Search results for: sensitive issue
5141 RNA Expression Analysis of Mycobacterial Methyltransferases Genes in Different Resistant Strains of Mycobacterium Tuberculosis
Authors: Seyed Davar Siadat, Samira Tarashi, Abolfazl Fateh, Arfa Moshiri
Abstract:
Background: The global health issue of tuberculosis (TB) still affects patients in every country. TB control may not be as effective as it should be, especially when resistant strains are involved. In this regard, mycobacterial MTases play a major role in tuberculosis, but the mechanisms underlying their function have yet to be fully deciphered. Methods: Five resistant isolates of M.tb were accumulated. As a reference strain, M.tb H37Rv (ATCC 27249) was used. For this analysis, seven putative mycobacterial MTase genes (Rv0645c, Rv1694, Rv2966c, Rv3919c, Rv2756c, Rv1988, and Rv3263), as well as Rv1392 as SAM synthase, were selected. Comparing mutations and expression levels of MTases in different strains was accomplished by PCR-sequencing and qRT-PCR. The relative expression levels of these genes were calculated using the 2 -ΔΔCt method. Results: The Rv3919c gene (T to G in codon 341) and Rv1392 gene (G to A in codon 97) were the only mutations found in the INHR strain. In all sensitive and resistant isolates, Rv0645c, Rv3263, Rv2756c, and Rv2966c were overexpressed. However, the expression of Rv1988 and Rv3919c decreased in the sensitive strains, whereas the expression of Rv1694 increased. There was also a decreased expression of Rv1392 in the INHR isolate. Conclusion: The presence of mycobacterial MTases as well as resistance to antibiotics were found to be correlated in M.tb strains. Undoubtedly, there are some MTases that are associated with the virulence process. It is necessary to conduct additional studies to fully explore the impact of mycobacterial MTases within specific strains of M.tb to develop novel diagnostic and treatment strategies.Keywords: mycobacterium tuberculosis, drug resistance, methyltransferases, s-adenosylmethionine
Procedia PDF Downloads 1045140 Exploring Cybersecurity and Phishing Attacks within Healthcare Institutions in Saudi Arabia: A Narrative Review
Authors: Ebtesam Shadadi, Rasha Ibrahim, Essam Ghadafi
Abstract:
Phishing poses a significant threat as a cybercrime by tricking end users into revealing their confidential and sensitive information. Attackers often manipulate victims to achieve their malicious goals. The increasing prevalence of Phishing has led to extensive research on this issue, including studies focusing on phishing attempts in healthcare institutions in the Kingdom of Saudi Arabia. This paper explores the importance of analyzing phishing attacks, specifically focusing on those targeting the healthcare industry. The study delves into the tactics, obstacles, and remedies associated with these attacks, all while considering the implications for Saudi Vision 2030.Keywords: phishing, cybersecurity, cyber threat, social engineering, vision 2030
Procedia PDF Downloads 615139 Rural-Urban Education Gap and Left-Behind Children Education in China
Authors: Jiawei Liang
Abstract:
Against the backdrop of China's burgeoning migration from rural to urban areas, a demographic group has emerged in China, which is called left-behind children. Due to many reasons, including the issue of the rural-urban education gap, the education of left-behind children has been below the national education average. In this situation, the issue has attracted the attention of researchers and policymakers. In order to gain a comprehensive understanding of this issue, this paper adopts an analytical approach to studying the rural-urban education gap and left-behind children in rural China. The paper first introduces the current situation of migration, the education gap, and left-behind children within China. Then, it further explores the causes of these two questions and barriers as well as the consequences for left-behind children. Finally, the study offers some suggestions to alleviate the urban-rural gap and the current situation of education for left-behind children in rural areas, which will hopefully shed light on the issue of left-behind children in China and the urban-rural education gap.Keywords: left-behind children, rural China, education improvement, Hukou policy, rural-urban education gap
Procedia PDF Downloads 1045138 Advantages of Fuzzy Control Application in Fast and Sensitive Technological Processes
Authors: Radim Farana, Bogdan Walek, Michal Janosek, Jaroslav Zacek
Abstract:
This paper presents the advantages of fuzzy control use in technological processes control. The paper presents a real application of the Linguistic Fuzzy-Logic Control, developed at the University of Ostrava for the control of physical models in the Intelligent Systems Laboratory. The paper presents an example of a sensitive non-linear model, such as a magnetic levitation model and obtained results which show how modern information technologies can help to solve actual technical problems. A special method based on the LFLC controller with partial components is presented in this paper followed by the method of automatic context change, which is very helpful to achieve more accurate control results. The main advantage of the used system is its robustness in changing conditions demonstrated by comparing with conventional PID controller. This technology and real models are also used as a background for problem-oriented teaching, realized at the department for master students and their collaborative as well as individual final projects.Keywords: control, fuzzy logic, sensitive system, technological proves
Procedia PDF Downloads 4695137 Rapid and Sensitive Detection: Biosensors as an Innovative Analytical Tools
