Search results for: user guidance
2402 Protection of Patients and Staff in External Beam Radiotherapy Using Linac in Kenya
Authors: Calvince Okome Odeny
Abstract:
There is a current action to increase radiotherapy services in Kenya. The National government of Kenya, in collaboration with the county governments, has embarked on building radiotherapy centers in all 47 regions of the country. As these new centers are established in Kenya, it has to be ensured that minimum radiation safety standards are in place prior to operation. For full implementation of this, it is imperative that more Research and training for regulators are done on radiation protection, and safety and national regulatory infrastructure is geared towards ensuring radiation protection and safety in all aspects of the use of external radiotherapy practices. The present work aims at reviewing the level of protection and safety for patients and staff during external beam radiotherapy using Linac in Kenya and provides relevant guidance to improve protection and safety. A retrospective evaluation was done to verify whether those occupationally exposed workers and patients are adequately protected from the harmful effect of radiation exposure during the treatment procedures using Linac. The project was experimental Research, also including an analysis of resource documents obtained from the literature and international organizations. The critical findings of the work revealed that the key elements of protection of occupationally exposed workers and patients include a comprehensive quality Management system governing all planned activities from siting, safety, and design of the Facility, construction, acceptance testing, commissioning, operation, and decommissioning of the Facility; Government empowering the Regulatory Authority to license Medical Linear facilities and to enforce the applicable regulations to ensure adequate protection; A comprehensive Radiation Protection and Safety program must be established to ensure adequate safety and protection of workers and patients during treatment planning and treatment delivery of patients and categories of staff associated with the Facility must be well educated and trained to perform professionally with a commitment to sound safety culture. Relevant recommendations from the findings are shared with the Medical Linear Accelerator facilities and the regulatory authority to provide guidance and continuous improvement of protection and safety to improve regulatory oversight.Keywords: oncology, radiotherapy, protection, staff
Procedia PDF Downloads 752401 Tibyan Automated Arabic Correction Using Machine-Learning in Detecting Syntactical Mistakes
Authors: Ashwag O. Maghraby, Nida N. Khan, Hosnia A. Ahmed, Ghufran N. Brohi, Hind F. Assouli, Jawaher S. Melibari
Abstract:
The Arabic language is one of the most important languages. Learning it is so important for many people around the world because of its religious and economic importance and the real challenge lies in practicing it without grammatical or syntactical mistakes. This research focused on detecting and correcting the syntactic mistakes of Arabic syntax according to their position in the sentence and focused on two of the main syntactical rules in Arabic: Dual and Plural. It analyzes each sentence in the text, using Stanford CoreNLP morphological analyzer and machine-learning approach in order to detect the syntactical mistakes and then correct it. A prototype of the proposed system was implemented and evaluated. It uses support vector machine (SVM) algorithm to detect Arabic grammatical errors and correct them using the rule-based approach. The prototype system has a far accuracy 81%. In general, it shows a set of useful grammatical suggestions that the user may forget about while writing due to lack of familiarity with grammar or as a result of the speed of writing such as alerting the user when using a plural term to indicate one person.Keywords: Arabic language acquisition and learning, natural language processing, morphological analyzer, part-of-speech
Procedia PDF Downloads 1522400 Analysis the Impacts of WeChat Mobile Payment in China Teens' Online Purchasing Behaviors
Authors: Lok Yi Joyce Poon
Abstract:
China's mobile payment market has boomed in the past few years. WeChat (Chinese name as Weixin) owned by Tencent is known as the fastest growing all-in-one social messaging platforms. The company has launched the WeChat Pay in 2013, in which users can link their credit card to their user account and make payments within the app’s built in digital wallet. WeChat Payment is a one-stop payment tool that can provide a seamless online experience for the shoppers to transfer money between WeChat users (peer-to-peer) and make payments online by scanning a QR code, a prominent facilitator for transactions in WeChat, to complete the payment with the app without directing the users to the external websites. The aims of this study are to examine the effectiveness of WeChat mobile payment in China as well as the impacts of the China teen’s online purchasing behavior since the establishment of WeChat Payment. The research method of this study is conducted by both online survey on Sojump, a popular online survey platform in China. A total of 120 respondents among 18 to 25 teens in China completed the survey. Data sources included participants’ response to an end-of-session questionnaire, encompassing with the types of multiple choice, open-ended questions. To have an in-depth analysis, a face-to-face interview with a Chinese teen who is a frequent user of the WeChat Pay. The main finding of the study shows that the majority of the teenagers frequently use the WeChat payment tool because of its convenience, user-friendliness and the scenarios offered within the WeChat Wallet. The respondents claimed that they will settle the bills in their daily lives via WeChat Pay. However, the respondents in the age group of 40 or above will not use the WeChat Pay due to the security concern and they do not see the app as a platform for commercial activities like online shopping. Throughout the study, it is recommended WeChat should put more efforts on the security issue and improve the payment technology by adopting the near-field communication terminals instead of requiring users to scan QR codes before they complete the transaction.Keywords: digital wallet, mobile payment, online purchasing behavior, WeChat Pay
Procedia PDF Downloads 3932399 Neighbour Cell List Reduction in Multi-Tier Heterogeneous Networks
Authors: Mohanad Alhabo, Naveed Nawaz
Abstract:
The ongoing call or data session must be maintained to ensure a good quality of service. This can be accomplished by performing the handover procedure while the user is on the move. However, the dense deployment of small cells in 5G networks is a challenging issue due to the extensive number of handovers. In this paper, a neighbour cell list method is proposed to reduce the number of target small cells and hence minimizing the number of handovers. The neighbour cell list is built by omitting cells that could cause an unnecessary handover and handover failure because of short time of stay of the user in these cells. A multi-attribute decision making technique, simple additive weighting, is then applied to the optimized neighbour cell list. Multi-tier small cells network is considered in this work. The performance of the proposed method is analysed and compared with that of the existing methods. Results disclose that our method has decreased the candidate small cell list, unnecessary handovers, handover failure, and short time of stay cells compared to the competitive method.Keywords: handover, HetNets, multi-attribute decision making, small cells
Procedia PDF Downloads 1192398 A New DIDS Design Based on a Combination Feature Selection Approach
Authors: Adel Sabry Eesa, Adnan Mohsin Abdulazeez Brifcani, Zeynep Orman
Abstract:
Feature selection has been used in many fields such as classification, data mining and object recognition and proven to be effective for removing irrelevant and redundant features from the original data set. In this paper, a new design of distributed intrusion detection system using a combination feature selection model based on bees and decision tree. Bees algorithm is used as the search strategy to find the optimal subset of features, whereas decision tree is used as a judgment for the selected features. Both the produced features and the generated rules are used by Decision Making Mobile Agent to decide whether there is an attack or not in the networks. Decision Making Mobile Agent will migrate through the networks, moving from node to another, if it found that there is an attack on one of the nodes, it then alerts the user through User Interface Agent or takes some action through Action Mobile Agent. The KDD Cup 99 data set is used to test the effectiveness of the proposed system. The results show that even if only four features are used, the proposed system gives a better performance when it is compared with the obtained results using all 41 features.Keywords: distributed intrusion detection system, mobile agent, feature selection, bees algorithm, decision tree
Procedia PDF Downloads 4082397 Interactive Glare Visualization Model for an Architectural Space
Authors: Florina Dutt, Subhajit Das, Matthew Swartz
Abstract:
Lighting design and its impact on indoor comfort conditions are an integral part of good interior design. Impact of lighting in an interior space is manifold and it involves many sub components like glare, color, tone, luminance, control, energy efficiency, flexibility etc. While other components have been researched and discussed multiple times, this paper discusses the research done to understand the glare component from an artificial lighting source in an indoor space. Consequently, the paper discusses a parametric model to convey real time glare level in an interior space to the designer/ architect. Our end users are architects and likewise for them it is of utmost importance to know what impression the proposed lighting arrangement and proposed furniture layout will have on indoor comfort quality. This involves specially those furniture elements (or surfaces) which strongly reflect light around the space. Essentially, the designer needs to know the ramification of the ‘discomfortable glare’ at the early stage of design cycle, when he still can afford to make changes to his proposed design and consider different routes of solution for his client. Unfortunately, most of the lighting analysis tools that are present, offer rigorous computation and analysis on the back end eventually making it challenging for the designer to analyze and know the glare from interior light quickly. Moreover, many of them do not focus on glare aspect of the artificial light. That is why, in this paper, we explain a novel approach to approximate interior glare data. Adding to that we visualize this data in a color coded format, expressing the implications of their proposed interior design layout. We focus on making this analysis process very fluid and fast computationally, enabling complete user interaction with the capability to vary different ranges of user inputs adding more degrees of freedom for the user. We test our proposed parametric model on a case study, a Computer Lab space in our college facility.Keywords: computational geometry, glare impact in interior space, info visualization, parametric lighting analysis
Procedia PDF Downloads 3502396 Analysis of Spamming Threats and Some Possible Solutions for Online Social Networking Sites (OSNS)
Authors: Dilip Singh Sisodia, Shrish Verma
Abstract:
Spamming is the most common issue seen nowadays in the Internet especially in Online Social Networking Sites (like Facebook, Twitter, and Google+ etc.). Spam messages keep wasting Internet bandwidth and the storage space of servers. On social network sites; spammers often disguise themselves by creating fake accounts and hijacking user’s accounts for personal gains. They behave like normal user and they continue to change their spamming strategy. To prevent this, most modern spam-filtering solutions are deployed on the receiver side; they are good at filtering spam for end users. In this paper we are presenting some spamming techniques their behaviour and possible solutions. We have analyzed how Spammers enters into online social networking sites (OSNSs) and how they target it and the techniques they use for it. The five discussed techniques of spamming techniques which are clickjacking, social engineered attacks, cross site scripting, URL shortening, and drive by download. We have used elgg framework for demonstration of some of spamming threats and respective implementation of solutions.Keywords: online social networking sites, spam, attacks, internet, clickjacking / likejacking, drive-by-download, URL shortening, networking, socially engineered attacks, elgg framework
Procedia PDF Downloads 3482395 PsyVBot: Chatbot for Accurate Depression Diagnosis using Long Short-Term Memory and NLP
Authors: Thaveesha Dheerasekera, Dileeka Sandamali Alwis
Abstract:
The escalating prevalence of mental health issues, such as depression and suicidal ideation, is a matter of significant global concern. It is plausible that a variety of factors, such as life events, social isolation, and preexisting physiological or psychological health conditions, could instigate or exacerbate these conditions. Traditional approaches to diagnosing depression entail a considerable amount of time and necessitate the involvement of adept practitioners. This underscores the necessity for automated systems capable of promptly detecting and diagnosing symptoms of depression. The PsyVBot system employs sophisticated natural language processing and machine learning methodologies, including the use of the NLTK toolkit for dataset preprocessing and the utilization of a Long Short-Term Memory (LSTM) model. The PsyVBot exhibits a remarkable ability to diagnose depression with a 94% accuracy rate through the analysis of user input. Consequently, this resource proves to be efficacious for individuals, particularly those enrolled in academic institutions, who may encounter challenges pertaining to their psychological well-being. The PsyVBot employs a Long Short-Term Memory (LSTM) model that comprises a total of three layers, namely an embedding layer, an LSTM layer, and a dense layer. The stratification of these layers facilitates a precise examination of linguistic patterns that are associated with the condition of depression. The PsyVBot has the capability to accurately assess an individual's level of depression through the identification of linguistic and contextual cues. The task is achieved via a rigorous training regimen, which is executed by utilizing a dataset comprising information sourced from the subreddit r/SuicideWatch. The diverse data present in the dataset ensures precise and delicate identification of symptoms linked with depression, thereby guaranteeing accuracy. PsyVBot not only possesses diagnostic capabilities but also enhances the user experience through the utilization of audio outputs. This feature enables users to engage in more captivating and interactive interactions. The PsyVBot platform offers individuals the opportunity to conveniently diagnose mental health challenges through a confidential and user-friendly interface. Regarding the advancement of PsyVBot, maintaining user confidentiality and upholding ethical principles are of paramount significance. It is imperative to note that diligent efforts are undertaken to adhere to ethical standards, thereby safeguarding the confidentiality of user information and ensuring its security. Moreover, the chatbot fosters a conducive atmosphere that is supportive and compassionate, thereby promoting psychological welfare. In brief, PsyVBot is an automated conversational agent that utilizes an LSTM model to assess the level of depression in accordance with the input provided by the user. The demonstrated accuracy rate of 94% serves as a promising indication of the potential efficacy of employing natural language processing and machine learning techniques in tackling challenges associated with mental health. The reliability of PsyVBot is further improved by the fact that it makes use of the Reddit dataset and incorporates Natural Language Toolkit (NLTK) for preprocessing. PsyVBot represents a pioneering and user-centric solution that furnishes an easily accessible and confidential medium for seeking assistance. The present platform is offered as a modality to tackle the pervasive issue of depression and the contemplation of suicide.Keywords: chatbot, depression diagnosis, LSTM model, natural language process
Procedia PDF Downloads 682394 Evaluating Accessibility to Bangkok Mass Transit System: Case Study of Saphan Taksin BTS Station
Authors: Rungpansa Noichan, Bart Julien Dewancker
Abstract:
Access to the mass transit system, including rapid elevated and underground transport has become an outstanding issue for many cities. The mass transit access development should focus on behavioral responses of the different passenger groups. Moreover, it should consider about the appearance of intent-oriented action related accessibility that was explored from user’s satisfaction and attitudes related to services quality. This study aims to evaluate mass transit accessibility from passenger’s satisfaction, therefore, understanding the passenger’s attitudes about mass transit accessibility. The study area of this research is Bangkok Mass Transit system (BTS Skytrain) at Saphan Taksin station. 200 passengers at Saphan Taksin station were asked to rate the questionnaires survey that considers accessibility aspects of convenience, safety, feeder connectivity, and other dimensions. The survey was to find out the passenger attitudes and satisfaction for access to the BTS station, and the result shows several factors that influence the passenger choice of using the BTS as a public transportation mode and passenger’s opinion that needs to concern for the development mass transit system and accessibility performance.Keywords: urban transportation, user satisfaction, accessibility, Bangkok mass transit
Procedia PDF Downloads 2682393 A General Framework for Knowledge Discovery Using High Performance Machine Learning Algorithms
Authors: S. Nandagopalan, N. Pradeep
Abstract:
The aim of this paper is to propose a general framework for storing, analyzing, and extracting knowledge from two-dimensional echocardiographic images, color Doppler images, non-medical images, and general data sets. A number of high performance data mining algorithms have been used to carry out this task. Our framework encompasses four layers namely physical storage, object identification, knowledge discovery, user level. Techniques such as active contour model to identify the cardiac chambers, pixel classification to segment the color Doppler echo image, universal model for image retrieval, Bayesian method for classification, parallel algorithms for image segmentation, etc., were employed. Using the feature vector database that have been efficiently constructed, one can perform various data mining tasks like clustering, classification, etc. with efficient algorithms along with image mining given a query image. All these facilities are included in the framework that is supported by state-of-the-art user interface (UI). The algorithms were tested with actual patient data and Coral image database and the results show that their performance is better than the results reported already.Keywords: active contour, bayesian, echocardiographic image, feature vector
Procedia PDF Downloads 4202392 Water Repellent Finishing of Cotton: Teaching and Learning Materials
Authors: C. W. Kan
Abstract:
Fabrics can be treated to equip them with certain functional properties in which water repellency is one of the important functional effects. In this study, commercial water repellent agent was used under different application conditions to cotton fabric. Finally, the water repellent effect was evaluated by standard testing method. Thus, the aim of this study is to illustrate the proper application of water repellent finishing to cotton fabric and the results could provide guidance note to the students in learning this topic. Acknowledgment: Authors would like to thank the financial support from the Hong Kong Polytechnic University for this work.Keywords: learning materials, water repellent, textiles, cotton
Procedia PDF Downloads 2392391 Neurofeedback for Anorexia-RelaxNeuron-Aimed in Dissolving the Root Neuronal Cause
Authors: Kana Matsuyanagi
Abstract:
Anorexia Nervosa (AN) is a psychiatric disorder characterized by a relentless pursuit of thinness and strict restriction of food. The current therapeutic approaches for AN predominantly revolve around outpatient psychotherapies, which create significant financial barriers for the majority of affected patients, hindering their access to treatment. Nonetheless, AN exhibit one of the highest mortality and relapse rates among psychological disorders, underscoring the urgent need to provide patients with an affordable self-treatment tool, enabling those unable to access conventional medical intervention to address their condition autonomously. To this end, a neurofeedback software, termed RelaxNeuron, was developed with the objective of providing an economical and portable means to aid individuals in self-managing AN. Electroencephalography (EEG) was chosen as the preferred modality for RelaxNeuron, as it aligns with the study's goal of supplying a cost-effective and convenient solution for addressing AN. The primary aim of the software is to ameliorate the negative emotional responses towards food stimuli and the accompanying aberrant eye-tracking patterns observed in AN patient, ultimately alleviating the profound fear towards food an elemental symptom and, conceivably, the fundamental etiology of AN. The core functionality of RelaxNeuron hinges on the acquisition and analysis of EEG signals, alongside an electrocardiogram (ECG) signal, to infer the user's emotional state while viewing dynamic food-related imagery on the screen. Moreover, the software quantifies the user's performance in accurately tracking the moving food image. Subsequently, these two parameters undergo further processing in the subsequent algorithm, informing the delivery of either negative or positive feedback to the user. Preliminary test results have exhibited promising outcomes, suggesting the potential advantages of employing RelaxNeuron in the treatment of AN, as evidenced by its capacity to enhance emotional regulation and attentional processing through repetitive and persistent therapeutic interventions.Keywords: Anorexia Nervosa, fear conditioning, neurofeedback, BCI
Procedia PDF Downloads 432390 Design and Implementation of Wireless Syncronized AI System for Security
Authors: Saradha Priya
Abstract:
Developing virtual human is very important to meet the challenges occurred in many applications where human find difficult or risky to perform the task. A robot is a machine that can perform a task automatically or with guidance. Robotics is generally a combination of artificial intelligence and physical machines (motors). Computational intelligence involves the programmed instructions. This project proposes a robotic vehicle that has a camera, PIR sensor and text command based movement. It is specially designed to perform surveillance and other few tasks in the most efficient way. Serial communication has been occurred between a remote Base Station, GUI Application, and PC.Keywords: Zigbee, camera, pirsensor, wireless transmission, DC motor
Procedia PDF Downloads 3482389 The Development of XML Resume System in Thailand
Authors: Jarumon Nookhong, Thanakorn Uiphanit
Abstract:
This study is a research and development project which aims to develop XML Resume System to be the standard system in Thailand as well as to measure the efficiency of the XML Resume System in Thailand. This research separates into 2 stages: 1) to develop XML Document System to be the standard in Thailand, and 2) to experiment the system performance. The sample in this research is committed by 50 specialists in the field of human resources by selecting specifically. The tool that uses in this research is XML Resume System in Thailand and the performance evaluation format of system while the analysis of the data is calculated by using average and standard deviation. The result of the research found that the development of the XML Resume System that aims to be the standard system in Thailand had the result 2.67 of the average which is in a good level. The evaluation in testing the performance of the system had been done by the specialists of human resources who use the XML Resume system. When analyzing each part, it found out that the abilities according to the user’s requirement from specialists in the field of human resources, the convenience and easiness in usages, and the functional competency are respectively in a good level. The average of the ability according to the user’s need from specialists of human resources is 2.92. The average of the convenience and easiness in usages is 2.56. The average of functional competency is 2.53. These can be used as the standard effectively.Keywords: resume, XML, XML schema, computer science
Procedia PDF Downloads 4092388 Systematic and Simple Guidance for Feed Forward Design in Model Predictive Control
Authors: Shukri Dughman, Anthony Rossiter
Abstract:
This paper builds on earlier work which demonstrated that Model Predictive Control (MPC) may give a poor choice of default feed forward compensator. By first demonstrating the impact of future information of target changes on the performance, this paper proposes a pragmatic method for identifying the amount of future information on the target that can be utilised effectively in both finite and infinite horizon algorithms. Numerical illustrations in MATLAB give evidence of the efficacy of the proposal.Keywords: model predictive control, tracking control, advance knowledge, feed forward
Procedia PDF Downloads 5472387 Factors Associated with Peer Assessment of Writing Skills among Foreign Languages Students
Authors: Marian Lissett Olaya
Abstract:
This article examined the factors associated with incorporating peer assessment into English language classes in a public university in Colombia. This is done in the context of writing English class for 4th-semester students. The research instruments consisted of peer assessment questionnaires, student diaries, and interviews. Findings showed that among the factors, motivation, frustration, anxiety, and lack of confidence appeared. Data revealed that peer assessment enables students to write competencies through training, teachers' guidance, and the provision of a collaborative environment.Keywords: writing skills, peer assessment, formative assessment, language acquisition
Procedia PDF Downloads 822386 Resin Finishing of Cotton: Teaching and Learning Materials
Authors: C. W. Kan
Abstract:
Cotton is the most commonly used material for apparel purpose because of its durability, good perspiration absorption characteristics, comfort during wear and dyeability. However, proneness to creasing and wrinkling give cotton garments a poor rating during actual wear. Resin finishing is a process to bring out crease or wrinkle free/resistant effect to cotton fabric. Thus, the aim of this study is to illustrate the proper application of resin finishing to cotton fabric, and the results could provide guidance note to the students in learning this topic. Acknowledgment: Authors would like to thank the financial support from the Hong Kong Polytechnic University for this work.Keywords: learning materials, resin, textiles, wrinkle
Procedia PDF Downloads 2542385 Oestrogen Replacement In Post-Oophorectomy Women
Authors: Joana Gato, Ahmed Abotabekh, Panayoti Bachkangi
Abstract:
Introduction: Oestrogen is an essential gonadal hormone that plays a vital role in the reproductive system of women1. The average age of menopause in the UK is 512. Women who go through premature menopause should be offered Hormone replacement therapy (HRT). Similarly, women who undergo surgical menopause should be offered HRT, unless contraindicated, depending on the indication of their surgery2,3. Aim: To assess if the patients in our department are counselled regarding HRT after surgical treatment and if HRT was prescribed. Methodology: A retrospective audit in a busy district hospital, examining all the patients who had a hysterectomy. The audit examined if HRT was discussed pre-operatively, prescribed on discharge and if a follow up was arranged. For women with contraindication to HRT, the audit assessed if the reasons were discussed pre-operatively and communicated to the Inclusion criteria: woman having a total or subtotal hysterectomy, with or without bilateral salpingo-ophorectomy (BSO), between April and September 2022. Exclusion criteria: woman having a vaginal hysterectomy. Results: 40 patients in total had hysterectomy; 27 (68%) were under the age of 51. 15 out of 27 patients bad BSO. 9 women were prescribed HRT, but 8 were offered HRT immediately, and 1 of them were offered a follow up. Of women who underwent surgical menopause, 7 were not given any HRT. The HRT choice was diverse, however, the majority was prescribed oral HRT. 40% of women undergoing surgical menopause did not have a discussion about HRT prior to their surgery. In postmenopausal women (n=13; 33%), still two were given HRT for preexisting menopausal symptoms. Discussion: Only 59% of the pre-menopausal patients had oophorectomy, therefore undergoing surgical menopause. Of these, 44% were not given any HRT, and 40% had no discussion about HRT prior to surgery. Interestingly, the majority of these women have no obvious contraindication to HRT. The choice of HRT was diverse, but the majority was commenced on oral HRT. Our unit is still working towards meeting all the NICE guidance standards of offering HRT and information prior to surgery to women planning to undergo surgical menopause. Conclusion: Starting HRT at the onset of menopause has been shown to improve quality of life and reduce the risk of cardiovascular disease and osteoporotic fractures4. Our unit still has scope for improvement to comply with the current NICE guidance. All pre-menopausal women undergoing surgical menopause should have a discussion regarding HRT prior to surgery and be offered it if there are no contraindications. This discussion should be clearly documented in the notes. At the time of this report, some of the patients have not yet had a follow up, which we recognize as a limitation to our audit.Keywords: hormone replacement therapy, menopause, premature ovarian insufficiency, surgical management
Procedia PDF Downloads 982384 Tourist Emotion, Creative Experience and Behavioral Intention in Creative Tourism
Authors: Yi-Ju Lee
Abstract:
This study identified the hypothesized relationships among tourist emotion, creative experience, and behavioral intention of handmade ancient candy in Tainan, Taiwan. A face-to-face questionnaire survey was administered in Anping, Tainan. The result also revealed significant positive relationships between emotion, creative experience and behavioral intention in handmade activities. This paper provides additional suggestions for enhancing behavioral intention and guidance regarding creative tourism.Keywords: creative tourism, sense of achievement, unique learning, interaction with instructors
Procedia PDF Downloads 3312383 Optimization of the Administration of Intravenous Medication by Reduction of the Residual Volume, Taking User-Friendliness, Cost Efficiency, and Safety into Account
Authors: A. Poukens, I. Sluyts, A. Krings, J. Swartenbroekx, D. Geeroms, J. Poukens
Abstract:
Introduction and Objectives: It has been known for many years that with the administration of intravenous medication, a rather significant part of the planned to be administered infusion solution, the residual volume ( the volume that remains in the IV line and or infusion bag), does not reach the patient and is wasted. This could possibly result in under dosage and diminished therapeutic effect. Despite the important impact on the patient, the reduction of residual volume lacks attention. An optimized and clearly stated protocol concerning the reduction of residual volume in an IV line is necessary for each hospital. As described in my Master’s thesis, acquiring the degree of Master in Hospital Pharmacy, administration of intravenous medication can be optimized by reduction of the residual volume. Herewith effectiveness, user-friendliness, cost efficiency and safety were taken into account. Material and Methods: By usage of a literature study and an online questionnaire sent out to all Flemish hospitals and hospitals in the Netherlands (province Limburg), current flush methods could be mapped out. In laboratory research, possible flush methods aiming to reduce the residual