Search results for: preventing violent extremism
451 Global Analysis of Modern Economic Sanctions
Authors: I. L. Yakushev
Abstract:
Economic sanctions are an integral part of the foreign policy repertoire of States. Increasingly, States and international organizations are resorting to sanctions to address a variety of issues -from fighting corruption to preventing the use of nuclear weapons. Over time, the ways in which economic sanctions have been used have changed, especially over the past two decades. In the late 1990s, the recognition of the humanitarian harm of economic sanctions and the "War on Terrorism" after the events of September 11, 2001, led to serious changes in the structure and mechanisms of their application. Questions about how these coercive tools work, when they are applied, what consequences they have, and when they are successful are still being determined by research conducted in the second half of the 20th century. The conclusions drawn from past cases of sanctions may not be fully applicable to the current sanctions policy. In the second half of the 20th century, most cases of sanctions were related to the United States, and it covered restrictions on international trade. However, over the past two decades, the European Union, the United Nations, and China have also been the main initiators of sanctions. Modern sanctions include targeted and financial restrictions and are applied against individuals, organizations, and companies. Changing the senders, targets, stakeholders, and economic instruments used in the sanctions policy has serious implications for effectiveness and results. The regulatory and bureaucratic infrastructure necessary to implement and comply with modern economic sanctions has become more reliable. This evolution of sanctions has provided the scientific community with an opportunity to study new issues of coercion and return to the old ones. The economic sanctions research program should be developed to be relevant for understanding the application of modern sanctions and their consequences.Keywords: global analysis, economic sanctions, targeted sanctions, foreign policy, domestic policy, United Nations, European Union, USA, economic pressure
Procedia PDF Downloads 57450 Herapeutic Modalities for Anorexia Nervosa in Adolescents: A Narrative Review
Authors: Adam Al-Harbi, Chanel Powell, Katelyn Ward
Abstract:
In the age of social media and online body forums, the perception of body image among teenagers is constantly evolving. Growing up in an era of instant comparison facilitated by the internet, adolescents often struggle with self-identity, comparing their lives and bodies to countless others online. This environment has made it easier for them to access information on restrictive diets and fasting, contributing to the unfortunate glamorization of eating disorders. Although beauty standards have existed for centuries, social media amplifies these pressures. Platforms such as Instagram and TikTok have created spaces where teens are constantly exposed to idealized body types and beauty standards. This exposure often leads to harmful comparisons, fostering feelings of inadequacy and negative self-worth. Research indicates that adolescents, especially young girls, are at heightened risk for developing eating disorders like anorexia nervosa as they internalize these unrealistic standards. Anorexia nervosa, which has the highest mortality rate of any psychiatric disorder, is particularly alarming, with one in five anorexia deaths resulting from suicide. Young individuals with anorexia are twelve times more likely to die than their peers without the disorder. This paper aims to summarize the current state of literature comparing cognitive-behavioral therapy (CBT) and family-based therapy (FBT) in reducing morbidity, and mortality, and preventing symptom recurrence among adolescents with anorexia. CBT is a widely used treatment for eating disorders, particularly anorexia nervosa, while FBT is notable for its involvement of family members, which is crucial for developing teens and adolescents.Keywords: psychology, CBT, FBT, eating disorders, anorexia, therapeutic modalities
Procedia PDF Downloads 18449 A Review of Process Safety Management for Small and Medium Business in Malaysia
Authors: Muhammad Afiq Anaqi Bin Baharudin, Muhammad Izamuddin Bin Mohd Nasir, Syarifuddin Bin Sujuanda, Muhammad Syahmi Rusyaidi Bin Sham Suddin, Danish Hakimi Bin kamaruzaman, Muhammad Haqimi Nazim Bin Hasmanizam, Mohammad Akmal Zakwan Bin Amran, Muhammad Alparizi Bin Latif
Abstract:
In particular, for small and medium enterprises (SMBs) in Malaysia, process safety management (PSM) is a crucial component of industrial safety. Limited resources, a lack of technical know-how, and linguistic and cultural obstacles are just a few of the difficulties SMBs in Malaysia encounter while putting PSM programmes into practice. A number of studies have emphasised the significance of leadership commitment, hazard identification and assessment, and employee involvement in the execution of effective PSM programmes, which are crucial for preventing accidents and incidents. In the literature, there has been a lot of discussion on the creation of specialised PSM frameworks for SMBs in Malaysia. Several studies have proposed implementation frameworks for PSM programmes that are based on recognised worldwide standards. Despite the significance of PSM in ensuring industrial safety, there are still a number of gaps in the literature on PSM in Malaysian SMBs. These gaps include the need for additional research on the efficiency of PSM programmes in reducing accidents and incidents in SMBs as well as the development of more specialised approaches to implementing PSM programmes in SMBs with limited resources and technical expertise. The goal of this review is to give a thorough overview of the body of research on PSM in Malaysian SMBs while highlighting important findings, points of contention, and knowledge gaps that need to be filled in.Keywords: process safety management, occupational safety and health (OSH), small businesses, medium businesses, malaysia
Procedia PDF Downloads 125448 Natural Patterns for Sustainable Cooling in the Architecture of Residential Buildings in Iran (Hot and Dry Climate)
Authors: Elnaz Abbasian, Mohsen Faizi
Abstract:
In its thousand-year development, architecture has gained valuable patterns. Iran’s desert regions possess developed patterns of traditional architecture and outstanding skeletal features. Unfortunately increasing population and urbanization growth in the past decade as well as the lack of harmony with environment’s texture has destroyed such permanent concepts in the building’s skeleton, causing a lot of energy waste in the modern architecture. The important question is how cooling patterns of Iran’s traditional architecture can be used in a new way in the modern architecture of residential buildings? This research is library-based and documental that looks at sustainable development, analyzes the features of Iranian architecture in hot and dry climate in terms of sustainability as well as historical patterns, and makes a model for real environment. By methodological analysis of past, it intends to suggest a new pattern for residential buildings’ cooling in Iran’s hot and dry climate which is in full accordance to the ecology of the design and at the same time possesses the architectural indices of the past. In the process of cities’ physical development, ecological measures, in proportion to desert’s natural background and climate conditions, has kept the natural fences, preventing buildings from facing climate adversities. Designing and construction of buildings with this viewpoint can reduce the energy needed for maintaining and regulating environmental conditions and with the use of appropriate building technology help minimizing the consumption of fossil fuels while having permanent patterns of desert buildings’ architecture.Keywords: sustainability concepts, sustainable development, energy climate architecture, fossil fuel, hot and dry climate, patterns of traditional sustainability for residential buildings, modern pattern of cooling
