarding water resources. All countries of the world are concerned either because they lack water or because they pollute it. There are several ways to remove these heavy metals; ion exchange by zeolites is one of these ways, which our work is based on. Zeolites were among the main clean up materials by either adsorption, ion exchange and catalysis. Lead and cadmium, heavy metals, is one of the main dangers fulminate the flora and fauna of our small planet, so many resources are deployed to remedy them. The elimination of lead and cadmium by ion exchange has been extensively studied. However, exchange capacity of more and larger formed a major challenge for researchers and industry.Keywords: composite, ion excahnge, zeolite LTA, zeolite x
Procedia PDF Downloads 273581 Price Control: A Comprehensive Step to Control Corruption in the Society
Authors: Muhammad Zia Ullah Baig, Atiq Uz Zama
Abstract:
The motivation of the project is to facilitate the governance body, as well as the common man in his/her daily life consuming product rates, to easily monitor the expense, to control the budget with the help of single SMS (message), e-mail facility, and to manage governance body by task management system. The system will also be capable of finding irregularities being done by the concerned department in mitigating the complaints generated by the customer and also provide a solution to overcome problems. We are building a system that easily controls the price control system of any country, we will feeling proud to give this system free of cost to Indian Government also. The system is able to easily manage and control the price control department of government all over the country. Price control department run in different cities under City District Government, so the system easily run in different cities with different SMS Code and decentralize Database ensure the non-functional requirement of system (scalability, reliability, availability, security, safety). The customer request for the government official price list with respect to his/her city SMS code (price list of all city available on website or application), the server will forward the price list through a SMS, if the product is not available according to the price list the customer generate a complaint through an SMS or using website/smartphone application, complaint is registered in complaint database and forward to inspection department when the complaint is entertained, the inspection department will forward a message about the complaint to customer. Inspection department physically checks the seller who does not follow the price list, but the major issue of the system is corruption, may be inspection officer will take a bribe and resolve the complaint (complaint is fake) in that case the customer will not use the system. The major issue of the system is to distinguish the fake and real complain and fight for corruption in the department. To counter the corruption, our strategy is to rank the complain if the same type of complaint is generated the complaint is in high rank and the higher authority will also notify about that complain, now the higher authority of department have reviewed the complaint and its history, the officer who resolve that complaint in past and the action against the complaint, these data will help in decision-making process, if the complaint was resolved because the officer takes bribe, the higher authority will take action against that officer. When the price of any good is decided the market/former representative is also there, with the mutual understanding of both party the price is decided, the system facilitate the decision-making process. The system shows the price history of any goods, inflation rate, available supply, demand, and the gap between supply and demand, these data will help to allot for the decision-making process.Keywords: price control, goods, government, inspection, department, customer, employees
Procedia PDF Downloads 411580 The Intervention Effect of Gratitude Skills Training on the Reduction of Loneliness
Abstract:
This study defined 'gratitude skills training' as a social skills training which would become a new intervention method about gratitude intervention. The purpose of this study was to confirm the intervention effect of gratitude skills training on the reduction of loneliness. The participants in this study were university students (n = 36). A waiting list control design was used, in which the participants were assigned either to a training group (n = 18) or a waiting list control group (n = 18); the latter group took the same training after the first group had been trained. The two-week gratitude skills training comprised of three sessions (50 minutes per each of sessions). In the three sessions, the guidebook and the homework developed in this study were used. Results showed that gratitude skills training improved the participants’ gratitude skills. The results also indicated the intervention effect of gratitude skills training on the reduction of loneliness during the follow-up after three weeks. This study suggests that gratitude skills training can reduce loneliness. The gratitude skills training has a possibility of becoming a new treatment to reduce loneliness.Keywords: gratitude skills, loneliness, social skills training, well-being
Procedia PDF Downloads 200579 Analysis of Incidences of Collapsed Buildings in the City of Douala, Cameroon from 2011-2020
Authors: Theodore Gautier Le Jeune Bikoko, Jean Claude Tchamba, Sofiane Amziane
Abstract:
This study focuses on the problem of collapsed buildings within the city of Douala over the past ten years, and more precisely, within the period from 2011 to 2020. It was carried out in a bid to ascertain the real causes of this phenomenon, which has become recurrent in the leading economic city of Cameroon. To achieve this, it was first necessary to review some works dealing with construction materials and technology as well as some case histories of structural collapse within the city. Thereafter, a statistical study was carried out on the results obtained. It was found that the causes of building collapses in the city of Douala are: Neglect of administrative procedures, use of poor quality materials, poor composition and confectioning of concrete, lack of Geotechnical study, lack of structural analysis and design, corrosion of the reinforcement bars, poor maintenance in buildings, and other causes. Out of the 46 cases of structural failure of buildings within the city of Douala, 7 of these were identified to have had no geotechnical study carried out, giving a percentage of 15.22%. It was also observed that out of the 46 cases of structural failure, 6 were as a result of lack of proper structural analysis and design, giving a percentage of 13.04%. Subsequently, recommendations and suggestions are made in a bid to placing particular emphasis on the choice of materials, the manufacture and casting of concrete, as well as the placement of the required reinforcements. All this guarantees the stability of a building.Keywords: collapse buildings, Douala, structural collapse, Cameroon
Procedia PDF Downloads 165578 Adopting the Community Health Workers Master List Registry for Community Health Workforce in Kenya
Authors: Gikunda Aloise, Mjema Saida, Barasa Herbert, Wanyungu John, Kimani Maureen
Abstract:
Background: Community Health Workforce (CHW) is health care providers at the community level (Level 1) and serves as a bridge between the community and the formal healthcare system. This human resource has enormous potential to extend healthcare services and ensures that the vulnerable, marginalized, and hard-to-reach populations have access to quality healthcare services at the community and primary health facility levels. However, these cadres are neither recognized, remunerated, nor in most instances, registered in a master list. Management and supervision of CHWs is not easy if their individual demographics, training capacity and incentives is not well documented through a centralized registry. Description: In February 2022, Amref supported the Kenya Ministry of Health in developing a community health workforce database called Community Health Workers Master List Registry (CHWML), which is hosted in Kenya Health Information System (KHIS) tracker. CHW registration exercise was through a sensitization meeting conducted by the County Community Health Focal Person for the Sub-County Community Health Focal Person and Community Health Assistants who uploaded information on individual demographics, training undertaken and incentives received by CHVs. Care was taken to ensure compliance with Kenyan laws on the availability and use of personal data as prescribed by the Data Protection Act, 2019 (DPA). Results and lessons learnt: By June 2022, 80,825 CHWs had been registered in the system; 78,174 (96%) CHVs and 2,636 (4%) CHAs. 25,235 (31%) are male, 55,505 (68%) are female & 85 (1%) are transgender. 39,979. (49%) had secondary education and 2500 (3%) had no formal education. Only 27 641 (34%) received a monthly stipend. 68,436 CHVs (85%) had undergone basic training. However, there is a need to validate the data to align with the current situation in the counties. Conclusions/Next steps: The use of CHWML will unlock opportunities for building more resilient and sustainable health systems and inform financial planning, resource allocation, capacity development, and quality service delivery. The MOH will update the CHWML guidelines in adherence to the data protection act which will inform standard procedures for maintaining, updating the registry and integrate Community Health Workforce registry with the HRH system.Keywords: community health registry, community health volunteers (CHVs), community health workers masters list (CHWML), data protection act
Procedia PDF Downloads 140577 Using Maximization Entropy in Developing a Filipino Phonetically Balanced Wordlist for a Phoneme-Level Speech Recognition System
Authors: John Lorenzo Bautista, Yoon-Joong Kim
Abstract:
In this paper, a set of Filipino Phonetically Balanced Word list consisting of 250 words (PBW250) were constructed for a phoneme-level ASR system for the Filipino language. The Entropy Maximization is used to obtain phonological balance in the list. Entropy of phonemes in a word is maximized, providing an optimal balance in each word’s phonological distribution using the Add-Delete Method (PBW algorithm) and is compared to the modified PBW algorithm implemented in a dynamic algorithm approach to obtain optimization. The gained entropy score of 4.2791 and 4.2902 for the PBW and modified algorithm respectively. The PBW250 was recorded by 40 respondents, each with 2 sets data. Recordings from 30 respondents were trained to produce an acoustic model that were tested using recordings from 10 respondents using the HMM Toolkit (HTK). The results of test gave the maximum accuracy rate of 97.77% for a speaker dependent test and 89.36% for a speaker independent test.Keywords: entropy maximization, Filipino language, Hidden Markov Model, phonetically balanced words, speech recognition
Procedia PDF Downloads 458576 Ethical Framework in Organ Transplantation and the Priority Line between Law and Life
Authors: Abel Sichinava
Abstract:
The need for organ transplantation is vigorously increasing worldwide. The numbers on the waiting lists grow, but the number of donors is not keeping up with the demand even though there is a legal possibility of decreasing the gap between the demand and supply. Most countries around the globe are facing an organ donation problem (living or deceased); however, the extent of the problem differs based on how well developed a country is. The determining issues seem to be centered on how aware the society is about the concept of organ donation, as well as cultural and religious factors. Even if people are aware of the benefits of organ donation, they may still have fears that keep them from being in complete agreement with the idea. Some believe that in the case of deceased organ donation: “the brain dead human body may recover from its injuries” or “the sick might get less appropriate treatment if doctors know they are potential donors.” In the case of living organ donations, people sometimes fear that after the donation, “it might reduce work efficiency, cause health deterioration or even death.” Another major obstacle in the organ shortage is a lack of a well developed ethical framework. In reality, there are truly an immense number of people on the waiting list, and they have only two options in order to receive a suitable organ. First is the legal way, which is to wait until their turn. Sadly, numerous patients die while on the waiting list before an appropriate organ becomes available for transplant. The second option is an illegal way: seeking an organ in a country where they can possibly get. To tell the truth, in people’s desire to live, they may choose the second option if their resources are sufficient. This process automatically involves “organ brokers.” These are people who get organs from vulnerable poor people by force or betrayal. As mentioned earlier, the high demand and low supply leads to human trafficking. The subject of the study was the large number of society from different backgrounds of their belief, culture, nationality, level of education, socio-economic status. The great majority of them interviewed online used “Google Drive Survey” and others in person. All statistics and information gathered from trusted sources annotated in the reference list and above mentioned considerable testimonies shared by the respondents are the fundamental evidence of a lack of the well developed ethical framework. In conclusion, the continuously increasing number of people on the waiting list and an irrelevant ethical framework, lead people to commit to atrocious, dehumanizing crimes. Therefore, world society should be equally obligated to think carefully and make vital decisions together for the advancement of an organ donations and its ethical framework.Keywords: donation, ethical framwork, organ, transplant
Procedia PDF Downloads 150575 The Importance and Feasibility of Hospital Interventions for Patient Aggression and Violence Against Physicians in China: A Delphi Study
Authors: Yuhan Wu, CTB (Kees) Ahaus, Martina Buljac-Samardzic
Abstract:
Patient aggression and violence is a complex occupational hazards for physicians working in hospitals, and it can have multiple severe negative effects for physicians and hospitals. Although there is a range of interventions in the healthcare sector applied in various countries, China lacks a comprehensive set of interventions at the hospital level in this area. Therefore, due to cultural differences, this study investigates whether international interventions are important and feasible in the Chinese cultural context by conducting a Delphi study. Based on a literature search, a list of 47 hospital interventions to prevent and manage patient aggression and violence was constructed, including 8 categories: hospital environment design, access and entrance, staffing and work practice, training and education, leadership and culture, support, during/after-the-event actions, and hospital policy. The list of interventions will be refined, extended and brought back during a three-round Delphi study. The panel consists of 17 Chinese experts, including physicians experiencing patient aggression and violence, hospital management team members, scientists working in this research area, and policymakers in the healthcare sector. In each round, experts will receive the possible interventions with the instruction to indicate the importance and feasibility of each intervention for preventing and managing patient violence and aggression in Chinese hospitals. Experts will be asked about the importance and feasibility of interventions for patient violence and aggression at the same time. This study will exclude or include interventions based on the score of importance. More specifically, an intervention will be included after each round if >80% of the experts judged it as important or very important and excluded if >50% judged an intervention as not or moderately important. The three-round Delphi study will provide a list of included interventions and assess which of the 8 categories of interventions are considered as important. It is expected that this study can bring new ideas and inspiration to Chinese hospitals in the prevention and management of patient aggression and violence.Keywords: patient aggression and violence, hospital interventions, feasibility, importance