volume were measured. Furthermore, a self-developed experimental method to reduce the residual volume was added to the study. The current flush methods and the self-developed experimental method were compared to each other based on cost efficiency, user-friendliness and safety. Results: There is a major difference between the Flemish and the hospitals in the Netherlands (Province Limburg) concerning the approach and method of flushing IV lines after administration of intravenous medication. The residual volumes were measured and laboratory research showed that if flushing was done minimally 1-time equivalent to the residual volume, 95 percent of glucose would be flushed through. Based on the comparison, it became clear that flushing by use of a pre-filled syringe would be the most cost-efficient, user-friendly and safest method. According to laboratory research, the self-developed experimental method is feasible and has the advantage that the remaining fraction of the medication can be administered to the patient in unchanged concentration without dilution. Furthermore, this technique can be applied regardless of the level of the residual volume. Conclusion and Recommendations: It is recommendable to revise the current infusion systems and flushing methods in most hospitals. Aside from education of the hospital staff and alignment on a uniform substantiated protocol, an optimized and clear policy on the reduction of residual volume is necessary for each hospital. It is recommended to flush all IV lines with rinsing fluid with at least the equivalent volume of the residual volume. Further laboratory and clinical research for the self-developed experimental method are needed before this method can be implemented clinically in a broader setting.Keywords: intravenous medication, infusion therapy, IV flushing, residual volume
Procedia PDF Downloads 1352382 The Effect of Smartphones on Human Health Relative to User’s Addiction: A Study on a Wide Range of Audiences in Jordan
Authors: T. Qasim, M. Obeidat, S. Al-Sharairi
Abstract:
The objective of this study is to investigate the effect of the excessive use of smartphones. Smartphones have enormous effects on the human body in that some musculoskeletal disorders (MSDs) and health problems might evolve. These days, there is a wide use of the smartphones among all age groups of society, thus, the focus on smartphone effects on human behavior and health, especially on the young and elderly people, becomes a crucial issue. This study was conducted in Jordan on smartphone users for different genders and ages, by conducting a survey to collect data related to the symptoms and MSDs that are resulted from the excessive use of smartphones. A total of 357 responses were used in the analysis. The main related symptoms were numbness, fingers pain, and pain in arm, all linked to age and gender for comparative reasons. A statistical analysis was performed to find the effects of extensive usage of a smartphone for long periods of time on the human body. Results show that the significant variables were the vision problems and the time spent when using the smartphone that cause vision problems. Other variables including age of user and ear problems due to the use of the headsets were found to be a border line significant.Keywords: smart phone, age group, musculoskeletal disorders (MSDs), health problems
Procedia PDF Downloads 2532381 Characteristics of Football Spectators Using Second Screen
Authors: Florian Pfeffel, Christoph A. Kexel, Peter Kexel, Maria Ratz
Abstract:
The parallel usage of different media channels has increased recently owing to technological advances. Second Screen describes the use of a second device by television viewers to consume further content which is related to the program they are watching. This study analysed the characteristics of football spectators regarding their media consumption in relation to Second Screen usage while watching a football match on TV. The existing literature on Second Screen usage is still very limited, especially in the context of particular broadcasting settings such as sport or even more specific such as football matches. Therefore, the primary research objective was to reveal first insights into the user behaviour of football spectators regarding Second Screen services. The survey, which was conducted among German football supporters in 2015, revealed some characteristics such as the identification and involvement into the sports which are related to an increased use of Second Screen services. One important finding for football supporters was that at the time of a match they have a lower parallel media usage compared to other TV broadcastings. Nevertheless, if supporters used a second device while watching a match on TV, then they were using specific Second Screen services. This means they searched for more content related information. The findings on the habits and characteristics of people who are using Second Screen services are relevant for future developments in that area as well as for marketing decisions.Keywords: media consumption, second screen, sport marketing, user behaviour
Procedia PDF Downloads 3892380 Development of PSS/E Dynamic Model for Controlling Battery Output to Improve Frequency Stability in Power Systems
Authors: Dae-Hee Son, Soon-Ryul Nam
Abstract:
The power system frequency falls when disturbance such as rapid increase of system load or loss of a generating unit occurs in power systems. Especially, increase in the number of renewable generating units has a bad influence on the power system because of loss of generating unit depending on the circumstance. Conventional technologies use frequency droop control battery output for the frequency regulation and balance between supply and demand. If power is supplied using the fast output characteristic of the battery, power system stability can be further more improved. To improve the power system stability, we propose battery output control using ROCOF (Rate of Change of Frequency) in this paper. The bigger the power difference between the supply and the demand, the bigger the ROCOF drops. Battery output is controlled proportionally to the magnitude of the ROCOF, allowing for faster response to power imbalances. To simulate the control method of battery output system, we develop the user defined model using PSS/E and confirm that power system stability is improved by comparing with frequency droop control.Keywords: PSS/E user defined model, power deviation, frequency droop control, ROCOF (rate of change of frequency)
Procedia PDF Downloads 4102379 Explaining the Acceptance and Adoption of Digital Technologies: Digital Government in Saudi Arabia
