Search results for: special education services
6065 An Antifungal Peptide from Actinobacteria (Streptomyces Sp. TKJ2): Isolation and Partial Characterization
Authors: Abdelaziz Messis, Azzeddine Bettache, Nawel Boucherba, Said Benallaoua, Mouloud Kecha
Abstract:
Actinobacteria are of special biotechnological interest since they are known to produce chemically diverse compounds with a wide range of biological activity. This distinct clade of Gram-positve bacteria include some of the key antibiotic producers and are also sources of several bioactive compounds, established commercially a newly filamentous bacteria was recovered from Tikjda forest soil (Algeria) for its high antifungal activity against various pathogenic and phytopathogenic fungi. The nucleotide sequence of the 16S rRNA gene (1454 pb) of Streptomyces sp. TKJ2 exhibited close similarity (99 %) with other Streptomyces16S rRNA genes. Antifungal metabolite production of Streptomyces sp TKJ2 was evaluated using six different fermentation media. The extracellular products contained potent antifungal agents. Antifungal protein produced by Streptomyces sp. TKJ2 on PCA medium has been purified by ammonium sulfate precipitation, SPE column chromatography and high-performance liquid chromatography in a reverse-phase column. The UV chromatograms of the active fractions obtained at 214 nm by NanoLC-ESI-MS/MS have different molecular weights. The F20 Peptidic fraction obtained from culture filtrat of Streptomyces sp. TKJ2 precipitated at 30% of ammonium sulfate was selected for analysis by infusion ESI-MS which yielded a singly charged ion mass of 437.17 Da.Keywords: actinobacteria, antifungal protein, chromatography, Streptomyces
Procedia PDF Downloads 3856064 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 3616063 Thermophoresis Particle Precipitate on Heated Surfaces
Authors: Rebhi A. Damseh, H. M. Duwairi, Benbella A. Shannak
Abstract:
This work deals with heat and mass transfer by steady laminar boundary layer flow of a Newtonian, viscous fluid over a vertical flat plate with variable surface heat flux embedded in a fluid saturated porous medium in the presence of thermophoresis particle deposition effect. The governing partial differential equations are transformed into no-similar form by using special transformation and solved numerically by using an implicit finite difference method. Many results are obtained and a representative set is displaced graphically to illustrate the influence of the various physical parameters on the wall thermophoresis deposition velocity and concentration profiles. It is found that the increasing of thermophoresis constant or temperature differences enhances heat transfer rates from vertical surfaces and increase wall thermophoresis velocities; this is due to favourable temperature gradients or buoyancy forces. It is also found that the effect of thermophoresis phenomena is more pronounced near pure natural convection heat transfer limit; because this phenomenon is directly a temperature gradient or buoyancy forces dependent. Comparisons with previously published work in the limits are performed and the results are found to be in excellent agreement.Keywords: thermophoresis, porous medium, variable surface heat flux, heat transfer
Procedia PDF Downloads 2056062 Persisting Gender Gap in the Field of Academic Entrepreneurship: The Case of Switzerland
Authors: Noemi Schneider, Richard Blaese, Pietro Morandi, Brigitte Liebig
Abstract:
While women are increasingly frequent among the founders of innovative companies and advanced researchers in many university research institutes today, they are still an exception among initiators of research-based spin-offs. This also applies to countries such as Switzerland, which does have a leading position in international innovation rankings. Starting from a gender-sensitive neo-institutionalist perspective, this paper examines formal and non-formal institutional framework conditions for academic spin-offs at Swiss universities of applied sciences. This field, which stresses vocational education and practice-oriented research, seems to conserve the gender gap in the area of establishing research-based spin-offs spin-off rates strongly. The analysis starts from a survey conducted in 2017 and 2018 at all seven public universities of applied sciences in Switzerland as well as on an evaluation of expert interviews performed with heads of start-up centers, where also spin-offs from universities of applied sciences get support. The results show the mechanisms, which contribute to gender gaps in academic entrepreneurship in higher education. University's female employees have hardly been discovered as target groups. Thus, only 10.5% of universities of applied sciences offer specific support measures for women in academia. And only 1 out of 7 universities of applied sciences offer mentoring programs for female entrepreneurs while in addition there are no financial resources available to support female founders in academia. Moreover, the awareness of the gender gap in academic entrepreneurship is low among founding commissioners. A consistent transfer strategy might be key for bringing in line the formal and non-formal preconditions relevant for the formation of research-based spin-offs and for providing an effective incentive structure to promote women.Keywords: gender, science-based spin-off, universities of applied sciences, knowledge transfer strategy
Procedia PDF Downloads 1566061 Managing the Cloud Procurement Process: Findings from a Case Study
Authors: Andreas Jede, Frank Teuteberg
Abstract:
Cloud computing (CC) has already gained overall appreciation in research and practice. Whereas the willingness to integrate cloud services in various IT environments is still unbroken, the previous CC procurement processes run mostly in an unorganized and non-standardized way. In practice, a sufficiently specific, yet applicable business process for the important acquisition phase is often lacking. And research does not appropriately remedy this deficiency yet. Therefore, this paper introduces a field-tested approach for CC procurement. Based on an extensive literature review and augmented by expert interviews, we designed a model that is validated and further refined through an in-depth real-life case study. For the detailed process description, we apply the event-driven process chain notation (EPC). The gained valuable insights into the case study may help CC research to shift to a more socio-technical area. For practice, next to giving useful organizational instructions we will provide extended checklists and lessons learned.Keywords: cloud procurement process, IT-organization, event-driven process chain, in-depth case study
Procedia PDF Downloads 3976060 Dynamic Route Optimization in Vehicle Adhoc Networks: A Heuristics Routing Protocol
Authors: Rafi Ullah, Shah Muhammad Emaduddin, Taha Jilani
Abstract:
Vehicle Adhoc Networks (VANET) belongs to a special class of Mobile Adhoc Network (MANET) with high mobility. Network is created by road side vehicles equipped with communication devices like GPS and Wifi etc. Since the environment is highly dynamic due to difference in speed and high mobility of vehicles and weak stability of the network connection, it is a challenging task to design an efficient routing protocol for such an unstable environment. Our proposed algorithm uses heuristic for the calculation of optimal path for routing the packet efficiently in collaboration with several other parameters like geographical location, speed, priority, the distance among the vehicles, communication range, and networks congestion. We have incorporated probabilistic, heuristic and machine learning based approach inconsistency with the relay function of the memory buffer to keep the packet moving towards the destination. These parameters when used in collaboration provide us a very strong and admissible heuristics. We have mathematically proved that the proposed technique is efficient for the routing of packets, especially in a medical emergency situation. These networks can be used for medical emergency, security, entertainment and routing purposes.Keywords: heuristics routing, intelligent routing, VANET, route optimization
Procedia PDF Downloads 1866059 The South Looking East: The New Geopolitics of Latin America
Authors: Heike Pintor Pirzkall
Abstract:
The positive economic evolution of many countries in the Latin American Continent, mainly in South America, has changed the geopolitical position of the region in the world. It is no longer the Hinterland or backyard of the United States, now it has become the Heartland for Europe and Asia. This position has favored the interest of countries like China or India, who are combining trade agreements with special assistance and aid agreements in many fields like agriculture, alternative energy resources, defense and mining. As many countries in the region are no longer low income countries, a more equal relationship in development aid has been created were the donor and the recipient have become partners and where new actors intervene in a triangular relationship that promotes new alternative aid structures. Triangular co-operation brings together the best of different actors who are providers of development co-operation, partners in SouthSouth co-operation and international organizations. The objective is to share knowledge and implement projects that support the common goal of reducing poverty and promoting development. The intention of this paper is to explain the reasons for Latin America´s “virage” to the east and to give examples of projects and agreements between Latin American countries, China and India which will help to understand the intensification of south-east relations in recent years.Keywords: development cooperation, China, Latin America, triangular cooperation, natural resources, partnership
Procedia PDF Downloads 3906058 Generational Differences in Leadership and Motivation: A Multilevel Study of Federal Workers
Authors: Sally Selden, Jyoti Aggarwal
Abstract:
The research on generational expectations about leadership is developing, but little scholarship exists on this topic for public sector organizations. Given the size of the federal workforce, this research study fills an important gap in the knowledge base and will inform public organizations how to approach managing and leading a multigenerational workforce. The research objectives of this study are to explore leadership preferences and motivation within generations and to determine whether these qualities differ by type of federal agency (e.g., law enforcement, human services, etc.). This paper will review the research on generational differences, expectations, and leadership with a focus on studies of public organizations. Using hierarchical linear modeling (HLM), this study will examine how leadership and motivation vary by generation in the federal government workforce, controlling for other demographic characteristics. The study will also examine whether generational differences impact satisfaction and performance. The study will utilize the 2019 Federal Employee Viewpoint Survey.Keywords: multigenerational workforce, leadership, generational differences, federal workforce
Procedia PDF Downloads 2316057 Continuous Professional Development of Teachers: Implementation Mechanisms in the Republic of Kazakhstan Based on the Professional Standard 'Teacher'
Authors: Yelena Agranovich, Larissa Ageyeva, Aigul Syzdykbayeva, Violetta Tyan
Abstract:
The modernization of the education system in the Republic of Kazakhstan is aimed at improving the quality of teacher training and enhancing key competencies among teachers. The current professional standard ‘Teacher’ defines the general characteristics of teachers’ activities, key competencies, and criteria according to relevant qualification categories structured on the principle of progression, thereby enabling Continuous Professional Development (CPD). The essence of CPD lies in the constant integration of new knowledge and skills that help teachers adapt to changes in the education system, in technologies, and teaching methods. This developmental process enables teachers to stay updated on recent scientific achievements, innovations, and modern pedagogical practices. Continuous learning helps teachers remain flexible and open to new developments, creating conditions for improving educational quality and fostering students' personal growth. This study aims to address the following objectives: analysis of international CPD practices, identification of conceptual foundations, and investigation of CPD implementation mechanisms in Kazakhstan. The core principles of CPD are identified as longitudinality, systematicity, and fragmentation. CPD implementation is based on various theoretical approaches: axiological, systemic, competency-based, activity-based, and learner-centered. The study analyzes leading models of teacher CPD, with a target sample that includes countries such as Australia, Japan, South Korea, England, Singapore, Sweden, Finland, and Kazakhstan. The research methods include analysis (comparative, historical, content analysis, systematic), case studies of CPD models, and synthesis and systematization of scientific data. As research results, the mechanisms for CPD implementation in Kazakhstan will be identified, along with further perspectives on transforming resources within the teacher professional development system. In comparing CPD models from various countries, it is noted that teacher CPD in the Republic of Kazakhstan: (1) is implemented through educational programs, professional development courses, teacher certification, professional networks, in-school professional development, self-education, and self-assessment; (2) includes the development of pedagogical values and competencies (tolerance, inclusivity, communication, critical thinking, creativity, reflection, etc.); (3) is carried out based on traditional forms (professional development courses, retraining) and informal forms (self-learning, self-development, experience sharing and exchange). Further research will focus on creating a digital ecosystem for teacher CPD, based on an educational platform that facilitates individualized professional development pathways for teachers (competency diagnostics, course selection, and a methodological system of course and post-course support for teachers).Keywords: continuous professional development, CPD models, professional development, professional upgrading, teacher, teacher training
Procedia PDF Downloads 266056 Acculturation of Iranian Students in Europe
Authors: Shirin Sadat Ahmadi
Abstract:
The number of people, particularly university students, migrating from Iran and applying for American and European universities has been rising during recent years. Different people may have various reasons and goals for migration, but one of the common issues among all these people is the cultural challenges they experience when living in the adopted society. Immigrants usually confront obstacles during the Intercultural transition and adaption process. Different variables such as age, religion, gender, education, knowing the spoken language in destination country, financial condition, interactions with natives, and using social media can affect the cultural challenges people face after migration and how they conquer issues appearing due to intercultural differences and conflicts. In this research we have interviewed a sample consisted of 15 Iranian students living and studying abroad found by using snowball sampling technique via video call to realize what cultural challenges they have experienced in the new society, how the mentioned variables above eased these challenges or made them harder and what approaches and solutions they adopted to adjust themselves to the new society and its cultural dimensions. Based on John Berry's acculturation theory of migrant-host relationship, we have classified these 15 people in five different categories: Assimilation, Separation, Marginalization, and Integration. In addition we have considered Y.Y. Kim's communication-based theory of cross-cultural adaption to explain how communications helped migrant populations in adaption process. Based on the findings of this study, 12 of 15 interviewed members of the study used the integration strategy to adapt to the new cultural environment, 3 of them used the assimilation strategy, and none of them used marginalization or separation strategies. Communicating with natives, knowing the language, and education were the factors that helped all the interviewed members of the sample to overcome the difficulties of intercultural transition.Keywords: acculturation, culture, intercultural transition, migration
Procedia PDF Downloads 686055 Enriched Education: The Classroom as a Learning Network through Video Game Narrative Development
Authors: Wayne DeFehr
Abstract:
This study is rooted in a pedagogical approach that emphasizes student engagement as fundamental to meaningful learning in the classroom. This approach creates a paradigmatic shift, from a teaching practice that reinforces the teacher’s central authority to a practice that disperses that authority among the students in the classroom through networks that they themselves develop. The methodology of this study about creating optimal conditions for learning in the classroom includes providing a conceptual framework within which the students work, as well as providing clearly stated expectations for work standards, content quality, group methodology, and learning outcomes. These learning conditions are nurtured in a variety of ways. First, nearly every class includes a lecture from the professor with key concepts that students need in order to complete their work successfully. Secondly, students build on this scholarly material by forming their own networks, where students face each other and engage with each other in order to collaborate their way to solving a particular problem relating to the course content. Thirdly, students are given short, medium, and long-term goals. Short term goals relate to the week’s topic and involve workshopping particular issues relating to that stage of the course. The medium-term goals involve students submitting term assignments that are evaluated according to a well-defined rubric. And finally, long-term goals are achieved by creating a capstone project, which is celebrated and shared with classmates and interested friends on the final day of the course. The essential conclusions of the study are drawn from courses that focus on video game narrative. Enthusiastic student engagement is created not only with the dynamic energy and expertise of the instructor, but also with the inter-dependence of the students on each other to build knowledge, acquire skills, and achieve successful results.Keywords: collaboration, education, learning networks, video games
Procedia PDF Downloads 1206054 A User Study on the Adoption of Context-Aware Destination Mobile Applications
Authors: Shu-Lu Hsu, Fang-Yi Chu
Abstract:
With the advances in information and communications technology, mobile context-aware applications have become powerful marketing tools. In Apple online store, there are numerous mobile applications (APPs) developed for destination tour. This study investigated the determinants of adoption of context-aware APPs for destination tour services. A model is proposed based on Technology Acceptance Model and privacy concern theory. The model was empirically tested based on a sample of 259 users of a tourism APP published by Kaohsiung Tourism Bureau, Taiwan. The results showed that the fitness of the model is well and, among all the factors, the perceived usefulness and perceived ease of use have the most significant influences on the intention to adopt context-aware destination APPs. Finally, contrary to the findings of previous literature, the effect of privacy concern on the adoption intention of context-aware APP is insignificant.Keywords: mobile application, context-aware, privacy concern, TAM
Procedia PDF Downloads 2606053 Predictors of Sexually Transmitted Infection of Korean Adolescent Females: Analysis of Pooled Data from Korean Nationwide Survey
Authors: Jaeyoung Lee, Minji Je
Abstract:
Objectives: In adolescence, adolescents are curious about sex, but sexual experience before becoming an adult can cause the risk of high probability of sexually transmitted infection. Therefore, it is very important to prevent sexually transmitted infections so that adolescents can grow in healthy and upright way. Adolescent females, especially, have sexual behavior distinguished from that of male adolescents. Protecting female adolescents’ reproductive health is even more important since it is directly related to the childbirth of the next generation. This study, thus, investigated the predictors of sexually transmitted infection in adolescent females with sexual experiences based on the National Health Statistics in Korea. Methods: This study was conducted based on the National Health Statistics in Korea. The 11th Korea Youth Behavior Web-based Survey in 2016 was conducted in the type of anonymous self-reported survey in order to find out the health behavior of adolescents. The target recruitment group was middle and high school students nationwide as of April 2016, and 65,528 students from a total of 800 middle and high schools participated. The study was conducted in 537 female high school students (Grades 10–12) among them. The collected data were analyzed as complex sampling design using SPSS statistics 22. The strata, cluster, weight, and finite population correction provided by Korea Center for Disease Control & Prevention (KCDC) were reflected to constitute complex sample design files, which were used in the statistical analysis. The analysis methods included Rao-Scott chi-square test, complex samples general linear model, and complex samples multiple logistic regression analysis. Results: Out of 537 female adolescents, 11.9% (53 adolescents) had experiences of venereal infection. The predictors for venereal infection of the subjects were ‘age at first intercourse’ and ‘sexual intercourse after drinking’. The sexually transmitted infection of the subjects was decreased by 0.31 times (p=.006, 95%CI=0.13-0.71) for middle school students and 0.13 times (p<.001, 95%CI=0.05-0.32) for high school students whereas the age of the first sexual experience was under elementary school age. In addition, the sexually transmitted infection of the subjects was 3.54 times (p < .001, 95%CI=1.76-7.14) increased when they have experience of sexual relation after drinking alcohol, compared to those without the experience of sexual relation after drinking alcohol. Conclusions: The female adolescents had high probability of sexually transmitted infection if their age for the first sexual experience was low. Therefore, the female adolescents who start sexual experience earlier shall have practical sex education appropriate for their developmental stage. In addition, since the sexually transmitted infection increases, if they have sexual relations after drinking alcohol, the consideration for prevention of alcohol use or intervention of sex education shall be required. When health education intervention is conducted for health promotion for female adolescents in the future, it is necessary to reflect the result of this study.Keywords: adolescent, coitus, female, sexually transmitted diseases