Procedia PDF Downloads 96574 The Ductile Fracture of Armor Steel Targets Subjected to Ballistic Impact and Perforation: Calibration of Four Damage Criteria
Authors: Imen Asma Mbarek, Alexis Rusinek, Etienne Petit, Guy Sutter, Gautier List
Abstract:
Over the past two decades, the automotive, aerospace and army industries have been paying an increasing attention to Finite Elements (FE) numerical simulations of the fracture process of their structures. Thanks to the numerical simulations, it is nowadays possible to analyze several problems involving costly and dangerous extreme loadings safely and at a reduced cost such as blast or ballistic impact problems. The present paper is concerned with ballistic impact and perforation problems involving ductile fracture of thin armor steel targets. The target fracture process depends usually on various parameters: the projectile nose shape, the target thickness and its mechanical properties as well as the impact conditions (friction, oblique/normal impact...). In this work, the investigations are concerned with the normal impact of a conical head-shaped projectile on thin armor steel targets. The main aim is to establish a comparative study of four fracture criteria that are commonly used in the fracture process simulations of structures subjected to extreme loadings such as ballistic impact and perforation. Usually, the damage initiation results from a complex physical process that occurs at the micromechanical scale. On a macro scale and according to the following fracture models, the variables on which the fracture depends are mainly the stress triaxiality ƞ, the strain rate, temperature T, and eventually the Lode angle parameter Ɵ. The four failure criteria are: the critical strain to failure model, the Johnson-Cook model, the Wierzbicki model and the Modified Hosford-Coulomb model MHC. Using the SEM, the observations of the fracture facies of tension specimen and of armor steel targets impacted at low and high incident velocities show that the fracture of the specimens is a ductile fracture. The failure mode of the targets is petalling with crack propagation and the fracture facies are covered with micro-cavities. The parameters of each ductile fracture model have been identified for three armor steels and the applicability of each criterion was evaluated using experimental investigations coupled to numerical simulations. Two loading paths were investigated in this study, under a wide range of strain rates. Namely, quasi-static and intermediate uniaxial tension and quasi-static and dynamic double shear testing allow covering various values of stress triaxiality ƞ and of the Lode angle parameter Ɵ. All experiments were conducted on three different armor steel specimen under quasi-static strain rates ranging from 10-4 to 10-1 1/s and at three different temperatures ranging from 297K to 500K, allowing drawing the influence of temperature on the fracture process. Intermediate tension testing was coupled to dynamic double shear experiments conducted on the Hopkinson tube device, allowing to spot the effect of high strain rate on the damage evolution and the crack propagation. The aforementioned fracture criteria are implemented into the FE code ABAQUS via VUMAT subroutine and they were coupled to suitable constitutive relations allow having reliable results of ballistic impact problems simulation. The calibration of the four damage criteria as well as a concise evaluation of the applicability of each criterion are detailed in this work.Keywords: armor steels, ballistic impact, damage criteria, ductile fracture, SEM
Procedia PDF Downloads 313573 Wayfinding Strategies in an Unfamiliar Homogenous Environment
Authors: Ahemd Sameer, Braj Bhushan
Abstract:
The objective of our study was to compare wayfinding strategies to remember route while navigation in an unfamiliar homogenous environment. Two videos developed using free ware Trimble Sketchup© each having nine identical turns (3 right, 3 left, 3 straight) with no distinguishing feature at any turn. Thirt-two male post-graduate students of IIT Kanpur participated in the study. The experiment was conducted in three phases. In the first phase participant generated a list of personally known items to be used as landmarks. In the second phase participant saw the first video and was required to remember the sequence of turns. In the second video participant was required to imagine a landmark from the list generated in the first phase at each turn and associate the turn with it. In both the task the participant was asked to recall the sequence of turns as it appeared in the video. In the third phase, which was 20 minutes after the second phase, participants again recalled the sequence of turns. Results showed that performance in the first condition i.e. without use of landmarks was better than imaginary landmark condition. The difference, however, became significant when the participant were tested again about 30 minutes later though performance was still better in no-landmark condition. The finding is surprising given the past research in memory and is explained in terms of cognitive factors such as mental workload.Keywords: Wayfinding, Landmark, Homogenous Environment, Memory
Procedia PDF Downloads 457572 Internet Optimization by Negotiating Traffic Times
Authors: Carlos Gonzalez
Abstract:
This paper describes a system to optimize the use of the internet by clients requiring downloading of videos at peak hours. The system consists of a web server belonging to a provider of video contents, a provider of internet communications and a software application running on a client’s computer. The client using the application software will communicate to the video provider a list of the client’s future video demands. The video provider calculates which videos are going to be more in demand for download in the immediate future, and proceeds to request the internet provider the most optimal hours to do the downloading. The times of the downloading will be sent to the application software, which will use the information of pre-established hours negotiated between the video provider and the internet provider to download those videos. The videos will be saved in a special protected section of the user’s hard disk, which will only be accessed by the application software in the client’s computer. When the client is ready to see a video, the application will search the list of current existent videos in the area of the hard disk; if it does exist, it will use this video directly without the need for internet access. We found that the best way to optimize the download traffic of videos is by negotiation between the internet communication provider and the video content provider.Keywords: internet optimization, video download, future demands, secure storage