Procedia PDF Downloads 308447 Statistical Models and Time Series Forecasting on Crime Data in Nepal
Authors: Dila Ram Bhandari
Abstract:
Throughout the 20th century, new governments were created where identities such as ethnic, religious, linguistic, caste, communal, tribal, and others played a part in the development of constitutions and the legal system of victim and criminal justice. Acute issues with extremism, poverty, environmental degradation, cybercrimes, human rights violations, crime against, and victimization of both individuals and groups have recently plagued South Asian nations. Everyday massive number of crimes are steadfast, these frequent crimes have made the lives of common citizens restless. Crimes are one of the major threats to society and also for civilization. Crime is a bone of contention that can create a societal disturbance. The old-style crime solving practices are unable to live up to the requirement of existing crime situations. Crime analysis is one of the most important activities of the majority of intelligent and law enforcement organizations all over the world. The South Asia region lacks such a regional coordination mechanism, unlike central Asia of Asia Pacific regions, to facilitate criminal intelligence sharing and operational coordination related to organized crime, including illicit drug trafficking and money laundering. There have been numerous conversations in recent years about using data mining technology to combat crime and terrorism. The Data Detective program from Sentient as a software company, uses data mining techniques to support the police (Sentient, 2017). The goals of this internship are to test out several predictive model solutions and choose the most effective and promising one. First, extensive literature reviews on data mining, crime analysis, and crime data mining were conducted. Sentient offered a 7-year archive of crime statistics that were daily aggregated to produce a univariate dataset. Moreover, a daily incidence type aggregation was performed to produce a multivariate dataset. Each solution's forecast period lasted seven days. Statistical models and neural network models were the two main groups into which the experiments were split. For the crime data, neural networks fared better than statistical models. This study gives a general review of the applied statistics and neural network models. A detailed image of each model's performance on the available data and generalizability is provided by a comparative analysis of all the models on a comparable dataset. Obviously, the studies demonstrated that, in comparison to other models, Gated Recurrent Units (GRU) produced greater prediction. The crime records of 2005-2019 which was collected from Nepal Police headquarter and analysed by R programming. In conclusion, gated recurrent unit implementation could give benefit to police in predicting crime. Hence, time series analysis using GRU could be a prospective additional feature in Data Detective.Keywords: time series analysis, forecasting, ARIMA, machine learning
Procedia PDF Downloads 164446 Effects of Bariatric Surgery on Preventing the Progression of Diabetic Retinopathy
Authors: Yunzi Chen, James Laybourne, Sarah Steven, Peter Carey, David Steel, Maria Sandinha
Abstract:
Introduction: Bariatric surgery is popular with the rising incidence of obesity. Its well-known benefits include significant and rapid glycaemic control. However, cases of paradoxical worsening in diabetic retinopathy (DR) despite improved glycaemic control have been reported. Purpose: clarification on the evolution of diabetic retinopathy after bariatric surgery. Method: retrospective study of 40 patients with Type 2 diabetes who underwent bariatric surgery in a UK specialist bariatric unit between 2009 and 2011. Pre-operative and post-operative visual acuity (VA), weight, HbA1c and annual DRSS screening results were analysed. Median follow up was 50 months. Results: No significant change in VA was found during the post-operative period. 85% of patients improved HbA1c post-operatively of which 53% achieved non-diabetic HbA1c of <6.1% - despite this, 2 patients developed new DR. First post-operative screening showed 80% of patients experienced no change, 8% improved but 13% of patients developed new DR (1 case with sight-threatening maculopathy). 80% of these cases persisted up to 24 months. The proportion of patients developing new or worse DR fluctuated over time, peaking at the 3rd annual screening with 26% (15% regressed, 56% stable). The probability of developing new or worse DR postoperatively was significantly associated with a high pre-operative HbA1c (>8%) and male gender. Conclusions: bariatric surgery does not guarantee long-term improvement or prevention of DR. Asymptomatic changes in DR occurred up to 5 years postoperatively. We therefore consider it prudent to continue screening in this cohort of patients.Keywords: bariatric surgery, diabetic retinopathy, obesity, type 2 diabetes mellitus
Procedia PDF Downloads 273445 Frenotomy for Tongue Tie: The Unlikely Benefit of Massage
Authors: Kailas Bhandarkar, Talib Dar, Laura Karia, Manasvi Upadhyaya
Abstract:
Introduction: Frenotomy for tongue tie is commonly performed in breastfed infants who experience difficulty in latching after failed conservative management for tongue tie. However, there is no consensus for the routine use of massage following frenotomy. Our aim was to assess the efficacy of massage in preventing recurrence following frenotomy. Methods: The tongue tie service in our tertiary referral hospital consists of 5 consultants and a breastfeeding (BF) midwife. 3 consultants routinely advice massage post procedure. Babies are assessed by the midwife after the procedure and a follow-up consultation after a week. After due ethical approval, data were collected by two staff members who were independent of TT service on a standardized questionnaire to avoid bias. Fischer exact test was employed (p < 0.05 considered significant). Results: Six hundred and thirty-two babies attended the clinic from January 2018 to December 2018. Thirty-three of these were excluded as the procedure was not needed. Parents were contacted at a median of six months post-procedure (range 2-10 months). 282/599 were advised massage. 92/282 could be contacted. 40/ 92 adhered to massage regimen. None of these had a recurrence. 52/92 (54%), although advised, did not perform massage. Reasons cited for lack of adherence to massage included difficulty in performing massaging and conflicting advice given by other health care professionals involved in patient care like paediatricians and group practice and lack of information on the internet). Overall, 4/599 (0.66%) had recurrences, and this difference was not statistically significant. Conclusion: In our experience, the rate of recurrence after frenotomy is low enough for us to conclude that there is no significant benefit of massage after frenotomy for tongue tie. We could also conclude that among parents who were advised massage more than half failed to adhere to the advice.Keywords: tongue tie, frenotomy, massage, recurrence
Procedia PDF Downloads 134444 Socio-Economic Child’S Wellbeing Impasse in South Africa: Towards a Theory-Based Solution Model
Authors: Paulin Mbecke
Abstract:
Research Issue: Under economic constraints, socio-economic conditions of households worsen discounting child’s wellbeing to the bottom of many governments and households’ priority lists. In such situation, many governments fail to rebalance priorities in providing services such as education, housing and social security which are the prerequisites for the wellbeing of children. Consequently, many households struggle to respond to basic needs especially those of children. Although economic conditions play a crucial role in creating prosperity or poverty in households and therefore the wellbeing or misery for children; they are not the sole cause. Research Insights: The review of the South African Index of Multiple Deprivation and the South African Child Gauge establish the extent to which economic conditions impact on the wellbeing or misery of children. The analysis of social, cultural, environmental and structural theories demonstrates that non-economic factors contribute equally to the wellbeing or misery of children, yet, they are disregarded. In addition, the assessment of a child abuse database proves a weak correlation between economic factors (prosperity or poverty) and child’s wellbeing or misery. Theoretical Implications: Through critical social research theory and modelling, the paper proposes a Theory-Based Model that combines different factors to facilitate the understanding of child’s wellbeing or misery. Policy Implications: The proposed model assists in broad policy and decision making and reviews processes in promoting child’s wellbeing and in preventing, intervening and managing child’s misery with regard to education, housing, and social security.Keywords: children, child’s misery, child’s wellbeing, household’s despair, household’s prosperity
Procedia PDF Downloads 284443 Geographic Information System and Ecotourism Sites Identification of Jamui District, Bihar, India
Authors: Anshu Anshu
Abstract:
In the red corridor famed for the Left Wing Extremism, lies small district of Jamui in Bihar, India. The district lies at 24º20´ N latitude and 86º13´ E longitude, covering an area of 3,122.8 km2 The undulating topography, with widespread forests provides pristine environment for invigorating experience of tourists. Natural landscape in form of forests, wildlife, rivers, and cultural landscape dotted with historical and religious places is highly purposive for tourism. The study is primarily related to the identification of potential ecotourism sites, using Geographic Information System. Data preparation, analysis and finally identification of ecotourism sites is done. Secondary data used is Survey of India Topographical Sheets with R.F.1:50,000 covering the area of Jamui district. District Census Handbook, Census of India, 2011; ERDAS Imagine and Arc View is used for digitization and the creation of DEM’s (Digital Elevation Model) of the district, depicting the relief and topography and generate thematic maps. The thematic maps have been refined using the geo-processing tools. Buffer technique has been used for the accessibility analysis. Finally, all the maps, including the Buffer maps were overlaid to find out the areas which have potential for the development of ecotourism sites in the Jamui district. Spatial data - relief, slopes, settlements, transport network and forests of Jamui District were marked and identified, followed by Buffer Analysis that was used to find out the accessibility of features like roads, railway stations to the sites available for the development of ecotourism destinations. Buffer analysis is also carried out to get the spatial proximity of major river banks, lakes, and dam sites to be selected for promoting sustainable ecotourism. Overlay Analysis is conducted using the geo-processing tools. Digital Terrain Model (DEM) generated and relevant themes like roads, forest areas and settlements were draped on the DEM to make an assessment of the topography and other land uses of district to delineate potential zones of ecotourism development. Development of ecotourism in Jamui faces several challenges. The district lies in the portion of Bihar that is part of ‘red corridor’ of India. The hills and dense forests are the prominent hideouts and training ground for the extremists. It is well known that any kind of political instability, war, acts of violence directly influence the travel propensity and hinders all kind of non-essential travels to these areas. The development of ecotourism in the district can bring change and overall growth in this area with communities getting more involved in economically sustainable activities. It is a known fact that poverty and social exclusion are the main force that pushes people, resorting towards violence. All over the world tourism has been used as a tool to eradicate poverty and generate good will among people. Tourism, in sustainable form should be promoted in the district to integrate local communities in the development process and to distribute fruits of development with equity.Keywords: buffer analysis, digital elevation model, ecotourism, red corridor
Procedia PDF Downloads 259442 Development and Optimization of Colon Targeted Drug Delivery System of Ayurvedic Churna Formulation Using Eudragit L100 and Ethyl Cellulose as Coating Material
Authors: Anil Bhandari, Imran Khan Pathan, Peeyush K. Sharma, Rakesh K. Patel, Suresh Purohit
Abstract:
The purpose of this study was to prepare time and pH dependent release tablets of Ayurvedic Churna formulation and evaluate their advantages as colon targeted drug delivery system. The Vidangadi Churna was selected for this study which contains Embelin and Gallic acid. Embelin is used in Helminthiasis as therapeutic agent. Embelin is insoluble in water and unstable in gastric environment so it was formulated in time and pH dependent tablets coated with combination of two polymers Eudragit L100 and ethyl cellulose. The 150mg of core tablet of dried extract and lactose were prepared by wet granulation method. The compression coating was used in the polymer concentration of 150mg for both the layer as upper and lower coating tablet was investigated. The results showed that no release was found in 0.1 N HCl and pH 6.8 phosphate buffers for initial 5 hours and about 98.97% of the drug was released in pH 7.4 phosphate buffer in total 17 hours. The in vitro release profiles of drug from the formulation could be best expressed first order kinetics as highest linearity (r2= 0.9943). The results of the present study have demonstrated that the time and pH dependent tablets system is a promising vehicle for preventing rapid hydrolysis in gastric environment and improving oral bioavailability of Embelin and Gallic acid for treatment of Helminthiasis.Keywords: embelin, gallic acid, Vidangadi Churna, colon targeted drug delivery
Procedia PDF Downloads 360441 Prediction of Antibacterial Peptides against Propionibacterium acnes from the Peptidomes of Achatina fulica Mucus Fractions
Authors: Suwapitch Chalongkulasak, Teerasak E-Kobon, Pramote Chumnanpuen
Abstract:
Acne vulgaris is a common skin disease mainly caused by the Gram–positive pathogenic bacterium, Propionibacterium acnes. This bacterium stimulates inflammation process in human sebaceous glands. Giant African snail (Achatina fulica) is alien species that rapidly reproduces and seriously damages agricultural products in Thailand. There were several research reports on the medical and pharmaceutical benefits of this snail mucus peptides and proteins. This study aimed to in silico predict multifunctional bioactive peptides from A. fulica mucus peptidome using several bioinformatic tools for determination of antimicrobial (iAMPpred), anti–biofilm (dPABBs), cytotoxic (Toxinpred), cell membrane penetrating (CPPpred) and anti–quorum sensing (QSPpred) peptides. Three candidate peptides with the highest predictive score were selected and re-designed/modified to improve the required activities. Structural and physicochemical properties of six anti–P. acnes (APA) peptide candidates were performed by PEP–FOLD3 program and the five aforementioned tools. All candidates had random coiled structure and were named as APA1–ori, APA2–ori, APA3–ori, APA1–mod, APA2–mod and APA3–mod. To validate the APA activity, these peptide candidates were synthesized and tested against six isolates of P. acnes. The modified APA peptides showed high APA activity on some isolates. Therefore, our biomimetic mucus peptides could be useful for preventing acne vulgaris and further examined on other activities important to medical and pharmaceutical applications.Keywords: Propionibacterium acnes, Achatina fulica, peptidomes, antibacterial peptides, snail mucus