Authors: Sylwia Baluta, Joanna Cabaj, Karol Malecha
Abstract:
The evolution of biosensors was driven by the need for faster and more versatile analytical methods for application in important areas including clinical, diagnostics, food analysis or environmental monitoring, with minimum sample pretreatment. Rapid and sensitive neurotransmitters detection is extremely important in modern medicine. These compounds mainly occur in the brain and central nervous system of mammals. Any changes in the neurotransmitters concentration may lead to many diseases, such as Parkinson’s or schizophrenia. Classical techniques of chemical analysis, despite many advantages, do not permit to obtain immediate results or automatization of measurements.Keywords: adrenaline, biosensor, dopamine, laccase, tyrosinase
Procedia PDF Downloads 1425136 Drape Simulation by Commercial Software and Subjective Assessment of Virtual Drape
Authors: Evrim Buyukaslan, Simona Jevsnik, Fatma Kalaoglu
Abstract:
Simulation of fabrics is more difficult than any other simulation due to complex mechanics of fabrics. Most of the virtual garment simulation software use mass-spring model and incorporate fabric mechanics into simulation models. The accuracy and fidelity of these virtual garment simulation software is a question mark. Drape is a subjective phenomenon and evaluation of drape has been studied since 1950’s. On the other hand, fabric and garment simulation is relatively new. Understanding drape perception of subjects when looking at fabric simulations is critical as virtual try-on becomes more of an issue by enhanced online apparel sales. Projected future of online apparel retailing is that users may view their avatars and try-on the garment on their avatars in the virtual environment. It is a well-known fact that users will not be eager to accept this innovative technology unless it is realistic enough. Therefore, it is essential to understand what users see when they are displaying fabrics in a virtual environment. Are they able to distinguish the differences between various fabrics in virtual environment? The purpose of this study is to investigate human perception when looking at a virtual fabric and determine the most visually noticeable drape parameter. To this end, five different fabrics are mechanically tested, and their drape simulations are generated by commercial garment simulation software (Optitex®). The simulation images are processed by an image analysis software to calculate drape parameters namely; drape coefficient, node severity, and peak angles. A questionnaire is developed to evaluate drape properties subjectively in a virtual environment. Drape simulation images are shown to 27 subjects and asked to rank the samples according to their questioned drape property. The answers are compared to the calculated drape parameters. The results show that subjects are quite sensitive to drape coefficient changes while they are not very sensitive to changes in node dimensions and node distributions.Keywords: drape simulation, drape evaluation, fabric mechanics, virtual fabric
Procedia PDF Downloads 3385135 Determination of Metalaxyl Efficacy in Controlling Phytophthora palmivora Infection of Durian Using Bioassay
Authors: Supawadee Phetkhajone, Wisuwat Songnuan
Abstract:
Metalaxyl is one of the most common and effective fungicides used to control Phytophthora palmivora infection in durian (Durio zibethinus L.). The efficacy of metalaxyl residue in durian under greenhouse condition was evaluated using bioassay. Durian seedlings were treated with 2 methods of application, spraying, and soil drenching of metalaxyl, at recommended concentration (1000 mg/L). Mock treated samples were treated with 0.1% Tween20 and water for spraying and soil drenching methods, respectively. The experiment was performed in triplicates. Leaves were detached from treated plants at 0, 1, 7, 15, 20, 30, and 60 days after application, inoculated with metalaxyl-resistant and metalaxyl-sensitive isolates of P. palmivora, and incubated in a high humidity chamber for 5 days at room temperature. Metalaxyl efficacy was determined by measuring the lesion size on metalaxyl treated and mock treated samples. The results showed that metalaxyl can control metalaxyl-sensitive isolate of P. palmivora for at least 30 days after application in both methods of application. The metalaxyl-resistant isolate was not inhibited in all treatments. Leaf samples from spraying method showed larger lesions compared to soil drench method. These results demonstrated that metalaxyl applications, especially soil drenching methods showed high efficacy to control metalaxyl-sensitive isolates of P. palmivora, although it cannot control metalaxyl-resistant isolates of P. palmivora in all treatments. These qualitative data indicate that metalaxyl may suitable to control metalaxyl-sensitive isolates of P. palmivora infection.Keywords: bioassay, degradation, durian, metalaxyl
Procedia PDF Downloads 1255134 YOLO-IR: Infrared Small Object Detection in High Noise Images
Authors: Yufeng Li, Yinan Ma, Jing Wu, Chengnian Long
Abstract:
Infrared object detection aims at separating small and dim target from clutter background and its capabilities extend beyond the limits of visible light, making it invaluable in a wide range of applications such as improving safety, security, efficiency, and functionality. However, existing methods are usually sensitive to the noise of the input infrared image, leading to a decrease in target detection accuracy and an increase in the false alarm rate in high-noise environments. To address this issue, an infrared small target detection algorithm called YOLO-IR is proposed in this paper to improve the robustness to high infrared noise. To address the problem that high noise significantly reduces the clarity and reliability of target features in infrared images, we design a soft-threshold coordinate attention mechanism to improve the model’s ability to extract target features and its robustness to noise. Since the noise may overwhelm the local details of the target, resulting in the loss of small target features during depth down-sampling, we propose a deep and shallow feature fusion neck to improve the detection accuracy. In addition, because the generalized Intersection over Union (IoU)-based loss functions may be sensitive to noise and lead to unstable training in high-noise environments, we introduce a Wasserstein-distance based loss function to improve the training of the model. The experimental results show that YOLO-IR achieves a 5.0% improvement in recall and a 6.6% improvement in F1-score over existing state-of-art model.Keywords: infrared small target detection, high noise, robustness, soft-threshold coordinate attention, feature fusion
Procedia PDF Downloads 735133 Keyloggers Prevention with Time-Sensitive Obfuscation
Authors: Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee
Abstract:
Nowadays, the abuse of keyloggers is one of the most widespread approaches to steal sensitive information. In this paper, we propose an On-Screen Prompts Approach to Keyloggers (OSPAK) and its analysis, which is installed in public computers. OSPAK utilizes a canvas to cue users when their keystrokes are going to be logged or ignored by OSPAK. This approach can protect computers against recoding sensitive inputs, which obfuscates keyloggers with letters inserted among users' keystrokes. It adds a canvas below each password field in a webpage and consists of three parts: two background areas, a hit area and a moving foreground object. Letters at different valid time intervals are combined in accordance with their time interval orders, and valid time intervals are interleaved with invalid time intervals. It utilizes animation to visualize valid time intervals and invalid time intervals, which can be integrated in a webpage as a browser extension. We have tested it against a series of known keyloggers and also performed a study with 95 users to evaluate how easily the tool is used. Experimental results made by volunteers show that OSPAK is a simple approach.Keywords: authentication, computer security, keylogger, privacy, information leakage
Procedia PDF Downloads 1225132 Mechanism of pH Sensitive Flocculation for Organic Load and Colour Reduction in Landfill Leachate
Authors: Brayan Daniel Riascos Arteaga, Carlos Costa Perez
Abstract:
Landfill leachate has an important fraction of humic substances, mainly humic acids (HAs), which often represent more than half value of COD, specially in liquids proceeded from composting processes of organic fraction of solid wastes. We propose in this article a new method of pH sensitive flocculation for COD and colour reduction in landfill leachate based on the chemical properties of HAs. Landfill leachate with a high content of humic acids can be efficiently treated by pH sensitive flocculation at pH 2.0, reducing COD value in 86.1% and colour in 84.7%. Mechanism of pH sensitive flocculation is based in protonation first of phenolic groups and later of carboxylic acid groups in the HAs molecules, resulting in a reduction of Zeta potential value. For pH over neutrality, carboxylic acid and phenolic groups are ionized and Zeta potential increases in absolute value, maintaining HAs in suspension as colloids and conducting flocculation to be obstructed. Ionized anionic groups (carboxylates) can interact electrostatically with cations abundant in leachate (site binding) aiding to maintain HAs in suspension. Simulation of this situation and ideal visualization of Zeta potential behavior is described in the paper and aggregation of molecules by H-bonds is proposed as the main step in separation of HAs from leachate and reduction of COD value in this complex liquid. CHNS analysis, FT-IR spectrometry and UV–VIS spectrophotometry show chemical elements content in the range of natural and commercial HAs, clear aromaticity and carboxylic acids and phenolic groups presence in the precipitate from landfill leachateKeywords: landfill leachate, humic acids, COD, chemical treatment, flocculation
Procedia PDF Downloads 715131 Enhanced Visual Sharing Method for Medical Image Security
Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar
Abstract:
In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.Keywords: information security, medical images, cryptography, visual sharing
Procedia PDF Downloads 4145130 Robustness of MIMO-OFDM Schemes for Future Digital TV to Carrier Frequency Offset
Authors: D. Sankara Reddy, T. Kranthi Kumar, K. Sreevani
Abstract:
This paper investigates the impact of carrier frequency offset (CFO) on the performance of different MIMO-OFDM schemes with high spectral efficiency for next generation of terrestrial digital TV. We show that all studied MIMO-OFDM schemes are sensitive to CFO when it is greater than 1% of intercarrier spacing. We show also that the Alamouti scheme is the most sensitive MIMO scheme to CFO.Keywords: modulation and multiplexing (MIMO-OFDM), signal processing for transmission carrier frequency offset, future digital TV, imaging and signal processing
Procedia PDF Downloads 4875129 Investigating Dynamic Transition Process of Issues Using Unstructured Text Analysis
Authors: Myungsu Lim, William Xiu Shun Wong, Yoonjin Hyun, Chen Liu, Seongi Choi, Dasom Kim, Namgyu Kim
Abstract:
The amount of real-time data generated through various mass media has been increasing rapidly. In this study, we had performed topic analysis by using the unstructured text data that is distributed through news article. As one of the most prevalent applications of topic analysis, the issue tracking technique investigates the changes of the social issues that identified through topic analysis. Currently, traditional issue tracking is conducted by identifying the main topics of documents that cover an entire period at the same time and analyzing the occurrence of each topic by the period of occurrence. However, this traditional issue tracking approach has limitation that it cannot discover dynamic mutation process of complex social issues. The purpose of this study is to overcome the limitations of the existing issue tracking method. We first derived core issues of each period, and then discover the dynamic mutation process of various issues. In this study, we further analyze the mutation process from the perspective of the issues categories, in order to figure out the pattern of issue flow, including the frequency and reliability of the pattern. In other words, this study allows us to understand the components of the complex issues by tracking the dynamic history of issues. This methodology can facilitate a clearer understanding of complex social phenomena by providing mutation history and related category information of the phenomena.Keywords: Data Mining, Issue Tracking, Text Mining, topic Analysis, topic Detection, Trend Detection
Procedia PDF Downloads 4085128 DLtrace: Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps
Authors: Jie Zhang, Qianyu Guo, Tieyi Zhang, Zhiyong Feng, Xiaohong Li
Abstract:
With the widespread popularity of mobile devices and the development of artificial intelligence (AI), deep learning (DL) has been extensively applied in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace; a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Moreover, using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. We conducted an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace has a more robust performance than FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.Keywords: mobile computing, deep learning apps, sensitive information, static analysis
Procedia PDF Downloads 1785127 Confirmatory Analysis of Externalizing Issue Validity from an Adolescent Sample
Authors: Zhidong Zhang, Zhi-Chao Zhang
Abstract:
This study investigated the structural validity of externalizing issues of Achenbach System of Empirically Based Assessment (ASEBA) via a Chinese sample. The externalizing problems consist of two sub-problems: rule-breaking behavior and aggressive behavior. The rule-breaking behavior consists of 17 items, and aggressive behavior consists of 18 items. The factor analysis model was used to examine the structure validity. For the rule breaking behavior, at the first step, the most items weighted with component 2. After the rotation, there was a clear weight on both component 1 and 2. For the aggressive behavior, at the first step, there was no clear picture about the components. After the rotation, two clusters of items were closer to component 1 and 2 respectively. It seemed that both rule breaking behavior issue and aggressive behavior issue suggested two components. Further studies should be done to examine both samples and structures of externalizing problems.Keywords: confirmatory analysis, externalizing issue, structural validity, varimax rotations
Procedia PDF Downloads 4335126 Creating Trauma-Sensitive Yoga Programs for University Students With Stress and Anxiety: Lessons From a Program in the United States
Authors: Jessica Gladden
Abstract:
Anxiety remains one of the most common mental health disorders in the United States. Many university students report having a high level of anxiety, with additional life stressors that might include being away from home for the first time, being around unfamiliar people, having new expectations placed on them, and often have financial struggles. Universities have the ability and opportunity to form programs that can involve students with activities that reduce stress and teach coping skills. This research includes one example of using a somatic based group format of yoga to teach these skills and assist students in applying these strategies to their daily lives. This study compared a group of 17 students participating in weekly yoga classes to 34 students who did not attend the program. The students who attended the program reported a larger reduction of anxiety on both the BAI and GAD-7 than the control group, and verbally reported additional benefits in relaxation and coping skills. This presentation will review the results of the program as well as detailing the steps taken in creating a yoga program for university students with stress and anxiety. This will include a discussion on the components of trauma-sensitive yoga and the concerns and strategies to consider when developing a program for students.Keywords: yoga, trauma-sensitive yoga, anxiety, students
Procedia PDF Downloads 1155125 Agriculture in the Dominican Republic: Competitiveness in a New Trade Regime and Lessons for Cuba
Authors: Sarita D. Jackson
Abstract:
Agriculture remains a sensitive issue during multilateral trade negotiations within the World Trade Organization (WTO). Similar problems arise at the bilateral level, as in the case of trade talks between the United States and the Dominican Republic. The study explores the determinant of agricultural industry competitiveness in the 21st century, particularly in the case of U.S. and Dominican agriculture in each other’s market. Complementing existing scholarship on industry competitiveness, the study argues that trade rules that are established under preferential access programs and trade agreements play a significant role in shaping an industry’s ability to compete. The final analysis is used to offer recommendations to the same sector in Cuba. Cuba currently relies heavily on U.S. food imports and is experiencing the gradual opening of trade with the United States.Keywords: agriculture, bargaining, competitiveness, Dominican Republic, DR-CAFTA, free trade agreement, institutions