Procedia PDF Downloads 136571 Automatic Tagging and Accuracy in Assamese Text Data
Authors: Chayanika Hazarika Bordoloi
Abstract:
This paper is an attempt to work on a highly inflectional language called Assamese. This is also one of the national languages of India and very little has been achieved in terms of computational research. Building a language processing tool for a natural language is not very smooth as the standard and language representation change at various levels. This paper presents inflectional suffixes of Assamese verbs and how the statistical tools, along with linguistic features, can improve the tagging accuracy. Conditional random fields (CRF tool) was used to automatically tag and train the text data; however, accuracy was improved after linguistic featured were fed into the training data. Assamese is a highly inflectional language; hence, it is challenging to standardizing its morphology. Inflectional suffixes are used as a feature of the text data. In order to analyze the inflections of Assamese word forms, a list of suffixes is prepared. This list comprises suffixes, comprising of all possible suffixes that various categories can take is prepared. Assamese words can be classified into inflected classes (noun, pronoun, adjective and verb) and un-inflected classes (adverb and particle). The corpus used for this morphological analysis has huge tokens. The corpus is a mixed corpus and it has given satisfactory accuracy. The accuracy rate of the tagger has gradually improved with the modified training data.Keywords: CRF, morphology, tagging, tagset
Procedia PDF Downloads 194570 A Methodology for Investigating Public Opinion Using Multilevel Text Analysis
Authors: William Xiu Shun Wong, Myungsu Lim, Yoonjin Hyun, Chen Liu, Seongi Choi, Dasom Kim, Kee-Young Kwahk, Namgyu Kim
Abstract:
Recently, many users have begun to frequently share their opinions on diverse issues using various social media. Therefore, numerous governments have attempted to establish or improve national policies according to the public opinions captured from various social media. In this paper, we indicate several limitations of the traditional approaches to analyze public opinion on science and technology and provide an alternative methodology to overcome these limitations. First, we distinguish between the science and technology analysis phase and the social issue analysis phase to reflect the fact that public opinion can be formed only when a certain science and technology is applied to a specific social issue. Next, we successively apply a start list and a stop list to acquire clarified and interesting results. Finally, to identify the most appropriate documents that fit with a given subject, we develop a new logical filter concept that consists of not only mere keywords but also a logical relationship among the keywords. This study then analyzes the possibilities for the practical use of the proposed methodology thorough its application to discover core issues and public opinions from 1,700,886 documents comprising SNS, blogs, news, and discussions.Keywords: big data, social network analysis, text mining, topic modeling
Procedia PDF Downloads 295569 Importance of Access to Public Information on Modern Slavery for Brazil's Livestock Sector
Authors: Juliana Brandao, Holly Gibbs, Lisa Naughton, Lisa Rausch
Abstract:
The Brazilian Amazon continues to be plagued by modern day slave labor, specifically within the cattle production industry. In response to this issue, modern day anti-slavery activists have implemented additional regulations designed to combat slave labor associated with cattle. These regulations have been incorporated into existing agreements designed to control deforestation. The goal of these rules is to prevent the trade of beef contaminated with modern slave labor between supplier farms and slaughterhouses. In this study, we identify farms that make use of modern slave labor, and we use cattle transaction data to track the sale of cattle between farms and slaughterhouses. Our analysis reveals that slaughterhouses, which have signed cattle agreements that include requirements to refuse cattle associated with modern slave labor, have avoided buying cattle from suppliers that were on the dirty list. This trend is especially evident when the "dirty lists" that identify modern-day slave labor users are made publicly accessible online. We conclude that the "dirty list" of modern-day slave labor users should be maintained on publicly available websites to allow slaughterhouses, retailers, and consumers to send powerful market signals that discourage the use of modern-day slave labor.Keywords: cattle ranchers, modern slave labor, deforestation, brazilian amazon
Procedia PDF Downloads 116568 Identifying Necessary Words for Understanding Academic Articles in English as a Second or a Foreign Language
Authors: Stephen Wagman
Abstract:
This paper identifies three common structures in English sentences that are important for understanding academic texts, regardless of the characteristics or background of the readers or whether they are reading English as a second or a foreign language. Adapting a model from the Humanities, the explication of texts used in literary studies, the paper analyses sample sentences to reveal structures that enable the reader not only to decide which words are necessary for understanding the main ideas but to make the decision without knowing the meaning of the words. By their very syntax noun structures point to the key word for understanding them. As a rule, the key noun is followed by easily identifiable prepositions, relative pronouns, or verbs and preceded by single adjectives. With few exceptions, the modifiers are unnecessary for understanding the idea of the sentence. In addition, sentences are often structured by lists in which the items frequently consist of parallel groups of words. The principle of a list is that all the items are similar in meaning and it is not necessary to understand all of the items to understand the point of the list. This principle is especially important when the items are long or there is more than one list in the same sentence. The similarity in meaning of these items enables readers to reduce sentences that are hard to grasp to an understandable core without excessive use of a dictionary. Finally, the idea of subordination and the identification of the subordinate parts of sentences through connecting words makes it possible for readers to focus on main ideas without having to sift through the less important and more numerous secondary structures. Sometimes a main idea requires a subordinate one to complete its meaning, but usually, subordinate ideas are unnecessary for understanding the main point of the sentence and its part in the development of the argument from sentence to sentence. Moreover, the connecting words themselves indicate the functions of the subordinate structures. These most frequently show similarity and difference or reasons and results. Recognition of all of these structures can not only enable students to read more efficiently but to focus their attention on the development of the argument and this rather than a multitude of unknown vocabulary items, the repetition in lists, or the subordination in sentences are the one necessary element for comprehension of academic articles.Keywords: development of the argument, lists, noun structures, subordination
Procedia PDF Downloads 246567 Ethno-Botanical Survey on the Rare and Endangered Medicinal Plants of Poonch District (Jammu and Kashmir)