Procedia PDF Downloads 133440 Fire and Explosion Consequence Modeling Using Fire Dynamic Simulator: A Case Study
Authors: Iftekhar Hassan, Sayedil Morsalin, Easir A Khan
Abstract:
Accidents involving fire occur frequently in recent times and their causes showing a great deal of variety which require intervention methods and risk assessment strategies are unique in each case. On September 4, 2020, a fire and explosion occurred in a confined space caused by a methane gas leak from an underground pipeline in Baitus Salat Jame mosque during Night (Esha) prayer in Narayanganj District, Bangladesh that killed 34 people. In this research, this incident is simulated using Fire Dynamics Simulator (FDS) software to analyze and understand the nature of the accident and associated consequences. FDS is an advanced computational fluid dynamics (CFD) system of fire-driven fluid flow which solves numerically a large eddy simulation form of the Navier–Stokes’s equations for simulation of the fire and smoke spread and prediction of thermal radiation, toxic substances concentrations and other relevant parameters of fire. This study focuses on understanding the nature of the fire and consequence evaluation due to thermal radiation caused by vapor cloud explosion. An evacuation modeling was constructed to visualize the effect of evacuation time and fractional effective dose (FED) for different types of agents. The results were presented by 3D animation, sliced pictures and graphical representation to understand fire hazards caused by thermal radiation or smoke due to vapor cloud explosion. This study will help to design and develop appropriate respond strategy for preventing similar accidents.Keywords: consequence modeling, fire and explosion, fire dynamics simulation (FDS), thermal radiation
Procedia PDF Downloads 225439 Shariah Guideline on Value-Based Intermediation Implementation in the Light of Maqasid Shariah Analysis
Authors: Muhammad Izzam Bin Mohd Khazar, Ruqayyah Binti Mohamad Ali, Nurul Atiqah Binti Yusri
Abstract:
Value-based intermediation (VBI) has been introduced by Bank Negara Malaysia (BNM) as the next strategic direction and growth driver for Islamic banking institutions. The aim of VBI is to deliver the intended outcome of Shariah through practices, conducts, and offerings that generate positive and sustainable impact to the economy, community and environment which is aligned to Maqasid Shariah in preserving the common interest of society by preventing harm and maximizing benefit. Hence, upon its implementation, VBI will experiment the current Shariah compliance treatment and revolutionise new policies and systems that can meritoriously entrench and convey the objectives of Shariah. However, discussion revolving VBI in the light of Maqasid analysis is still scarce hence further research needs to be undertaken. The idea of implementation of VBI vision into quantifiable Maqasid Shariah measurement is yet to be explored due to the nature of Maqasid that is variable. The contemporary scholars also have different views on the implementation of VBI. This paper aims to discuss on the importance of Maqasid Shariah in the current Islamic finance transactions by providing Shariah index measurement in the application of VBI. This study also intends to explore basic Shariah guidelines and parameters based on the objectives of Shariah; preservation of the five pillars (religion, life, progeny, intellect and wealth) with further elaboration on preservation of wealth under five headings: rawaj (circulation and marketability); wuduh (transparency); hifz (preservation); thabat (durability and tranquillity); and ‘adl (equity and justice). In alignment with these headings, Islamic finance can be innovated for VBI implementation, particularly in Maybank Islamic being a significant leader in the IFI market.Keywords: Islamic Financial Institutions, Maqasid Index, Maqasid Shariah, sustainability, value-based intermediation
Procedia PDF Downloads 168438 Lung HRCT Pattern Classification for Cystic Fibrosis Using a Convolutional Neural Network
Authors: Parisa Mansour
Abstract:
Cystic fibrosis (CF) is one of the most common autosomal recessive diseases among whites. It mostly affects the lungs, causing infections and inflammation that account for 90% of deaths in CF patients. Because of this high variability in clinical presentation and organ involvement, investigating treatment responses and evaluating lung changes over time is critical to preventing CF progression. High-resolution computed tomography (HRCT) greatly facilitates the assessment of lung disease progression in CF patients. Recently, artificial intelligence was used to analyze chest CT scans of CF patients. In this paper, we propose a convolutional neural network (CNN) approach to classify CF lung patterns in HRCT images. The proposed network consists of two convolutional layers with 3 × 3 kernels and maximally connected in each layer, followed by two dense layers with 1024 and 10 neurons, respectively. The softmax layer prepares a predicted output probability distribution between classes. This layer has three exits corresponding to the categories of normal (healthy), bronchitis and inflammation. To train and evaluate the network, we constructed a patch-based dataset extracted from more than 1100 lung HRCT slices obtained from 45 CF patients. Comparative evaluation showed the effectiveness of the proposed CNN compared to its close peers. Classification accuracy, average sensitivity and specificity of 93.64%, 93.47% and 96.61% were achieved, indicating the potential of CNNs in analyzing lung CF patterns and monitoring lung health. In addition, the visual features extracted by our proposed method can be useful for automatic measurement and finally evaluation of the severity of CF patterns in lung HRCT images.Keywords: HRCT, CF, cystic fibrosis, chest CT, artificial intelligence
Procedia PDF Downloads 65437 Real-Time Inventory Management and Operational Efficiency in Manufacturing
Authors: Tom Wanyama
Abstract:
We have developed a weight-based parts inventory monitoring system utilizing the Industrial Internet of Things (IIoT) to enhance operational efficiencies in manufacturing. The system addresses various challenges, including eliminating downtimes caused by stock-outs, preventing human errors in parts delivery and product assembly, and minimizing motion waste by reducing unnecessary worker movements. The system incorporates custom QR codes for simplified inventory tracking and retrieval processes. The generated data serves a dual purpose by enabling real-time optimization of parts flow within manufacturing facilities and facilitating retroactive optimization of stock levels for informed decision-making in inventory management. The pilot implementation at SEPT Learning Factory successfully eradicated data entry errors, optimized parts delivery, and minimized workstation downtimes, resulting in a remarkable increase of over 10% in overall equipment efficiency across all workstations. Leveraging the IIoT features, the system seamlessly integrates information into the process control system, contributing to the enhancement of product quality. This approach underscores the importance of effective tracking of parts inventory in manufacturing to achieve transparency, improved inventory control, and overall profitability. In the broader context, our inventory monitoring system aligns with the evolving focus on optimizing supply chains and maintaining well-managed warehouses to ensure maximum efficiency in the manufacturing industry.Keywords: industrial Internet of things, industrial systems integration, inventory monitoring, inventory control in manufacturing