Procedia PDF Downloads 2815124 An Improved Method on Static Binary Analysis to Enhance the Context-Sensitive CFI
Authors: Qintao Shen, Lei Luo, Jun Ma, Jie Yu, Qingbo Wu, Yongqi Ma, Zhengji Liu
Abstract:
Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CRAs). Traditional CFI Systems and recent Context-Sensitive CFI use coarse control flow graphs (CFGs) to analyze whether the control flow hijack occurs, left vast space for attackers at indirect call-sites. Coarse CFGs make it difficult to decide which target to execute at indirect control-flow transfers, and weaken the existing CFI systems actually. It is an unsolved problem to extract CFGs precisely and perfectly from binaries now. In this paper, we present an algorithm to get a more precise CFG from binaries. Parameters are analyzed at indirect call-sites and functions firstly. By comparing counts of parameters prepared before call-sites and consumed by functions, targets of indirect calls are reduced. Then the control flow would be more constrained at indirect call-sites in runtime. Combined with CCFI, we implement our policy. Experimental results on some popular programs show that our approach is efficient. Further analysis show that it can mitigate COOP and other advanced attacks.Keywords: contex-sensitive, CFI, binary analysis, code reuse attack
Procedia PDF Downloads 3235123 Data Projects for “Social Good”: Challenges and Opportunities
Authors: Mikel Niño, Roberto V. Zicari, Todor Ivanov, Kim Hee, Naveed Mushtaq, Marten Rosselli, Concha Sánchez-Ocaña, Karsten Tolle, José Miguel Blanco, Arantza Illarramendi, Jörg Besier, Harry Underwood
Abstract:
One of the application fields for data analysis techniques and technologies gaining momentum is the area of social good or “common good”, covering cases related to humanitarian crises, global health care, or ecology and environmental issues, among others. The promotion of data-driven projects in this field aims at increasing the efficacy and efficiency of social initiatives, improving the way these actions help humanity in general and people in need in particular. This application field, however, poses its own barriers and challenges when developing data-driven projects, lagging behind in comparison with other scenarios. These challenges derive from aspects such as the scope and scale of the social issue to solve, cultural and political barriers, the skills of main stakeholders and the technological resources available, the motivation to be engaged in such projects, or the ethical and legal issues related to sensitive data. This paper analyzes the application of data projects in the field of social good, reviewing its current state and noteworthy initiatives, and presenting a framework covering the key aspects to analyze in such projects. The goal is to provide guidelines to understand the main challenges and opportunities for this type of data project, as well as identifying the main differential issues compared to “classical” data projects in general. A case study is presented on the initial steps and stakeholder analysis of a data project for the inclusion of refugees in the city of Frankfurt, Germany, in order to empirically confront the framework with a real example.Keywords: data-driven projects, humanitarian operations, personal and sensitive data, social good, stakeholders analysis
Procedia PDF Downloads 3275122 "At 60 – Old Age, at 70 – the Hoary Head": The Perceived Meaning of Bringing a Foreign Caregiver into the Home in the Haredi Society – Challenges and Barriers to Culturally-Sensitive Intervention
Authors: Amit Zriker, Anat Freund
Abstract:
The aim of the study was to conduct a thorough examination into the multiple complexities of bringing a foreign caregiver into the home to care for older adults in the Haredi society, by relating to the perspectives of the older adult and his family members. Research questions were: What is the meaning of bringing a foreign caregiver into the home in Haredi society, from the point of view of the older adult’s family members, and what are the implications of these meanings in the context of developing social policies and interventions? The current study was a qualitative-phenomenological study, which relates to “the lived experience” of those involved in the studied phenomenon. In the framework of the study, the participants included 15 adult Haredi sons and daughters of elderly impaired parents who receive homecare from a foreign caregiver. Data collection was carried out using in-depth, semi-structured interviews; the interview guidelines are comprised of the following content worlds: the meanings of aging in Haredi families; the decision-making process in relation to providing home care assistance for elderly impaired parents; making decisions regarding bringing a foreign caregiver into the home to care for an elderly parent; the daily routine after bringing in a foreign caregiver; bringing in a foreign caregiver vs. the society and vs. the Haredi establishment; and more. The issue of bringing a foreign caregiver into the home in the context of a faith-based society has received only scant and partial research attention to date. Nevertheless, in light of the growing elderly population in the Haredi society in Israel, and