Authors: Shazia Shamim, Pallavi Gautam
Abstract:
The present study describes the presence of rare or endangered plants from Poonch Dist., which spread over 1674 Km sq. located between latitude 330 25' N to 340 01' N and longitude 730 58' E to 740 35' E forming a part of the Northwest Himalaya in Jammu and Kashmir state of India, with the aim of suggesting the strategy for the conservation and promotion of cultivation of rare and endangered medicinal plants, as well as developing traditional knowledge of medicinal plants. The main threats to biodiversity and ecosystem are overexploitation, global climate change, habitat loss, fragmentation, pollution, and invasion of alien species and disturbance of community structure. Surveys were carried out during 2015-2016 throughout the Poonch valley. During the field survey, various criteria of International Union for the conservation of nature for categorizing threatened plants, extent of occurrence, area of occupancy, probability of extinction, etc. were measured. The rarity of species was determined by field study, visual estimations, and literature. During the collection, it was observed that few rare and endangered species which were present in the study area, are also mentioned in the prescribed red data book of Indian plants, International Union for conservation of nature, list of threatened species and list of Botanical Survey of India presented by its Northern Regional Centre. The study was based on extensive surveys of the study area and then concluded by preparing a list of plant species occurring in different seasons, the photographs of all these plant species were collected. Actual threats to the population of a selected plant species in a given area were recorded by direct observation. The present paper provides information about 22 rare and endangered medicinal plant species belonging to 18 families that are used by the native of these areas. Information provided includes botanical name, family name, local name, habitat, part used, ethno medicinal uses and brief preparation of the reported plant species is presented in the present work.Keywords: biodiversity, traditional knowledge, International Union for Conservation of Nature, Botanical Survery of India
Procedia PDF Downloads 135566 Genetics of Pharmacokinetic Drug-Drug Interactions of Most Commonly Used Drug Combinations in the UK: Uncovering Unrecognised Associations
Authors: Mustafa Malki, Ewan R. Pearson
Abstract:
Tools utilized by health care practitioners to flag potential adverse drug reactions secondary to drug-drug interactions ignore individual genetic variation, which has the potential to markedly alter the severity of these interactions. To our best knowledge, there have been limited published studies on the impact of genetic variation on drug-drug interactions. Therefore, our aim in this project is the discovery of previously unrecognized, clinically important drug-drug-gene interactions (DDGIs) within the list of most commonly used drug combinations in the UK. The UKBB database was utilized to identify the top most frequently prescribed drug combinations in the UK with at least one route of interaction (over than 200 combinations were identified). We have recognised 37 common and unique interacting genes considering all of our drug combinations. Out of around 600 potential genetic variants found in these 37 genes, 100 variants have met the selection criteria (common variant with minor allele frequency ≥ 5%, independence, and has passed HWE test). The association between these variants and the use of each of our top drug combinations has been tested with a case-control analysis under the log-additive model. As the data is cross-sectional, drug intolerance has been identified from the genotype distribution as presented by the lower percentage of patients carrying the risky allele and on the drug combination compared to those free of these risk factors and vice versa with drug tolerance. In GoDARTs database, the same list of common drug combinations identified by the UKBB was utilized here with the same list of candidate genetic variants but with the addition of 14 new SNPs so that we have a total of 114 variants which have met the selection criteria in GoDARTs. From the list of the top 200 drug combinations, we have selected 28 combinations where the two drugs in each combination are known to be used chronically. For each of our 28 combinations, three drug response phenotypes have been identified (drug stop/switch, dose decrease, or dose increase of any of the two drugs during their interaction). The association between each of the three phenotypes belonging to each of our 28 drug combinations has been tested against our 114 candidate genetic variants. The results show replication of four findings between both databases : (1) Omeprazole +Amitriptyline +rs2246709 (A > G) variant in CYP3A4 gene (p-values and ORs with the UKBB and GoDARTs respectively = 0.048,0.037,0.92,and 0.52 (dose increase phenotype)) (2) Simvastatin + Ranitidine + rs9332197 (T > C) variant in CYP2C9 gene (0.024,0.032,0.81, and 5.75 (drug stop/switch phenotype)) (3) Atorvastatin + Doxazosin + rs9282564 (T > C) variant in ABCB1 gene (0.0015,0.0095,1.58,and 3.14 (drug stop/switch phenotype)) (4) Simvastatin + Nifedipine + rs2257401 (C > G) variant in CYP3A7 gene (0.025,0.019,0.77,and 0.30 (drug stop/switch phenotype)). In addition, some other non-replicated, but interesting, significant findings were detected. Our work also provides a great source of information for researchers interested in DD, DG, or DDG interactions studies as it has highlighted the top common drug combinations in the UK with recognizing 114 significant genetic variants related to drugs' pharmacokinetic.Keywords: adverse drug reactions, common drug combinations, drug-drug-gene interactions, pharmacogenomics
Procedia PDF Downloads 163565 The Hospitals Residents Problem with Bounded Length Preference List under Social Stability
Authors: Ashish Shrivastava, C. Pandu Rangan
Abstract:
In this paper, we consider The Hospitals Residents problem with Social Stability (HRSS), where hospitals and residents can communicate only through the underlying social network. Those residents and hospitals which don not have any social connection between them can not communicate and hence they cannot be a social blocking pair with respect to a socially stable matching in an instance of hospitals residents problem with social stability. In large scale matching like NRMP or Scottish medical matching scheme etc. where set of agents, as well as length of preference lists, are very large, social stability is a useful notion in which members of a blocking pair could block a matching if and only if they know the existence of each other. Thus the notion of social stability in hospitals residents problem allows us to increase the cardinality of the matching without taking care of those blocking pairs which are not socially connected to each other. We know that finding a maximum cardinality socially stable matching, in an instance, of HRSS is NP-hard. This motivates us to solve this problem with bounded length preference lists on one side. In this paper, we have presented a polynomial time algorithm to compute maximum cardinality socially stable matching in a HRSS instance where residents can give at most two length and hospitals can give unbounded length preference list. Preference lists of residents and hospitals will be strict in nature.Keywords: matching under preference, socially stable matching, the hospital residents problem, the stable marriage problem
Procedia PDF Downloads 277564 A Comparative Study between Behaviour Activation, Rational Emotive Behaviour Therapy and Waiting List Control for Major Depressive Disorder