Procedia PDF Downloads 34436 Cyber Bullying, Online Risks and Parental Mediation: A Comparison between Adolescent Reports and Parent Perceptions in South Africa
Authors: Masa Popovac, Philip Fine
Abstract:
Information and Communication Technologies (ICTs) have altered our social environments, and young people in particular have immersed themselves in the digital age. Despite countless benefits, younger ICT users are being exposed to various online risks such as contact with strangers, viewing of risky content, sending or receiving sexually themed images or comments (i.e. ‘sexting’) as well as cyber bullying. Parents may not be fully aware of the online spaces their children inhabit and often struggle to implement effective mediation strategies. This quantitative study explored (i) three types of online risks (contact risks, content risks and conduct risks), (ii) cyber bullying victimization and perpetration, and (iii) parental mediation among a sample of 689 South African adolescents aged between 12-17 years. Survey data was also collected for 227 of their parents relating to their perceptions of their child’s online experiences. A comparison between adolescent behaviors and parental perceptions was examined on the three variables in the study. Findings reveal various online risk taking behaviors. In terms of contact risks, 56% of adolescents reported having contact with at least one online stranger, with many meeting these strangers in person. Content risks included exposure to harmful information such as websites promoting extreme diets or self-harm as well as inappropriate content: 84% of adolescents had seen violent content and 75% had seen sexual content online. Almost 60% of adolescents engaged in conduct risks such as sexting. Eight online victimization behaviors were examined in the study and 79% of adolescents had at least one of these negative experiences, with a third (34%) defining this experience as cyber bullying. A strong connection between victimization and perpetration was found, with 63% of adolescents being both a victim and perpetrator. Very little parental mediation of ICT use was reported. Inferential statistics revealed that parents consistently underestimated their child’s online risk taking behaviors as well as their cyber bullying victimization and perpetration. Parents also overestimated mediation strategies in the home. The generational gap in the knowledge and use of ICTs is a barrier to effective parental mediation and online safety, since many negative online experiences by adolescents go undetected and can continue for extended periods of time thereby exacerbating the potential psychological and emotional distress. The study highlights the importance of including parents in online safety efforts.Keywords: cyber bullying, online risk behaviors, parental mediation, South Africa
Procedia PDF Downloads 482435 Computational Investigation of Secondary Flow Losses in Linear Turbine Cascade by Modified Leading Edge Fence
Authors: K. N. Kiran, S. Anish
Abstract:
It is well known that secondary flow loses account about one third of the total loss in any axial turbine. Modern gas turbine height is smaller and have longer chord length, which might lead to increase in secondary flow. In order to improve the efficiency of the turbine, it is important to understand the behavior of secondary flow and device mechanisms to curtail these losses. The objective of the present work is to understand the effect of a stream wise end-wall fence on the aerodynamics of a linear turbine cascade. The study is carried out computationally by using commercial software ANSYS CFX. The effect of end-wall on the flow field are calculated based on RANS simulation by using SST transition turbulence model. Durham cascade which is similar to high-pressure axial flow turbine for simulation is used. The aim of fencing in blade passage is to get the maximum benefit from flow deviation and destroying the passage vortex in terms of loss reduction. It is observed that, for the present analysis, fence in the blade passage helps reducing the strength of horseshoe vortex and is capable of restraining the flow along the blade passage. Fence in the blade passage helps in reducing the under turning by 70 in comparison with base case. Fence on end-wall is effective in preventing the movement of pressure side leg of horseshoe vortex and helps in breaking the passage vortex. Computations are carried for different fence height whose curvature is different from the blade camber. The optimum fence geometry and location reduces the loss coefficient by 15.6% in comparison with base case.Keywords: boundary layer fence, horseshoe vortex, linear cascade, passage vortex, secondary flow
Procedia PDF Downloads 349434 Modifying Cardiometabolic Disease Risk Factors in Urban Primary School Children: Three Different Exercise Interventions
Authors: Anneke Van Biljon
Abstract:
Background: Exercise is a primary form of preventing and improving cardiometabolic disease risk factors; however specific exercise variables and their associated health benefits in children are inconclusive. A preliminary study revealed that different exercise variables may improve particular cardiometabolic health benefits. Objectives: This study further investigated the specific cardiometabolic health benefits associated with three isocaloric exercise interventions set at different intensities. Methods: Hundred-and-twenty (n = 120) participants between the ages of 10 – 14 years old were assigned to four different study groups 1. High intensity interval training (HIIT) at > 80% MHR 2. Moderate intensity continuous training (MICT) at 65% – 70% MHR 3. Alternative intensities (ALT) of HIIT and MICT 4. Control group. Exercise interventions were designed to generate isocaloric workloads of ~154.77 kcal per session, three times per week for five weeks. The one-way ANOVA test established comparisons between group means. Post hoc tests were calculated to determine specific group differences. Results: Although, all exercise groups improved cardiometabolic health, the MICT group showed greater improvements in fasting glucose (-9.30%), whereas cardiorespiratory fitness increased most by 31.33% (p = 0.000) within the HIIT group. Finally, ALT group recorded overall superior and additional cardiometabolic health benefits compared with both MICT and HIIT groups. Conclusion: The findings of this study indicate that superior benefits may be elicited when combining and alternating MICT and HIIT. These results provide specific exercise recommendations for achieving optimal and substantial cardiometabolic health benefits in children which will contribute towards achieving the health-related Sustainable Development Goals for 2030.Keywords: cardiometabolic disease risk factors, exercise, pediatrics, interventions
Procedia PDF Downloads 248433 Treating On-Demand Bonds as Cash-In-Hand: Analyzing the Use of “Unconscionability” as a Ground for Challenging Claims for Payment under On-Demand Bonds
Authors: Asanga Gunawansa, Shenella Fonseka
Abstract:
On-demand bonds, also known as unconditional bonds, are commonplace in the construction industry as a means of safeguarding the employer from any potential non-performance by a contractor. On-demand bonds may be obtained from commercial banks, and they serve as an undertaking by the issuing bank to honour payment on demand without questioning and/or considering any dispute between the employer and the contractor in relation to the underlying contract. Thus, whether or not a breach had occurred under the underlying contract, which triggers the demand for encashment by the employer, is not a question the bank needs to be concerned with. As a result, an unconditional bond allows the beneficiary to claim the money almost without any condition. Thus, an unconditional bond is as good as cash-in-hand. In the past, establishing fraud on the part of the employer, of which the bank had knowledge, was the only ground on which a bank could dishonour a claim made under an on-demand bond. However, recent jurisprudence in common law countries shows that courts are beginning to consider unconscionable conduct on the part of the employer in claiming under an on-demand bond as a ground that contractors could rely on the prevent the banks from honouring such claims. This has created uncertainty in connection with on-demand bonds and their liquidity. This paper analyzes recent judicial decisions in four common law jurisdictions, namely, England, Singapore, Hong Kong, and Sri Lanka, to identify the scope of using the concept of “unconscionability” as a ground for preventing unreasonable claims for encashment of on-demand bonds. The objective of this paper is to argue that on-demand bonds have lost their effectiveness as “cash-in-hand” and that this is, in fact, an advantage and not an impediment to international commerce, as the purpose of such bonds should not be to provide for illegal and unconscionable conduct by the beneficiaries.Keywords: fraud, performance guarantees, on-demand bonds, unconscionability
Procedia PDF Downloads 105432 Osteoprotective Effect of Lawsonia inermis
Authors: Suraj Muke, Vikas Mankumare, Sadhana Sathaye
Abstract:
Osteoporosis is the most common metabolic bone disease which affects an estimated 25 million people worldwide, leading to 1 million fractures, 40,000 annual deaths and health costs of billions of dollars. It is estimated that about 80% of total osteoporosis patients are women, amongst which majority are above the age of 45 years. Postmenopausal osteoporosis is associated with lack of intestinal calcium absorption, increasing pro-oxidant and inflammatory mediators. Lawsonia inermis is a biennial dicotyledonous herbaceous shrub is reported to possess a high flavonoid, high phenolic and Inhibitors of osteoclastogenesis like Daphneside and Daphnorin. The present study aimed to screen osteoprotective effect of methanolic extract of Lawsonia inermis (LIM) in rat model along with its antioxidant activity. LIM shows phenolic content 146.3Milligrams of Gallic acid equivalent present per gram of extract and 19.8 Milligrams of rutin per gram of extract of Total flavonoid content with IC50 value 42.99μg/ml. bilateral ovariectomized rat model in which Healthy female wistar rats were used for screening. Treatment with LIM was carried out using graded doses of 25mg/kg, 50mg/kg and 100mg/kg for period of 28 days. The negative control group comprised of ovariectomized rats along with saline treatment for four weeks whereas sham operated rats were used as positive control.LIM showed a decrease in bone turnover by preventing loss of urinary calcium and phosphorous moreover it decreased the alkaline phosphatase levels and loss of bone density is prevented by LIM suggesting decrease in osteoclast activity.Keywords: antioxidant, osteoclast, osteoporosis, ovariectomized
Procedia PDF Downloads 407431 Between Efficacy and Danger: Narratives of Female University Students about Emergency Contraception Methods
Authors: Anthony Idowu Ajayi, Ezebunwa Ethelbert Nwokocha, Wilson Akpan, Oladele Vincent Adeniyi
Abstract:
Studies on emergency contraception (EC) mostly utilise quantitative methods and focus on medically approved drugs for the prevention of unwanted pregnancies. This methodological bias necessarily obscures insider perspectives on sexual behaviour, particularly on why specific methods are utilized by women who seek to prevent unplanned pregnancies. In order to privilege this perspective, with a view to further enriching the discourse and policy on the prevention and management of unplanned pregnancies, this paper brings together the findings from several focus groups and in-depth interviews conducted amongst unmarried female undergraduate students in two Nigerian universities. The study found that while the research participants had good knowledge of the consequences of unprotected sexual intercourses - with abstinence and condom widely used - participants’ willingness to rely only on medically sound measures to prevent unwanted pregnancies was not always mediated by such knowledge. Some of the methods favored by participants appeared to be those commonly associated with people of low socio-economic status in the society where the study was conducted. Medically unsafe concoctions, some outright dangerous, were widely believed to be efficacious in preventing unwanted pregnancy. Furthermore, respondents’ narratives about their sexual behaviour revealed that inadequate sex education, socio-economic pressures, and misconceptions about the efficacy of “crude” emergency contraception methods were all interrelated. The paper therefore suggests that these different facets of the unplanned pregnancy problem should be the focus of intervention.Keywords: unplanned pregnancy, unsafe abortion, emergency contraception, concoctions
Procedia PDF Downloads 424430 Problem Solving Courts for Domestic Violence Offenders: Duluth Model Application in Spanish-Speaking Offenders
Authors: I. Salas-Menotti
Abstract:
Problem-solving courts were created to assist offenders with specific needs that were not addressed properly in traditional courts. Problem-solving courts' main objective is to pursue solutions that will benefit the offender, the victim, and society as well. These courts were developed as an innovative response to deal with issues such as drug abuse, mental illness, and domestic violence. In Brooklyn, men who are charged with domestic violence related offenses for the first time are offered plea bargains that include the attendance to a domestic abuse intervention program as a condition to dismiss the most serious charges and avoid incarceration. The desired outcome is that the offender will engage in a program that will modify his behavior avoiding new incidents of domestic abuse, it requires accountability towards the victim and finally, it will hopefully bring down statistic related to domestic abuse incidents. This paper will discuss the effectiveness of the Duluth model as applied to Spanish-speaking men mandated to participate in the program by the specialized domestic violence courts in Brooklyn. A longitudinal study was conducted with 243 Spanish- speaking men who were mandated to participated in the men's program offered by EAC in Brooklyn in the years 2016 through 2018 to determine the recidivism rate of domestic violence crimes. Results show that the recidivism rate was less than 5% per year after completing the program which indicates that the intervention is effective in preventing new abuse allegations and subsequent arrests. It's recommended that comparative study with English-speaking participants is conducted to determine cultural and language variables affecting the program's efficacy.Keywords: domestic violence, domestic abuse intervention programs, Problem solving courts, Spanish-speaking offenders
Procedia PDF Downloads 132429 Technical Aspects of Closing the Loop in Depth-of-Anesthesia Control
Authors: Gorazd Karer
Abstract:
When performing a diagnostic procedure or surgery in general anesthesia (GA), a proper introduction and dosing of anesthetic agents are one of the main tasks of the anesthesiologist. However, depth of anesthesia (DoA) also seems to be a suitable process for closed-loop control implementation. To implement such a system, one must be able to acquire the relevant signals online and in real-time, as well as stream the calculated control signal to the infusion pump. However, during a procedure, patient monitors and infusion pumps are purposely unable to connect to an external (possibly medically unapproved) device for safety reasons, thus preventing closed-loop control. The paper proposes a conceptual solution to the aforementioned problem. First, it presents some important aspects of contemporary clinical practice. Next, it introduces the closed-loop-control-system structure and the relevant information flow. Focusing on transferring the data from the patient to the computer, it presents a non-invasive image-based system for signal acquisition from a patient monitor for online depth-of-anesthesia assessment. Furthermore, it introduces a UDP-based communication method that can be used for transmitting the calculated anesthetic inflow to the infusion pump. The proposed system is independent of a medical device manufacturer and is implemented in Matlab-Simulink, which can be conveniently used for DoA control implementation. The proposed scheme has been tested in a simulated GA setting and is ready to be evaluated in an operating theatre. However, the proposed system is only a step towards a proper closed-loop control system for DoA, which could routinely be used in clinical practice.Keywords: closed-loop control, depth of anesthesia (DoA), modeling, optical signal acquisition, patient state index (PSi), UDP communication protocol
Procedia PDF Downloads 217428 Economic and Financial Crime, Forensic Accounting and Sustainable Developments Goals (SDGs). Bibliometric Analysis
Authors: Monica Violeta Achim, Sorin Nicolae Borlea
Abstract:
This aim of this work is to stress the needs for enhancing the role of forensic accounting in fighting economic and financial crime, in the context of the new international regulation movements in this area enhanced by the International Federation of Accountants (IFAC). Corruption, money laundering, tax evasion and other frauds significant hamper the economic growth and human development and, ultimately, the UN Sustainable Development Goals. The present paper also stresses the role of good governance in fighting the frauds, in order to achieve the most suitable sustainable development of the society. In this view, we made a bibliometric systematic review on forensic accounting and its contribution towards fraud detection and prevention and theirs relationship with good governance and Sustainable Developments Goals (SDGs). In this view, two powerful bibliometric visual software tools, VosViewer and CiteSpace are used in order to analyze published papers identifies in Scopus and Web of Science databases over the time. Our findings reveal the main red flags identified in literature as used tools by forensic accounting, the evolution in time of the interest of the topic, the distribution in space among world countries and connectivity with patterns of a good governance. Visual designs and scientific maps are useful to show these findings, in a visual way. Our findings are useful for managers and policy makers to provide important avenues that may help in reaching the 2030 Agenda for Sustainable Development, adopted by all United Nations Member States in 2015, in the area of using forensic accounting in preventing frauds.Keywords: forensic accounting, frauds, red flags, SDGs
Procedia PDF Downloads 139427 Ending Communal Conflicts in Africa: The Relevance of Traditional Approaches to Conflict Resolution
Authors: Kindeye Fenta Mekonnen, Alagaw Ababu Kifle
Abstract:
The failure of international responses to armed conflict to address local preconditions for national stability has recently attracted what has been called the ‘local turn’ in peace building. This ‘local turn’ in peace building amplified a renewed interest in traditional/indigenous methods of conflict resolution, a field that has been hitherto dominated by anthropologists with their focus on the procedures and rituals of such approaches. This notwithstanding, there is still limited empirical work on the relevance of traditional methods of conflict resolution to end localized conflicts vis-à-vis hybrid and modern approaches. The few exceptions to this generally draw their conclusion from very few (almost all successful) cases that make it difficult to judge the validity and cross-case application of their results. This paper seeks to fill these gaps by undertaking a quantitative analysis of the trend and applications of different communal conflict resolution initiatives, their potential to usher in long-term peace, and the extent to which their outcomes are influenced by the intensity and scope of a conflict. The paper makes the following three tentative conclusions. First, traditional mechanisms and traditional actors still dominate the communal conflict resolution landscape, either individually or in combination with other methods. Second, traditional mechanisms of conflict resolution tend to be more successful in ending a conflict and preventing its re-occurrence compared to hybrid and modern arrangements. This notwithstanding and probably due to the scholarly call for local turn in peace building, contemporary communal conflict resolution approaches are becoming less and less reliant on traditional mechanisms alone and (therefore) less effective. Third, there is yet inconclusive evidence on whether hybridization is an asset or a liability in the resolution of communal conflicts and the extent to which this might be mediated by the intensity of a conflict.Keywords: traditional conflict resolution, hybrid conflict resolution, communal conflict, relevance, conflict intensity
Procedia PDF Downloads 82426 Inhibitory Activity of Lactic Acid Bacteria on the Growth and Biogenic Amines Production by Foodborne Pathogens and Food Spoilage Bacteria
Authors: Abderrezzak khatib
Abstract:
Biogenic amines are low molecular weight nitrogenous compounds that have the potential to accumulate in food, posing a significant risk to food safety and human health. In this study, we investigated the inhibitory activity of three strains of lactic acid bacteria (LAB), against the growth and production of biogenic amines by both foodborne pathogens and food spoilage bacteria. The foodborne pathogens studied included Staphylococcus aureus, Pseudomonas aeruginosa, and Salmonella Paratyphi, while the food spoilage bacteria comprised Enterobacter cloacae and Proteus mirabilis. The methodology involved bacterial growth determination in petri dishes, bacterial culture extraction and derivatization, and biogenic amine analysis using HPLC. Our findings revealed that the inhibitory effects of LAB on these pathogens varied, with all three LAB strains demonstrating a remarkable reduction in the total bacterial count when combined with most pathogens, compared to the individual cultures of the pathogens. Furthermore, the presence of LAB in co-cultures with the pathogens resulted in a significant decrease in the production of tyramine and other biogenic amines by the pathogens themselves. These results suggest that LAB strains hold considerable promise in preventing the accumulation of biogenic amines in food products, thereby enhancing food safety. This study provides insights into the potential utilization of LAB in the context of preserving and ensuring the safety of food products. It highlights the significance of conducting additional research endeavors to elucidate the underlying mechanisms involved and to identify the precise bioactive compounds that are responsible for the observed inhibitory effects.Keywords: food safety, lactic acid bacteria, foodborne pathogens, food spoilage bacteria, biogenic amines, tyrosine
Procedia PDF Downloads 55425 Green Design Study of Prefabricated Community Control Measures in Response to Public Health Emergencies
Authors: Enjia Zhang
Abstract:
During the prevention and control of the COVID-19 pandemic, all communities in China were gated and under strict management, which was highly effective in preventing the spread of the epidemic from spreading. Based on the TRIZ theory, this paper intends to propose green design strategies of community control in response to public health emergencies and to optimize community control facilities according to the principle of minimum transformation. Through the questionnaire method, this paper investigates and summarizes the situation and problems of community control during the COVID-19 pandemic. Based on these problems, the TRIZ theory is introduced to figure out the problems and associates them with prefabricated facilities. Afterward, the innovation points and solutions of prefabricated community control measures are proposed by using the contradiction matrix. This paper summarizes the current situation of community control under public health emergencies and concludes the problems such as simple forms of temporary roadblocks, sudden increase of community traffic pressure, and difficulties to access public spaces. The importance of entrance and exit control in community control is emphasized. Therefore, the community control measures are supposed to focus on traffic control, and the external access control measures, including motor vehicles, non-motor vehicles, residents and non-residents access control, and internal public space access control measures, including public space control shared with the society or adjacent communities, are proposed in order to make the community keep the open characteristics and have the flexibility to deal with sudden public health emergencies in the future.Keywords: green design, community control, prefabricated structure, public health emergency
Procedia PDF Downloads 129424 Linking Metabolism, Pluripotency and Epigenetic Changes during Early Differentiation of Embryonic Stem Cells
Authors: Arieh Moussaieff, Bénédicte Elena-Herrmann, Yaakov Nahmias, Daniel Aberdam
Abstract:
Differentiation of pluripotent stem cells is a slow process, marked by the gradual loss of pluripotency factors over days in culture. While the first few days of differentiation show minor changes in the cellular transcriptome, intracellular signaling pathways remain largely unknown. Recently, several groups demonstrated that the metabolism of pluripotent mouse and human cells is different from that of somatic cells, showing a marked increase in glycolysis previously identified in cancer as the Warburg effect. Here, we sought to identify the earliest metabolic changes induced at the first hours of differentiation. High-resolution NMR analysis identified 35 metabolites and a distinct, gradual transition in metabolism during early differentiation. Metabolic and transcriptional analyses showed the induction of glycolysis toward acetate and acetyl-coA in pluripotent cells, and an increase in cholesterol biosynthesis during early differentiation. Importantly, this metabolic pathway regulated differentiation of human and mouse embryonic stem cells. Acetate delayed differentiation preventing differentiation-induced histone de-acetylation in a dose-dependent manner. Glycolytic inhibitors upstream of acetate caused differentiation of pluripotent cells, while those downstream delayed differentiation. Our data suggests that a rapid loss of glycolysis in early differentiation down-regulates acetate and acetyl-coA production, causing a loss of histone acetylation and concomitant loss of pluripotency. It demonstrate that pluripotent stem cells utilize a novel metabolism pathway to maintain pluripotency through acetate/acetyl-coA and highlights the important role metabolism plays in pluripotency and early differentiation of stem cells.Keywords: pluripotency, metabolomics, epigenetics, acetyl-coA
Procedia PDF Downloads 470423 Dermatological Study on Risk Factors for Pruritic Skin: Skin Properties of Elderly
Authors: Dianis Wulan Sari, Takeo Minematsu, Mikako Yoshida, Hiromi Sanada
Abstract:
Introduction: Pruritus is diagnosed as itching without macroscopic abnormalities on skin. It is the most skin complaint of elderly people. In the present study, we conducted a dermatological study to examine the risk factors of pruritic skin and predicted how to prevent pruritus especially in the elderly population. Pruritus is caused several types of inflammation, including epidermal innate immunity based on keratinocyte responses and acquired immunity regulated by type 1 or 2 helper T (Th) cells. The triggers of pruritus differ among inflammation types, therefore we did separately assess the pruritus-associated factors of each inflammation type in an effort to contribute to the identification of intervention targets for preventing pruritus. Therefore, this study aimed to investigate the factors related with actual condition of pruritic skin by examine the skin properties. Method: This study was conducted in elderly population of Indonesian nursing home. Basic characteristics and behaviors were obtained by interview. The properties of pruritic skin were collected by examination of skin biomarker using skin blotting as novel method of non-invasive skin assessment method and examination of skin barrier function using stratum corneum hydration and skin pH. Result: The average age of participants was 74 years with independent status was 66.8%. Age (β = -0.130, p = 0.044), cumulative lifetime sun exposure (β = 0.145, p = 0.026), bathing duration (β = 0.151, p = 0.022), clothing change frequency (β = 0.135, p = 0.029), and clothing type (β = -0.139, p = 0.021) were risk factors of pruritic skin in multivariate analysis. Conclusion: Risk factors of pruritic skin in elderly population were caused by internal factors such as skin senescence and external factors such as sun exposure, hygiene care and skin care behavior.Keywords: aging, hygiene care, pruritus, skin care, sun exposure
Procedia PDF Downloads 225422 Reduced Glycaemic Impact by Kiwifruit-Based Carbohydrate Exchanges Depends on Both Available Carbohydrate and Non-Digestible Fruit Residue
Authors: S. Mishra, J. Monro, H. Edwards, J. Podd
Abstract:
When a fruit such as kiwifruit is consumed its tissues are released from the physical /anatomical constraints existing in the fruit. During digestion they may expand several-fold to achieve a hydrated solids volume far greater than the original fruit, and occupy the available space in the gut, where they surround and interact with other food components. Within the cell wall dispersion, in vitro digestion of co-consumed carbohydrate, diffusion of digestion products, and mixing responsible for mass transfer of nutrients to the gut wall for absorption, were all retarded. All of the foregoing processes may be involved in the glycaemic response to carbohydrate foods consumed with kiwifruit, such as breakfast cereal. To examine their combined role in reducing the glycaemic response to wheat cereal consumed with kiwifruit we formulated diets containing equal amounts of breakfast cereal, with the addition of either kiwifruit, or sugars of the same composition and quantity as in kiwifruit. Therefore, the only difference between the diets was the presence of non-digestible fruit residues. The diet containing the entire disperse kiwifruit significantly reduced the glycaemic response amplitude and the area under the 0-120 min incremental blood glucose response curve (IAUC), compared with the equicarbohydrate diet containing the added kiwifruit sugars. It also slightly but significantly increased the 120-180 min IAUC by preventing a postprandial overcompensation, indicating improved homeostatic blood glucose control. In a subsequent study in which we used kiwifruit in a carbohydrate exchange format, in which the kiwifruit carbohydrate partially replaced breakfast cereal in equal carbohydrate meals, the blood glucose was further reduced without a loss of satiety, and with a reduction in insulin demand. The results show that kiwifruit may be a valuable component in low glycaemic impact diets.Keywords: carbohydrate, digestion, glycaemic response, kiwifruit
Procedia PDF Downloads 495