in closed, faith-based societies, in general; there is a growing need to bring foreign caregivers into the home as a possible solution to the “aging-in-place” problem in these societies. The separatist nature, and the collectivist and faith-based lifestyle of the Haredi society present unique challenges and needs in the process of employing a foreign caregiver. Moreover, the foreign caregiver also brings his/her own cultural world to the encounter, meaning, this process involves the elderly impaired individual, his/her family members, as well as the foreign caregiver. Therefore, it is important to understand their attitudes, perceptions and interactions, in order to create a good fit among all involved parties. The innovation and uniqueness of the current study is in its in-depth exploration of a phenomenon through an emotional-cultural lens. The study findings also contribute to the creation of social policy in the field of nursing, which will be adapted and culturally sensitive to Haredi society, and other faith-based societies.Keywords: culturally-sensitive intervention, faith-based society, foreign caregiver, Haredi society
Procedia PDF Downloads 1965121 Assessment of the Natural and Human Potential of the Municipality of Tirana for the Development of Agritourism
Authors: Dritan Lloçi, Xhulia Bygjymi
Abstract:
The topic is about one of the new trends with the greatest expectations in the field of tourism, such as agritourism. It is chosen exactly this type of tourism to address as this issue is one of the newest trends not only for Tirana or Albania but also beyond. The other reason is that this topic is quite current and challenging for the reality in which we find ourselves, and the opportunities for research work and to make our own contribution are quite large. It is chosen Tirana because seeing the many opportunities it offers for the development of agritourism as a result of the rich natural potential it offers; the fact that it is the capital of Albania makes this space absorb a good part of the investments in the rural tourism sector but not alone. The study is organized into several main issues regarding the natural and human potentials of the area, which are in function of the development of agrotourism. The first issue has to do with the natural potentials of the municipality of Tirana and how they can be used for agritourism. The second issue has to do with the cultural potential that the municipality of Tirana possesses, causing tourist flows to be more concentrated in this geographical-administrative space. The third issue has to do with the human potential that is a function of agrotourism. So the way of life, hospitality, cooking, etc.Keywords: agrotourism, natural potential, agrotourism farms, tirana municipality, tourism development
Procedia PDF Downloads 765120 A Soft System Methodology Approach to Stakeholder Engagement in Water Sensitive Urban Design
Authors: Lina Lukusa, Ulrike Rivett
Abstract:
Poor water management can increase the extreme pressure already faced by water scarcity. Unless water management is addressed holistically, water quality and quantity will continue to degrade. A holistic approach to water management named Water Sensitive Urban Design (WSUD) has thus been created to facilitate the effective management of water. Traditionally, water management has employed a linear design approach, while WSUD requires a systematic, cyclical approach. In simple terms, WSUD assumes that everything is connected. Hence, it is critical for different stakeholders involved in WSUD to engage and reach a consensus on a solution. However, many stakeholders in WSUD have conflicting interests. Using the soft system methodology (SSM), developed by Peter Checkland, as a problem-solving method, decision-makers can understand this problematic situation from different world views. The SSM addresses ill and complex challenging situations involving human activities in a complex structured scenario. This paper demonstrates how SSM can be applied to understand the complexity of stakeholder engagement in WSUD. The paper concludes that SSM is an adequate solution to understand a complex problem better and then propose efficient solutions.Keywords: co-design, ICT platform, soft systems methodology, water sensitive urban design
Procedia PDF Downloads 1215119 Spontaneous Generation of Wrinkled Patterns on pH-Sensitive Smart-Hydrogel Films
Authors: Carmen M. Gonzalez-Henriquez, Mauricio A. Sarabia-Vallejos, Juan Rodriguez-Hernandez
Abstract:
DMAEMA, as a monomer, has been widely studied and used in several application fields due to their pH-sensitive capacity (tertiary amine protonation), being relevant in the biomedical area as a potential carrier for drugs focused on the treatment of genetic or acquired diseases (efficient gene transfection), among others. Additionally, the inhibition of bacterial growth and, therefore, their antimicrobial activity, can be used as dual-functional antifogging/antimicrobial polymer coatings. According to their interesting physicochemical characteristics and biocompatible properties, DMAEMA was used as a monomer to synthesize a smart pH-sensitive hydrogel, namely poly(HEMA-co-PEGDA575-co-DMAEMA). Thus, different mole ratios (ranging from 5:1:0 to 0:1:5, according to the mole ratio between HEMA, PEGDA, and DEAEMA, respectively) were used in this research. The surface patterns formed via a two-step polymerization (redox- and photo-polymerization) were first chemically studied via 1H-NMR and elemental analysis. Secondly, the samples were morphologically analyzed by using Field-Emission Scanning Electron Microscopy (FE-SEM) and Atomic Force Microscopy (AFM) techniques. Then, a particular relation between HEMA, PEGDA, and DEAEMA (0:1:5) was also characterized at three different pH (5.4, 7.4 and 8.3). The hydrodynamic radius and zeta potential of the micro-hydrogel particles (emulsion) were carried out as a possible control for morphology, exploring the effect that produces hydrogel micelle dimensions in the wavelength, height, and roughness of the wrinkled patterns. Finally, contact angle and cross-hatch adhesion test was carried out for the hydrogels supported on glass using TSM-silanized surfaces in order to measure their mechanical properties.Keywords: wrinkled patterns, smart pH-sensitive hydrogels, hydrogel micelle diameter, adhesion tests