Procedia PDF Downloads 1936052 Preparation, Physical and Photoelectrochemical Characterization of Ag/CuCo₂O₄: Application to Solar Light Oxidation of Methyl Orange
Authors: Radia Bagtache, Karima Boudjedien, Ahmed Malek Djaballah, Mohamed Trari
Abstract:
The compounds with a spinel structure have received special attention because of their numerous applications in electronics, magnetism, catalysis, electrocatalysis, photocatalysis, etc. Among these oxides, CuCo₂O₄ was selected because of its optimal band gap, very close to the ideal value for solar devices, its low cost, and a potential candidate in the field of energy storage. Herein, we reported the junction Ag/CuCo₂O₄ (5/95 % wt.) prepared by co-precipitation, characterized physically and photo electrochemically. Moreover, its performance was evaluated for the oxidation of methyl orange (MO) under solar light. The X-ray diffraction exhibited narrow peaks ascribed to the spinel CuCo₂O₄ and Ag. The SEM analysis displayed grains with regular shapes. The band gap of CuCo₂O₄ (1.38 eV) was deducted from the diffuse reflectance, and this value decreased down to 1.15 eV due to the synergy effect in the junction. The current-potential (J-E) curve plotted in Na₂SO₄ electrolyte showed a medium hysteresis, characteristic of good chemical stability. The capacitance-2 – potential (C⁻² – E) graph displayed that the spinel behaves as a p-type semiconductor, a property supported by chrono-amperometry. The conduction band, located at 4.05 eV (-0.94 VNHE), was made up of Co³⁺: 3d orbital. The result showed a total discoloration of MO after 2 h of illumination under solar light.Keywords: junction Ag/CuCo₂O₄, semiconductor, environment, sunlight, characterization, depollution
Procedia PDF Downloads 746051 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems
Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar
Abstract:
Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.Keywords: medical device, cyber security, attack, detection, machine learning
Procedia PDF Downloads 3606050 Energy Savings with the Use of LED Lights at the Wastewater Treatment Plant
Authors: Kishen Prathivadi
Abstract:
The Sewer Authority Mid-Coastside (SAM) is a Joint Powers Authority formed in 1976 and provides secondary wastewater treatment to an average flow of 2.0 million gallons per day. SAM owns and operates a Wastewater Treatment Plant (WWTP) and a sanitary sewage collection system that collects sewage from its three member agencies: the City of Half Moon Bay, the Granada Community Services District and Montara Water and Sanitary District. The Sewer Authority Mid-Coastside (SAM) partnered with Pacific Gas & Electric, and its contractor GEL America, to review and replace all inefficient lighting fixtures and bulbs at the SAM treatment plant and administrative office. The project focused on replacing old and inefficient lighting fixtures and bulbs, reducing annual operating and maintenance costs, and reducing SAM’s carbon footprint. The project resulted in a 55% overall energy reduction, higher light quality and acuity, and a total operational savings of $495,000 over ten years.Keywords: energy savings, LED, lighting, electrical
Procedia PDF Downloads 1436049 The Role of Social Media in Activating Youth Participation in the Community
Authors: Raya Hamed Hilal Al Maamari
Abstract:
The Gulf societies have been undergoing radical changes due to the technology transfer. It altered the humanities attitudes, especially, youth habits as they have become an addicted to using social media. This study aimed to find out the ratio of social media in guiding youth to participate with government’s institutions in decision-making and developing their societies. The study considered a descriptive study, social survey method was used on a sample of 100 young from different gulf countries, using an electronic questionnaire, as well as, some interviews with famous leaders of youth groups. Finally, the researcher suggested some effective ways activate youth efforts using social media in an effective manner to plan for the development policy in the community. The findings illustrated that social media plays a vital role in encouraging youth to participate enthusiastically in providing services. Noticeably, social media contains large numbers of youth. Therefore, the influences will be widely and feasible. Moreover, the study indicated the fact that most of the youth teamwork started in social media. Then, it has been growing in the real society.Keywords: community, participation, social media, youth
Procedia PDF Downloads 3776048 The SEMONT Monitoring and Risk Assessment of Environmental EMF Pollution
Authors: Dragan Kljajic, Nikola Djuric, Karolina Kasas-Lazetic, Danka Antic
Abstract:
Wireless communications have been expanded very fast in recent decades. This technology relies on an extensive network of base stations and antennas, using radio frequency signals to transmit information. Devices that use wireless communication, while offering various services, basically act as sources of non-ionizing electromagnetic fields (EMF). Such devices are permanently present in the human vicinity and almost constantly radiate, causing EMF pollution of the environment. This fact has initiated development of modern systems for observation of the EMF pollution, as well as for risk assessment. This paper presents the Serbian electromagnetic field monitoring network – SEMONT, designed for automated, remote and continuous broadband monitoring of EMF in the environment. Measurement results of the SEMONT monitoring at one of the test locations, within the main campus of the University of Novi Sad, are presented and discussed, along with corresponding exposure assessment of the general population, regarding the Serbian legislation.Keywords: EMF monitoring, exposure assessment, sensor nodes, wireless network