Authors: Shweta Jha, Digambar Darekar, Krishna Kadam
Abstract:
Major Depressive Disorder (MDD) is one of the most common of psychiatric disorders. It has a wide range of symptoms, aetiologies and risk factors, and these reasons make MDD affect not only the primary patient, but also their family, caregivers and associates; by negatively impacting their self dignity, economic condition and self-confidence. Thus, it is important to help individuals suffering from MDD learn adaptive mechanism and deal effectively with their environment, with that aim this study focused on a comparative therapeutic intervention using Behaviour Activation (BA), Rational Emotive Behaviour Therapy (REBT) and Waiting list control (WLC) for management of MDD. This study apart from enhancing personal skills will also help us understand which therapeutic method would be more beneficial in treating and prolonging relapse in patients with MDD in Indian population. Fifteen individuals following application of inclusion and exclusion criteria were selected as study samples. They were randomly assigned to three treatment groups. Ten sessions of therapy, forty-five minutes each according to the proposed sessions plan were conducted for each group. The individuals selected as samples were re–assessed after 2 months and 6 months post intervention. The overall result showed that individuals treated with BA and REBT showed more improvement in comparison to those in WLC.Keywords: behaviour activation, major depressive disorder, rational emotive behaviour therapy, therapeutic intervention
Procedia PDF Downloads 254563 Enhancement of Primary User Detection in Cognitive Radio by Scattering Transform
Authors: A. Moawad, K. C. Yao, A. Mansour, R. Gautier
Abstract:
The detecting of an occupied frequency band is a major issue in cognitive radio systems. The detection process becomes difficult if the signal occupying the band of interest has faded amplitude due to multipath effects. These effects make it hard for an occupying user to be detected. This work mitigates the missed-detection problem in the context of cognitive radio in frequency-selective fading channel by proposing blind channel estimation method that is based on scattering transform. By initially applying conventional energy detection, the missed-detection probability is evaluated, and if it is greater than or equal to 50%, channel estimation is applied on the received signal followed by channel equalization to reduce the channel effects. In the proposed channel estimator, we modify the Morlet wavelet by using its first derivative for better frequency resolution. A mathematical description of the modified function and its frequency resolution is formulated in this work. The improved frequency resolution is required to follow the spectral variation of the channel. The channel estimation error is evaluated in the mean-square sense for different channel settings, and energy detection is applied to the equalized received signal. The simulation results show improvement in reducing the missed-detection probability as compared to the detection based on principal component analysis. This improvement is achieved at the expense of increased estimator complexity, which depends on the number of wavelet filters as related to the channel taps. Also, the detection performance shows an improvement in detection probability for low signal-to-noise scenarios over principal component analysis- based energy detection.Keywords: channel estimation, cognitive radio, scattering transform, spectrum sensing
Procedia PDF Downloads 196562 In Silico Analysis of Salivary miRNAs to Identify the Diagnostic Biomarkers for Oral Cancer
Authors: Andleeb Zahra, Itrat Rubab, Sumaira Malik, Amina Khan, Muhammad Jawad Khan, M. Qaiser Fatmi
Abstract:
Oral squamous cell carcinoma (OSCC) is one of the most common cancers worldwide. Recent studies have highlighted the role of miRNA in disease pathology, indicating its potential use in an early diagnostic tool. miRNAs are small, double stranded, non-coding RNAs that regulate gene expression by deregulating mRNAs. miRNAs play important roles in modifying various cellular processes such as cell growth, differentiation, apoptosis, and immune response. Dis-regulated expression of miRNAs is known to affect the cell growth, and this may function as tumor suppressors or oncogenes in various cancers. Objectives: The main objectives of this study were to characterize the extracellular miRNAs involved in oral cancer (OC) to assist early detection of cancer as well as to propose a list of genes that can potentially be used as biomarkers of OC. We used gene expression data by microarrays already available in literature. Materials and Methods: In the first step, a total of 318 miRNAs involved in oral carcinoma were shortlisted followed by the prediction of their target genes. Simultaneously, the differentially expressed genes (DEGs) of oral carcinoma from all experiments were identified. The common genes between lists of DEGs of OC based on experimentally proven data and target genes of each miRNA were identified. These common genes are the targets of specific miRNA, which is involved in OC. Finally, a list of genes was generated which may be used as biomarker of OC. Results and Conclusion: In results, we included some of pathways in cancer to show the change in gene expression under the control of specific miRNA. Ingenuity pathway analysis (IPA) provided a list of major biomarkers like CDH2, CDK7 and functional enrichment analysis identified the role of miRNA in major pathways like cell adhesion molecules pathway affected by cancer. We observed that at least 25 genes are regulated by maximum number of miRNAs, and thereby, they can be used as biomarkers of OC. To better understand the role of miRNA with respect to their target genes further experiments are required, and our study provides a platform to better understand the miRNA-OC relationship at genomics level.Keywords: biomarkers, gene expression, miRNA, oral carcinoma
Procedia PDF Downloads 375561 Phonological Variation in the Speech of Grade 1 Teachers in Select Public Elementary Schools in the Philippines
Authors: M. Leonora D. Guerrero
Abstract:
The study attempted to uncover the most and least frequent phonological variation evident in the speech patterns of grade 1 teachers in select public elementary schools in the Philippines. It also determined the lectal description of the participants based on Tayao’s consonant charts for American and Philippine English. Descriptive method was utilized. A total of 24 grade 1 teachers participated in the study. The instrument used was word list. Each column in the word list is represented by words with the target consonant phonemes: labiodental fricatives f/ and /v/ and lingua-alveolar fricative /z/. These phonemes were in the initial, medial, and final positions, respectively. Findings of the study revealed that the most frequent variation happened when the participants read words with /z/ in the final position while the least frequent variation happened when the participants read words with /z/ in the initial position. The study likewise proved that the grade 1 teachers exhibited the segmental features of both the mesolect and basilect. Based on these results, it is suggested that teachers of English in the Philippines must aspire to manifest the features of the mesolect, if not, the acrolect since it is expected of the academicians not to be displaying the phonological features of the acrolects since this variety is only used by the 'uneducated.' This is especially so with grade 1 teachers who are often mimicked by their students who classify their speech as the 'standard.'Keywords: consonant phonemes, lectal description, Philippine English, phonological variation