Procedia PDF Downloads 2065118 pH and Thermo-Sensitive Nanogels for Anti-Cancer Therapy
Authors: V. Naga Sravan Kumar Varma, H. G. Shivakumar
Abstract:
The aim of the study was to develop dual sensitive poly (N-isopropylacrylamide-co-acrylic acid) (PNA) nanogels(NGs) and studying its applications for Anti-Cancer therapy. NGs were fabricated by free radical polymerization using different amount of N-isopropylacrylamide and acrylic acid. A study for polymer composition over the effect on LCST in different pH was evaluated by measuring the absorbance at 500nm using UV spectrophotometer. Further selected NG’s were evaluated for change in hydrodynamic diameters in response to pH and temperature. NGs which could sharply respond to low pH value of cancer cells at body temperature were loaded with Fluorouracil (5-FU) using equilibrium swelling method and studied for drug release behaviour in different pH. A significant influence of NGs polymer composition over pH dependent LCST was observed. NGs which were spherical with an average particle size of 268nm at room temperature, shrinked forming an irregular shape when heated above to their respective LCST. 5FU loaded NGs did not intervene any difference in pH depended LCST behaviour of NGs. The in vitro drug release of NGs exhibited a pH and thermo-dependent control release. The cytoxicity study of blank carrier to MCF7 cell line showed no cytotoxicity. The results indicated that PNA NGs could be used as a potential drug carrier for anti-cancer therapy.Keywords: pH and thermo-sensitive, nanogels, P(NIPAM-co-AAc), anti-cancer, 5-FU
Procedia PDF Downloads 3505117 Sensitive Analysis of the ZF Model for ABC Multi Criteria Inventory Classification
Authors: Makram Ben Jeddou
Abstract:
The ABC classification is widely used by managers for inventory control. The classical ABC classification is based on the Pareto principle and according to the criterion of the annual use value only. Single criterion classification is often insufficient for a closely inventory control. Multi-criteria inventory classification models have been proposed by researchers in order to take into account other important criteria. From these models, we will consider the ZF model in order to make a sensitive analysis on the composite score calculated for each item. In fact, this score based on a normalized average between a good and a bad optimized index can affect the ABC items classification. We will then focus on the weights assigned to each index and propose a classification compromise.Keywords: ABC classification, multi criteria inventory classification models, ZF-model
Procedia PDF Downloads 5085116 Societal Stakes for Small Cruise Ships: A Recurrent Issue of Our Time
Authors: Maud Tixier
Abstract:
Societal issues are at stake for cruises anywhere, whatever the size of the ships and their destinations are. However, the Mediterranean sea is the main region where many operate and the challenges are both social and environmental. The presentation focuses on small ships, accounting for market niches, aimed at more specific cruise passengers and calling at less visited areas. How they cope with the benefit of all stakeholders is a persistent issue of our time.Keywords: environment, management, social, societal, safety
Procedia PDF Downloads 3315115 Childhood Obesity: Future Direction and Education Priorities
Authors: Zahra Ranjbar
Abstract:
Interpretive structural modeling (ISM) is a well-established methodology for identifying relationships among specific variables, which define a problem or an issue. In this study most important variables that have critical role in children obesity problem were introduce by ISM questionnaire technique and their relationships were determine. Our findings suggested that sedentary activities are top level variables and school teachers and administrators, public education and scientific collaborations are bottom level variables in children obesity problem. Control of dietary, Physical education program, parents, government and motivation strategies variables are depend to other variables. They are very sensitive to external variables. Also, physical education program, parents, government, motivation, school teachers and administrators, public education and collaboration variables have strong driving power. They are linkage factors; it means that they can be effective on children obesity problem directly.Keywords: ISM, variable, obesity, physical education, children
Procedia PDF Downloads 4565114 Towards the Management of Cybersecurity Threats in Organisations
Authors: O. A. Ajigini, E. N. Mwim
Abstract:
Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information
Procedia PDF Downloads 2595113 Relationship between Thumb Length and Pointing Performance on Portable Terminal with Touch-Sensitive Screen
Authors: Takahiro Nishimura, Kouki Doi, Hiroshi Fujimoto
Abstract:
Touch-sensitive screens that serve as displays and input devices have been adopted in many portable terminals such as smartphones and personal media players, and the market of touch-sensitive screens has expanded greatly. One of the advantages of touch-sensitive screen is the flexibility in the graphical user interface (GUI) design, and it is imperative to design an appropriate GUI to realize an easy-to-use interface. Moreover, it is important to evaluate the relationship between pointing performance and GUI design. There is much knowledge regarding easy-to-use GUI designs for portable terminals with touch-sensitive screens, and most have focused on GUI design approaches for women or children with small hands. In contrast, GUI design approaches for users with large hands have not received sufficient attention. In this study, to obtain knowledge that contributes to the establishment of individualized easy-to-use GUI design guidelines, we conducted experiments to investigate the relationship between thumb length and pointing performance on portable terminals with touch-sensitive screens. In this study, fourteen college students who participated in the experiment were divided into two groups based on the length of their thumbs. Specifically, we categorized the participants into two groups, thumbs longer than 64.2 mm into L (Long) group, and thumbs longer than 57.4 mm but shorter than 64.2 mm into A (Average) group, based on Japanese anthropometric database. They took part in this study under the authorization of Waseda University’s ‘Ethics Review Committee on Research with Human Subjects’. We created an application for the experimental task and implemented it on the projected capacitive touch-sensitive screen portable terminal (iPod touch (4th generation)). The display size was 3.5 inch and 960 × 640 - pixel resolution at 326 ppi (pixels per inch). This terminal was selected as the experimental device, because of its wide use and market share. The operational procedure of the application is as follows. First, the participants placed their thumb on the start position. Then, one cross-shaped target in a 10 × 7 array of 70 positions appeared at random. The participants pointed the target with their thumb as accurately and as fast as possible. Then, they returned their thumb to the start position and waited. The operation ended when this procedure had been repeated until all 70 targets had each been pointed at once by the participants. We adopted the evaluation indices for absolute error, variable error, and pointing time to investigate pointing performance when using the portable terminal. The results showed that pointing performance varied with thumb length. In particular, on the lower right side of the screen, the performance of L group with long thumb was low. Further, we presented an approach for designing easy-to- use button GUI for users with long thumbs. The contributions of this study include revelation of the relationship between pointing performance and user’s thumb length when using a portable terminal in terms of accuracy, precision, and speed of pointing. We hope that these findings contribute to an easy-to-use GUI design for users with large hands.Keywords: pointing performance, portable terminal, thumb length, touch-sensitive screen
Procedia PDF Downloads 1645112 Synthesis of Temperature Sensitive Nano/Microgels by Soap-Free Emulsion Polymerization and Their Application in Hydrate Sediments Drilling Operations
Authors: Xuan Li, Weian Huang, Jinsheng Sun, Fuhao Zhao, Zhiyuan Wang, Jintang Wang
Abstract:
Natural gas hydrates (NGHs) as promising alternative energy sources have gained increasing attention. Hydrate-bearing formation in marine areas is highly unconsolidated formation and is fragile, which is composed of weakly cemented sand-clay and silty sediments. During the drilling process, the invasion of drilling fluid can easily lead to excessive water content in the formation. It will change the soil liquid plastic limit index, which significantly affects the formation quality, leading to wellbore instability due to the metastable character of hydrate-bearing sediments. Therefore, controlling the filtrate loss into the formation in the drilling process has to be highly regarded for protecting the stability of the wellbore. In this study, the temperature-sensitive nanogel of P(NIPAM-co-AMPS-co-tBA) was prepared by soap-free emulsion polymerization, and the temperature-sensitive behavior was employed to achieve self-adaptive plugging in hydrate sediments. First, the effects of additional amounts of AMPS, tBA, and cross-linker MBA on the microgel synthesis process and temperature-sensitive behaviors were investigated. Results showed that, as a reactive emulsifier, AMPS can not only participate in the polymerization reaction but also act as an emulsifier to stabilize micelles and enhance the stability of nanoparticles. The volume phase transition temperature (VPTT) of nanogels gradually decreased with the increase of the contents of hydrophobic monomer tBA. An increase in the content of the cross-linking agent MBA can lead to a rise in the coagulum content and instability of the emulsion. The plugging performance of nanogel was evaluated in a core sample with a pore size distribution range of 100-1000nm. The temperature-sensitive nanogel can effectively improve the microfiltration performance of drilling fluid. Since a combination of a series of nanogels could have a wide particle size distribution at any temperature, around 200nm to 800nm, the self-adaptive plugging capacity of nanogels for the hydrate sediments was revealed. Thermosensitive nanogel is a potential intelligent plugging material for drilling operations in natural gas hydrate-bearing sediments.Keywords: temperature-sensitive nanogel, NIPAM, self-adaptive plugging performance, drilling operations, hydrate-bearing sediments
Procedia PDF Downloads 170