Authors: Mohammed Alhamed
Abstract:
This research examines the factors influencing the acceptance and adoption of digital technologies in Saudi Arabia’s government sector by focusing on government employees' attitudes toward digital transformation initiatives. As digital technologies increasingly integrate into public sectors worldwide, there is a requirement to enhance citizen empowerment and government-public interactions as well as understand their impact in unique socio-political contexts like Saudi Arabia. The study aims to explore user attitudes, identify the main challenges, and investigate factors that affect the intention to use digital applications in governmental settings. The study employs a mixed-methods approach by combining quantitative and qualitative data collection to provide a comprehensive view of digital government application adoption. Data was collected through two online surveys administered to 870 government employees and face-to-face semi-structured interviews with 24 participants. This dual approach allows for both statistical analysis and thematic exploration, which provides a deeper understanding of user behaviour, perceived benefits, challenges and attitudes toward these digital applications. Quantitative data were analyzed to identify significant variables influencing adoption, while qualitative responses were coded thematically to uncover recurring themes related to user trust, security, usability and socio-political influences. The results indicate that digital government applications are largely valued for their ability to increase efficiency and accessibility and streamline processes like online documentation and inter-departmental coordination. However, the study highlights that security, privacy, and confidentiality concerns constitute substantial barriers to adoption, with participants calling for stronger cybersecurity measures and data protection policies. Moreover, usability emerged as a key theme that intuitively interfaces in encouraging adoption as respondents emphasized the importance of user-friendly. Additionally, the study found that Saudi Arabia’s unique cultural and organizational dynamics impact acceptance levels with factors like hierarchical structures and varying levels of digital literacy shaping user attitudes. A significant limitation of the study is its exclusive focus on government employees, which may limit the generalizability of the findings to other stakeholder groups, such as the general public. Despite this, the study offers valuable views for policymakers. This, in turn, suggests best practices and guidelines that could enhance the design and implementation of digital government projects. By addressing the identified barriers and leveraging the factors that drive adoption, the study underscores the potential for digital government initiatives to improve efficiency, transparency and responsiveness in Saudi Arabia's public sector. Furthermore, these findings may provide a roadmap for similar countries aiming to adopt digital government solutions within comparable socio-political and economic contexts.Keywords: acceptance, adoption, digital technologies, digital government, Saudi Arabia
Procedia PDF Downloads 112378 Analysis of User Complaints and Preferences by Conducting User Surveys to Ascertain the Need for Change in Current Design of Helmets
Authors: Pratham Baheti, Rohan Sanghi, Aditya Gupta
Abstract:
In the largely populated city of New Delhi, India, there are a lot of people that travel by two-wheelers. Majority of the people wear helmets while traveling and know how important it is to wear helmets for their safety. Still, the number of deaths because of road accidents involving two-wheelers is significant. We had conducted a survey by traveling within and in the outskirts of Delhi so as to see the variation in data and in the opinion of people towards helmet being a safety device rather than to escape the traffic police. We conducted a survey at traffic junctions and crossings of all the stakeholders and collected feedback on the Helmet scenario in India. According to the survey, the possible reason for these deaths is that the people, being unaware of helmet safety standards (ISI standards for helmets), buy helmets with fake ISI mark from unauthorized helmet sellers for a cheap price. Also, for the people who do not wear a helmet at all or wear a helmet just because it is a law, the reasons that they do not want to wear a helmet is heavyweight, lack of ventilation, inconvenience due to a strap, and hair problems. To address all these problems, we are designing a helmet with reduced weight and also working on the Helmet’s retention system and ventilation. We plan to provide this product at a cheap cost whilst maintaining the ISI standards so that a larger section of the population would be able to afford the helmet.Keywords: safety, survey, ISI marks, stakeholders, helmet
Procedia PDF Downloads 2792377 Drones, Rebels and Bombs: Explaining the Role of Private Security and Expertise in a Post-piratical Indian Ocean
Authors: Jessica Kate Simonds
Abstract:
The last successful hijacking perpetrated by Somali pirates in 2012 represented a critical turning point for the identity and brand of Indian Ocean (IO) insecurity, coined in this paper as the era of the post-piratical. This paper explores the broadening of the PMSC business model to account and contribute to the design of a new IO security environment that prioritises foreign and insurgency drone activity and Houthi rebel operations as the main threat to merchant shipping in the post-2012 era. This study is situated within a longer history of analysing maritime insecurity and also contributes a bespoke conceptual framework that understands the sea as a space that is produced and reproduced relative to existing and emerging threats to merchant shipping based on bespoke models of information sharing and intelligence acquisition. This paper also makes a prominent empirical contribution by drawing on a post-positivist methodology, data drawn from original semi-structured interviews with senior maritime insurers and active merchant seafarers that is triangulated with industry-produced guidance such as the BMP series as primary data sources. Each set is analysed through qualitative discourse and content analysis and supported by the quantitative data sets provided by the IMB Piracy Reporting center and intelligence networks. This analysis reveals that mechanisms such as the IGP&I Maritime Security Committee and intelligence divisions of PMSC’s have driven the