Procedia PDF Downloads 2666047 An Educational Program Based on Health Belief Model to Prevent of Non-alcoholic Fatty Liver Disease Among Iranian Women
Authors: Arezoo Fallahi
Abstract:
Background and purpose: Non-alcoholic fatty liver is one of the most common liver disorders, which, as the most important cause of death from liver disease, has unpleasant consequences and complications. The aim of this study was to investigate the effect of an educational intervention based on a health belief model to prevent non-alcoholic fatty liver among women. Materials and Methods: This experimental study was performed among 110 women referring to comprehensive health service centers in Malayer City, west of Iran, in 2023. Using the available sampling method, 110 Participants were divided into experimental and control groups. The data collection tool included demographic characteristics and a questionnaire based on the health belief model. In The experimental group, three one-hour training sessions were conducted in the form of pamphlets, lectures and group discussions. Data were analyzed using SPSS software version 21, by correlation tests, paired t-tests independent t-tests. Results: The mean age of participants was 38.07±6.28 years, and Most of the participants were middle-aged, married, housewives with academic education, middle-income and overweight. After the educational intervention, the mean scores of the constructs include perceived sensitivity (p=0.01), perceived severity (p=0.01), perceived benefits (p=0.01), guidance for internal (p=0.01) and external action (p=0.01), and perceived self-efficacy (p=0.01) in the experimental group were significantly higher than the control group. The score of perceived barriers in the experimental group decreased after training. The perceived obstacles score in the test group decreased after the training (15.2 ± 3.9 v.s 11.2 ± 3.3, (p<0.01). Conclusion: The findings of the study showed that the design and implementation of educational programs based on the constructs of the health belief model can be effective in preventing women from developing higher levels of non-alcoholic fatty liver.Keywords: health, education, believe, behaviour
Procedia PDF Downloads 576046 Elite Female Football Coaches’ Experiences and Reflections in a Male-dominated Environment: The Case of Ghana
Authors: Fiona Soraya Addai-Sundiata, Ernest Yeboah Acheampong, Ralph Frimpong
Abstract:
The rationale of this study is to examine the career experiences of elite female football coaches in Ghana. More importantly, it focus on their motives, the challenges of football coaching and their experiences along their career paths. The study draws from literature on female coaches in football to understand their experiences and reflections in their chosen careers. The findings of the study relied on in-depth semi-structured interviews with five elite female football coaches aged between 28 and 50 years. Participants’ responses reveal that both intrinsic and extrinsic motives drive them into football coaching, including learning experiences from abroad, a strong desire to break the gendered hegemony of coaching in Ghana, serving as role models, enjoyment, satisfaction and passion for their chosen careers. Results indicate that they encountered sociocultural, organisational, personal and interpersonal challenges. Also, they experience gender stereotyping, limited career mobility, sexism and marginalisation, which prevent them from becoming elite coaches. The study provides useful data for stakeholders, including Ghana Football Association (GFA), to use effective strategies (e.g., special incentives for women coaches) to attract and retain women in the football coaching space.Keywords: elite female football coaches, career experiences, gender, motives, trajectories
Procedia PDF Downloads 756045 Elite Female Football Coaches’ Experiences and Reflections in a Male-Dominated Environment: The Case of Ghana
Authors: Fiona Soraya Addai-Sundiata, Ernest Yeboah Acheampong, Ralph Frimpong
Abstract:
The rationale of this study is to examine the career experiences of elite female football coaches in Ghana. More importantly, it focus on their motives, the challenges of football coaching and their experiences along their career paths. The study draws from literature on female coaches in football to understand their experiences and reflections in their chosen careers. The findings of the study relied on in-depth semi-structured interviews with five elite female football coaches aged between 28 and 50 years. Participants’ responses reveal that both intrinsic and extrinsic motives drive them into football coaching including learning experiences from abroad, a strong desire to break the gendered hegemony of coaching in Ghana, serving as role models, enjoyment, satisfaction and passion for their chosen careers. Results indicate that they encountered sociocultural, organisational, personal and interpersonal challenges. Also, they experience gender stereotyping, limited career mobility, sexism and marginalisation, which prevent them from becoming elite coaches. The study provides useful data for stakeholders including Ghana Football Association (GFA) to use effective strategies (e.g., special incentives for women coaches) to attract and retain women in the football coaching space.Keywords: elite female football coaches, career experiences, gender, motives, trajectories
Procedia PDF Downloads 656044 Logical-Probabilistic Modeling of the Reliability of Complex Systems
Authors: Sergo Tsiramua, Sulkhan Sulkhanishvili, Elisabed Asabashvili, Lazare Kvirtia
Abstract:
The paper presents logical-probabilistic methods, models and algorithms for reliability assessment of complex systems, based on which a web application for structural analysis and reliability assessment of systems was created. The reliability assessment process included the following stages, which were reflected in the application: 1) Construction of a graphical scheme of the structural reliability of the system; 2) Transformation of the graphic scheme into a logical representation and modeling of the shortest ways of successful functioning of the system; 3) Description of system operability condition with logical function in the form of disjunctive normal form (DNF); 4) Transformation of DNF into orthogonal disjunction normal form (ODNF) using the orthogonalization algorithm; 5) Replacing logical elements with probabilistic elements in ODNF, obtaining a reliability estimation polynomial and quantifying reliability; 6) Calculation of weights of elements. Using the logical-probabilistic methods, models and algorithms discussed in the paper, a special software was created, by means of which a quantitative assessment of the reliability of systems of a complex structure is produced. As a result, structural analysis of systems, research and designing of optimal structure systems are carried out.Keywords: Complex systems, logical-probabilistic methods, orthogonalization algorithm, reliability, weight of element
Procedia PDF Downloads 776043 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting
Authors: Emily Stamm, Neil Smyth, Elizabeth O'Sullivan
Abstract:
In Identity-Based Encryption (IBE), an identity, such as a username, email address, or domain name, acts as the public key. IBE consolidates the PKI by eliminating the repetitive process of requesting public keys for each message encryption. Two of the most popular schemes are Sakai-Kasahara (SAKKE), which is based on elliptic curve pairings, and the Ducas, Lyubashevsky, and Prest lattice scheme (DLP- Lattice), which is based on quantum-secure lattice cryptography. In or- der to embed the schemes in a standard enterprise setting, both schemes are implemented as shared system libraries and integrated into a REST service that functions at the enterprise level. The performance of both schemes as libraries and services is compared, and the practicalities of implementation and application are discussed. Our performance results indicate that although SAKKE has the smaller key and ciphertext sizes, DLP-Lattice is significantly faster overall and we recommend it for most enterprise use cases.Keywords: identity-based encryption, post-quantum cryptography, lattice-based cryptography, IBE
Procedia PDF Downloads 1476042 Critical Design - Concepts, Methods and Practices for Innovative Societal Relationships
Authors: Martina Maria Keitsch
Abstract:
Critical Design (CD) confronts traditional design practice. Instead of reproducing and reinforcing contemporary perceptions of products and services, CD seeks to challenge them with the goal to stimulate debates and visions on societal innovation. CD methods comprise, among other narratives and design of critical objects. The oral presentation is based on a study that discusses concepts, methods, and applications of CD links CD to traditional design, and identifies CD benefits and challenges for design research and practice. The objective of the study is to introduce CD as an alternative for design researchers and practitioners supplementing commercially oriented design approaches. The study utilizes a literature review on CD concepts and methods based on current publications and online documents and illustrates CD practice with help of selected case studies. Findings of the study indicate that CD contribute, among others, to create new societal roles for designers, foster innovative relationships between designers and users, and encourage creativity through imaginative aesthetics.Keywords: critical design, postmodern design theories, narratives, rhizome
Procedia PDF Downloads 1756041 Gymnastics Under Special Surveillance. The Impact of Western Sanctions on Russian Sport
Authors: Aleksandra Majewska
Abstract:
The article analyses the impact of Western sanctions on Russian rhythmic gymnastics since the outbreak of war in Ukraine. The chronological presentation of events shows how international political tensions and economic sanctions have affected the organisation of competitions, training and the careers of athletes. The article outlines the key moments and decisions that have changed the landscape of Russian sport, including the decision to change the citizenship made by some gymnasts in order to continue competing in international competitions. Russia strongly opposes participation in competitions without its flag and anthem while maintaining the view that Russian gymnasts are crucial to the prestige of rhythmic gymnastics in the world. In response to the sanctions, Russia created its own rules for rhythmic gymnastics, according to which they now compete domestically. Furthermore, this sport in Russia is strongly linked to politics, which further emphasises its importance in the national and international context. The information collected derives from numerous interviews with Russian athletes, coaches and other people, which are available only in the Russian language. The findings highlight the significant difficulties Russian athletes have faced due to their isolation in the international arena and the adaptive strategies adopted by Russia in the face of these challenges. The article makes an important contribution to understanding the consequences of global politics on the world of sport and the fate of individual athletes.Keywords: sport, gymnastics, war in Ukraine, sanctions
Procedia PDF Downloads 456040 Retaining Users in a Commercially-Supported Social Network
Authors: Sasiphan Nitayaprapha
Abstract:
A commercially-supported social network has become an emerging channel for an organization to communicate with and provide services to customers. The success of the commercially-supported social network depends on the ability of the organization to keep the customers in participating in the network. Drawing from the theories of information adoption, information systems continuance, and web usability, the author develops a model to explore how a commercially-supported social network can encourage customers to continue participating and using the information in the network. The theoretical model will be proved through an online survey of customers using the commercially-supported social networking sites of several high technology companies operating in the same sector. The result will be compared with previous studies to learn about the explanatory power of the research model, and to identify the main factors determining users’ intention to continue using a commercially-supported social network. Theoretical and practical implications, and limitations are discussed.Keywords: social network, information adoption, information systems continuance, web usability, user satisfaction
Procedia PDF Downloads 3206039 Secure Mobile E-Business Applications
Authors: Hala A. Alrumaih
Abstract:
It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.Keywords: e-business, mobile applications, risk mitigations, security assurance
Procedia PDF Downloads 2976038 Numerical Solution of Magneto-Hydrodynamic Flow of a Viscous Fluid in the Presence of Nanoparticles with Fractional Derivatives through a Cylindrical Tube
Authors: Muhammad Abdullah, Asma Rashid Butt, Nauman Raza
Abstract:
Biomagnetic fluids like blood play key role in different applications of medical science and bioengineering. In this paper, the magnetohydrodynamic flow of a viscous fluid with magnetic particles through a cylindrical tube is investigated. The fluid is electrically charged in the presence of a uniform external magnetic field. The movement in the fluid is produced due to the cylindrical tube. Initially, the fluid and tube are at rest and at time t=0⁺, the tube starts to move along its axis. To obtain the mathematical model of flow with fractional derivatives fractional calculus approach is used. The solution of the flow model is obtained by using Laplace transformation. The Simon's numerical algorithm is employed to obtain inverse Laplace transform. The hybrid technique, we are employing has less computational effort as compared to other methods. The numerical calculations have been performed with Mathcad software. As the special cases of our problem, the solution of flow model with ordinary derivatives and flow without magnetic particles has been procured. Finally, the impact of non-integer fractional parameter alpha, Hartmann number Ha, and Reynolds number Re on flow and magnetic particles velocity is analyzed and depicted by graphs.Keywords: viscous fluid, magnetic particles, fractional calculus, laplace transformation
Procedia PDF Downloads 2106037 Sensor Data Analysis for a Large Mining Major
Authors: Sudipto Shanker Dasgupta
Abstract:
One of the largest mining companies wanted to look at health analytics for their driverless trucks. These trucks were the key to their supply chain logistics. The automated trucks had multi-level sub-assemblies which would send out sensor information. The use case that was worked on was to capture the sensor signal from the truck subcomponents and analyze the health of the trucks from repair and replacement purview. Open source software was used to stream the data into a clustered Hadoop setup in Amazon Web Services cloud and Apache Spark SQL was used to analyze the data. All of this was achieved through a 10 node amazon 32 core, 64 GB RAM setup real-time analytics was achieved on ‘300 million records’. To check the scalability of the system, the cluster was increased to 100 node setup. This talk will highlight how Open Source software was used to achieve the above use case and the insights on the high data throughput on a cloud set up.Keywords: streaming analytics, data science, big data, Hadoop, high throughput, sensor data
Procedia PDF Downloads 4086036 Detection of Mycobacteria spp by PCR in Raw Milk Samples Collected from Iran
Authors: Shokoufeh Roudashti, Shahin Bahari, Fakhri Haghi, Habib Zeighami, Ghazal Naderi, Paniz Shirmast
Abstract:
Background: Mycobacterium tuberculosis complex (MTBC) causes tuberculosis (TB) in humans and animals. Mycobacterium MTBC is one of the most important species of zoonotic pathogens that can be transmitted from cattle to humans. The disease can transmit to human by direct contact with the infected animals, drinking unpasteurized milk and consumption of uncooked meat. The presence of these opportunistic, pathogenic bacteria in bovine milk has emerged as a public-health concern, especially among individuals who consume raw milk. Tuberculosis MTBC is the predominant infectious cause of morbidity and morality worldwide, It is estimated that one third of the world population (approx. 1.8 billion persons) is infected with M. tuberculosis and each year there are 8 million new cases worldwide. The aim of this study, to detect Mycobacterium MTBC in raw milk samples using polymerase chain reaction (PCR). Materials and Methods: In the present study, 60 raw milk samples were collected from rural areas in Zanjan, Iran. After extraction of DNAs and using special primers for Is6110 gene as a marker, PCR was applied to detect the presence or non-presence of the related gene. Results: According to the findings of this study, 8 (13.5 %) out of 60 milk samples were positive for Mycobacterium spp (P < 0.1). Conclusions: The Outbreak of genus Mycobacteria spp in milk samples were determined to be relatively high in Zanjan, Iran.Keywords: Mycobacteria spp, raw milk, PCR, Zanjan
Procedia PDF Downloads 301