Procedia PDF Downloads 213560 An Investigation of Challenges in Implementing Sustainable Supply Chain Management for Construction Industry in Thailand by Interpretive Structural Model Approach
Authors: Shaolan Zou, Kullapa Soratana
Abstract:
Construction industry faces tremendous challenges in sustainability issue in recent years. Building materials, generally, are non-recyclable with short service life time, leading to economic loss. Building sites also cause social issues, e.g. noise, hazardous substances, and particulate matters. Sustainable supply chain management (SSCM) has been recognized as an appropriate method to balance three pillars of sustainability: environment, economy, and society. However, most of construction companies cannot successfully adopt SSCM due to numerous challenges. In this study, a list of challenges in implementing SSCM was collected from peer-reviewed literature on sustainable implementation. A building materials company in Thailand, which has successfully adopted SSCM for almost two decades and established the sustainable development committee since 1995, was used as a case study. Management-level representatives in sustainability department of the company were interviewed, mainly, to examine which challenges on the list complies with the company’s condition when adopting SSCM. The interview result was analyzed by interpretive structural model (ISM) with sustainability experts’ opinions to identify top 5 influential challenges. The results could assist a building construction company in assigning appropriate strategies to overcome most influential barriers, as well as in using as a reference or guidance for other construction companies adopting SSCM.Keywords: sustainable supply chain management, challenges, construction industry, interpretive structural model
Procedia PDF Downloads 181559 Important Management Competencies: University of Technology Perspective
Authors: Courtley Pharaoh, D. J. Visser
Abstract:
University management is often caught between competing interests from stakeholders like students, trustees, donors, government and the community it serves. This study aimed to identify what management competencies are required by executive management members of universities of technology to effectively manage a university of technology in South Africa from the perspective of the executive management members. This exploratory study will make use of a qualitative methodology to establish what management competencies are deemed as important to manage a university of technology in South Africa from the executive management perspective. Due to the consequences of the COVID-19 Pandemic, the study made use of online face-to-face interviews to ascertain from executive management members of universities of technology what the required management competencies needed by executive management members of universities of technology to effectively manage a University of Technology in South Africa. Qualitative Content Analysis was used to analyse the data collected. The findings of the study identified a total of 26 management competencies which were categorised into three groupings or themes. This study identified a list of required management competencies needed by executive management members of universities of technology to effectively manage a university of technology in South Africa, as per the lived experience of executive management members. The researcher recommends further studies at traditional and comprehensive universities and compares the results of those future studies with the results of this study. A comprehensive list of management competencies could then be identified, which could assist with the compilation of job descriptions of executive management members of universities in South Africa.Keywords: university of technology, management competencies, executive management, executive management members, important
Procedia PDF Downloads 107558 Evaluation and Analysis of the Regulations of Health and Safety in the Construction Industry: A Case of Study in Skikda, Algeria
Authors: Khorief Ouissem, Sassi Boudmagh Souad, Mahimoud Aissa
Abstract:
The health and safety problem in the construction companies has been a major subject of research in Algeria for many years. The latest statistics of the Algerian National Social Security Fund (CNAS) shows that a third of accidents recorded at the national level are originated from construction activities. It is becoming increasingly essential and urgent to investigate and address its causes in order to find measures to overcome the deficiencies in this area. Thus, this paper takes in investigating this problem through a study conducted in the city of Skikda, Algeria. The study was carried out through questionnaire where twenty construction companies were taking into consideration. First, the study identifies the regulations and the laws related to the health and safety in the construction sector in Algeria. Then it goes on to assess and evaluate the implementation of the identified regulations in the companies selected. The result of the assessment indicates that the majority of the construction companies considered do not meet the health and safety standards and regulations. To extract the main causes of the failure of the system to control this industry, the observations and the evaluation were analyzed using the 5M or Ichikawa diagram method. This method is based on identifying the causes of the problem in terms of purpose, the list of potential causes for families. These families often correspond to 5M (Labor, Material, Methods, Middle, and Management). Finally, having identified the primary motives, the present authors propose a list of actions to move towards a more controlled and effective health and safety system for the construction industry.Keywords: health and safety, construction industry, performance measurement, Algeria
Procedia PDF Downloads 340557 Learning-Oriented School Education: Indicator Construction and Taiwan's Implementation Performance
Authors: Meiju Chen, Chaoyu Guo, Chia Wei Tang
Abstract:
The present study's purpose is twofold: first, to construct indicators for learning-oriented school education and, second, to conduct a survey to examine how learning-oriented education has been implemented in junior high schools after the launch of the 12-year compulsory curriculum. For indicator system construction, we compiled relevant literature to develop a preliminary indicator list model and then conducted two rounds of a questionnaire survey to gain comprehensive feedback from experts to finalize our indicator model. In the survey's first round, 12 experts were invited to evaluate the indicators' appropriateness. Based on the experts' consensus, we determined our final indicator list and used it to develop the Fuzzy Delphi questionnaire to finalize the indicator system and each indicator's relative value. For the fact-finding survey, we collected 454 valid samples to examine how the concept of learning-oriented education is adopted and implemented in the junior high school context. We also used this data in our importance-performance analysis to explore the strengths and weaknesses of school education in Taiwan. The results suggest that the indicator system for learning-oriented school education must consist of seven dimensions and 34 indicators. Among the seven dimensions, 'student learning' and 'curriculum planning and implementation' are the most important yet underperforming dimensions that need immediate improvement. We anticipate that the indicator system will be a useful tool for other countries' evaluation of schools' performance in learning-oriented education.Keywords: learning-oriented education, school education, fuzzy Delphi method, importance-performance analysis