exchanges of knowledge between land and sea and thus the reproduction of the maritime security environment through new regulations and guidance to account dones, rebels and bombs as the key challenges in the IO, beyond piracy. A contribution of this paper is the argument that experts who may not be in the highest-profile jobs are the architects of maritime insecurity based on their detailed knowledge and connections to vessels in transit. This paper shares the original insights of those who have served in critical decision making spaces to demonstrate that the development and refinement of industry produced deterrence guidance that has been accredited to the mitigation of piracy, have shaped new editions such as BMP 5 that now serve to frame a new security environment that prioritises the mitigation of risks from drones and WBEID’s from both state and insurgency risk groups. By highlighting the experiences and perspectives of key players on both land and at sea, the key finding of this paper is outlining that as pirates experienced a financial boom by profiteering from their bespoke business model during the peak of successful hijackings, the private security market encountered a similar level of financial success and guaranteed risk environment in which to prospect business. Thus, the reproduction of the Indian Ocean as a maritime security environment reflects a new found purpose for PMSC’s as part of the broader conglomerate of maritime insurers, regulators, shipowners and managers who continue to redirect the security consciousness and IO brand of insecurity.Keywords: maritime security, private security, risk intelligence, political geography, international relations, political economy, maritime law, security studies
Procedia PDF Downloads 1842376 Identity Management in Virtual Worlds Based on Biometrics Watermarking
Authors: S. Bader, N. Essoukri Ben Amara
Abstract:
With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world
Procedia PDF Downloads 2652375 An Automatic Generating Unified Modelling Language Use Case Diagram and Test Cases Based on Classification Tree Method
Authors: Wassana Naiyapo, Atichat Sangtong
Abstract:
The processes in software development by Object Oriented methodology have many stages those take time and high cost. The inconceivable error in system analysis process will affect to the design and the implementation process. The unexpected output causes the reason why we need to revise the previous process. The more rollback of each process takes more expense and delayed time. Therefore, the good test process from the early phase, the implemented software is efficient, reliable and also meet the user’s requirement. Unified Modelling Language (UML) is the tool which uses symbols to describe the work process in Object Oriented Analysis (OOA). This paper presents the approach for automatically generated UML use case diagram and test cases. UML use case diagram is generated from the event table and test cases are generated from use case specifications and Graphic User Interfaces (GUI). Test cases are derived from the Classification Tree Method (CTM) that classify data to a node present in the hierarchy structure. Moreover, this paper refers to the program that generates use case diagram and test cases. As the result, it can reduce work time and increase efficiency work.Keywords: classification tree method, test case, UML use case diagram, use case specification
Procedia PDF Downloads 1622374 The Reflection Framework to Enhance the User Experience for Cultural Heritage Spaces’ Websites in Post-Pandemic Times
Authors: Duyen Lam, Thuong Hoang, Atul Sajjanhar, Feifei Chen
Abstract:
With the emerging interactive technology applications helping users connect progressively with cultural artefacts in new approaches, the cultural heritage sector gains significantly. The interactive apps’ issues can be tested via several techniques, including usability surveys and usability evaluations. The severe usability problems for museums’ interactive technologies commonly involve interactions, control, and navigation processes. This study confirms the low quality of being immersive for audio guides in navigating the exhibition and involving experience in the virtual environment, which are the most vital features of new interactive technologies such as AR and VR. In addition, our usability surveys and heuristic evaluations disclosed many usability issues of these interactive technologies relating to interaction functions. Additionally, we use the Wayback Machine to examine what interactive apps/technologies were deployed on these websites during the physical visits limited due to the COVID-19 pandemic lockdown. Based on those inputs, we propose the reflection framework to enhance the UX in the cultural heritage domain with detailed guidelines.Keywords: framework, user experience, cultural heritage, interactive technology, museum, COVID-19 pandemic, usability survey, heuristic evaluation, guidelines
Procedia PDF Downloads 682373 CVOIP-FRU: Comprehensive VoIP Forensics Report Utility
Authors: Alejandro Villegas, Cihan Varol
Abstract:
Voice over Internet Protocol (VoIP) products is an emerging technology that can contain forensically important information for a criminal activity. Without having the user name and passwords, this forensically important information can still be gathered by the investigators. Although there are a few VoIP forensic investigative applications available in the literature, most of them are particularly designed to collect evidence from the Skype product. Therefore, in order to assist law enforcement with collecting forensically important information from variety of Betamax VoIP tools, CVOIP-FRU framework is developed. CVOIP-FRU provides a data gathering solution that retrieves usernames, contact lists, as well as call and SMS logs from Betamax VoIP products. It is a scripting utility that searches for data within the registry, logs and the user roaming profiles in Windows and Mac OSX operating systems. Subsequently, it parses the output into readable text and html formats. One superior way of CVOIP-FRU compared to the other applications that due to intelligent data filtering capabilities and cross platform scripting back end of CVOIP-FRU, it is expandable to include other VoIP solutions as well. Overall, this paper reveals the exploratory analysis performed in order to find the key data paths and locations, the development stages of the framework, and the empirical testing and quality assurance of CVOIP-FRU.Keywords: betamax, digital forensics, report utility, VoIP, VoIPBuster, VoIPWise
Procedia PDF Downloads 297