Procedia PDF Downloads 143556 A New Method Separating Relevant Features from Irrelevant Ones Using Fuzzy and OWA Operator Techniques
Authors: Imed Feki, Faouzi Msahli
Abstract:
Selection of relevant parameters from a high dimensional process operation setting space is a problem frequently encountered in industrial process modelling. This paper presents a method for selecting the most relevant fabric physical parameters for each sensory quality feature. The proposed relevancy criterion has been developed using two approaches. The first utilizes a fuzzy sensitivity criterion by exploiting from experimental data the relationship between physical parameters and all the sensory quality features for each evaluator. Next an OWA aggregation procedure is applied to aggregate the ranking lists provided by different evaluators. In the second approach, another panel of experts provides their ranking lists of physical features according to their professional knowledge. Also by applying OWA and a fuzzy aggregation model, the data sensitivity-based ranking list and the knowledge-based ranking list are combined using our proposed percolation technique, to determine the final ranking list. The key issue of the proposed percolation technique is to filter automatically and objectively the relevant features by creating a gap between scores of relevant and irrelevant parameters. It permits to automatically generate threshold that can effectively reduce human subjectivity and arbitrariness when manually choosing thresholds. For a specific sensory descriptor, the threshold is defined systematically by iteratively aggregating (n times) the ranking lists generated by OWA and fuzzy models, according to a specific algorithm. Having applied the percolation technique on a real example, of a well known finished textile product especially the stonewashed denims, usually considered as the most important quality criteria in jeans’ evaluation, we separate the relevant physical features from irrelevant ones for each sensory descriptor. The originality and performance of the proposed relevant feature selection method can be shown by the variability in the number of physical features in the set of selected relevant parameters. Instead of selecting identical numbers of features with a predefined threshold, the proposed method can be adapted to the specific natures of the complex relations between sensory descriptors and physical features, in order to propose lists of relevant features of different sizes for different descriptors. In order to obtain more reliable results for selection of relevant physical features, the percolation technique has been applied for combining the fuzzy global relevancy and OWA global relevancy criteria in order to clearly distinguish scores of the relevant physical features from those of irrelevant ones.Keywords: data sensitivity, feature selection, fuzzy logic, OWA operators, percolation technique
Procedia PDF Downloads 605555 Root Cause Analysis of Surveillance Quality in Tanjung Priok Port to Prevent Epidemic Potential Disease as a Form of Bioterrorism Threat
Authors: Dina A. Amu, Fifi N. Afifah, Catur Rosidati, Tirton Nefianto
Abstract:
Indonesia was shaken up by the avian influenza cases that had caused the country suffered losses of millions of dollars. The avian influenza case had even been suspected as a bioterrorism attack since it was an uncommon case in epidemiology. Furthermore, this avian influenza virus is a high pathogenic one and Indonesia has the highest case of fatality rate in the world. Bioterrorism threats or epidemic potential disease outbreaks currently does not exist in Tanjung Priok port yet. However, the surveillance system enhancement on epidemic potential diseases should be taken as a prevention, especially because Indonesia is currently facing the ASEAN Economic Society (AES). Therefore, this research evaluates the health surveillance system which is organized by Control, Quarantine and Surveillance Department, Health Office of Tanjung Priok Port. This study uses qualitative-evaluative method which utilizes Urgency Seriousness Growth (USG) method to determine priority issues and Root Cause analysis to determine the cause of prior problem. The result of this research shows that the implementation of epidemic potential disease surveillance in Tanjung Priok port has not done in the best possible way. It is because the lack of time allocation and the succinctness of the check list of ship's environmental health inspection. Therefore, Health Ministry of Indonesia should recruit more employees at the health office of Tanjung Priok port, hold a simulation of ship's inspection and simplify the list for ship's environmental health inspection.Keywords: surveillance, epidemic potential disease, port health, bioterrorism
Procedia PDF Downloads 363554 Cultural Routes: A Study of Anatolian Seljuks Madrasahs
Authors: Zeynep İnan Ocak, Gülsün Tanyeli
Abstract:
One of the most important architectural types of Islamic architecture is madrasah used as educational institutions, hospital or observatory. This type of buildings has one or two storeys, central open or closed courtyards, four iwans and students cells located among the iwans. The main characteristic of the designs featured in the portals. The Islamic art features and adornments are seen well on these buildings made of stone. The earliest examples date to late 12th century in Anatolia after the Battle of Manzikert. Under the Seljuks rule over the one thousand facilities were built in 12th and 13th centuries and there are one hundred thirty five madrasah in total list. But today no all of them are conserved only forty percent are remained. The Seljuks madrasah located in many Anatolian were registered as immovable cultural property in several times by Turkish Culture and Tourism Ministry. The first Turkish buildings inscribed on the World Heritage List are the Great Mosque and Hospital of Divriği in 1985. Also the nominated site named as Anatolian Seljuks Madrasah is in the tentative list of UNESCO World Heritage in 2014. The property is composed some of notable madrasah such as İnce Minareli Madrasah and Karatay Madrasah in Konya; Çifte Madrasah and Sahibiye Madrasah in Kayseri; Buruciye Madrasah, Çifte Minareli Madrasah and Gök Madrasah in Sivas; Çifte Minareli Madrasah and Yakutiye Madrasah in Erzurum; Cacabey Madrasah in Kirşehir. Certainly the advantage of tourism is important for conducting the preservation of heritage. It offers much kind of cultural heritage products by means of visiting monuments. In spite of advantage of tourism, it can be the negative effects of tourism on sites and places of cultural significance. While assisting and guiding the conservation works of madrasah, it should be get reference to international charters and other doctrinal texts about the relation between heritage and tourism. Thereby the monuments will be conserved in good condition promoting by tourism. It should be plan a project about the correlation of visitors and heritage to focus on theme of Seljuks architecture. This study aims to set out the principles about the conservation of madrasah as world heritage taking advantages of tourism. The madrasah as a heritage should be evaluated not only a monument but also cultural route. So the cultural route for madrasah is determined by means of a journey through space and time, how the heritage of the different Anatolian cities. Also the cultural route is created visiting both the madrasah and the other medieval structures. In this study, the route, the principles, relation of tourism are represented considering the conservation of Seljuks madrasah.Keywords: architectural heritage, cultural routes, Seljuks madrasah, Anatolia
Procedia PDF Downloads 287