Search results for: information warfare techniques
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16295

Search results for: information warfare techniques

9155 Fault Detection and Diagnosis of Broken Bar Problem in Induction Motors Base Wavelet Analysis and EMD Method: Case Study of Mobarakeh Steel Company in Iran

Authors: M. Ahmadi, M. Kafil, H. Ebrahimi

Abstract:

Nowadays, induction motors have a significant role in industries. Condition monitoring (CM) of this equipment has gained a remarkable importance during recent years due to huge production losses, substantial imposed costs and increases in vulnerability, risk, and uncertainty levels. Motor current signature analysis (MCSA) is one of the most important techniques in CM. This method can be used for rotor broken bars detection. Signal processing methods such as Fast Fourier transformation (FFT), Wavelet transformation and Empirical Mode Decomposition (EMD) are used for analyzing MCSA output data. In this study, these signal processing methods are used for broken bar problem detection of Mobarakeh steel company induction motors. Based on wavelet transformation method, an index for fault detection, CF, is introduced which is the variation of maximum to the mean of wavelet transformation coefficients. We find that, in the broken bar condition, the amount of CF factor is greater than the healthy condition. Based on EMD method, the energy of intrinsic mode functions (IMF) is calculated and finds that when motor bars become broken the energy of IMFs increases.

Keywords: broken bar, condition monitoring, diagnostics, empirical mode decomposition, fourier transform, wavelet transform

Procedia PDF Downloads 147
9154 On Adaptive and Auto-Configurable Apps

Authors: Prisa Damrongsiri, Kittinan Pongpianskul, Mario Kubek, Herwig Unger

Abstract:

Apps are today the most important possibility to adapt mobile phones and computers to fulfill the special needs of their users. Location- and context-sensitive programs are hereby the key to support the interaction of the user with his/her environment and also to avoid an overload with a plenty of dispensable information. The contribution shows, how a trusted, secure and really bi-directional communication and interaction among users and their environment can be established and used, e.g. in the field of home automation.

Keywords: apps, context-sensitive, location-sensitive, self-configuration, mobile computing, smart home

Procedia PDF Downloads 393
9153 Integral Form Solutions of the Linearized Navier-Stokes Equations without Deviatoric Stress Tensor Term in the Forward Modeling for FWI

Authors: Anyeres N. Atehortua Jimenez, J. David Lambraño, Juan Carlos Muñoz

Abstract:

Navier-Stokes equations (NSE), which describe the dynamics of a fluid, have an important application on modeling waves used for data inversion techniques as full waveform inversion (FWI). In this work a linearized version of NSE and its variables, neglecting deviatoric terms of stress tensor, is presented. In order to get a theoretical modeling of pressure p(x,t) and wave velocity profile c(x,t), a wave equation of visco-acoustic medium (VAE) is written. A change of variables p(x,t)=q(x,t)h(ρ), is made on the equation for the VAE leading to a well known Klein-Gordon equation (KGE) describing waves propagating in variable density medium (ρ) with dispersive term α^2(x). KGE is reduced to a Poisson equation and solved by proposing a specific function for α^2(x) accounting for the energy dissipation and dispersion. Finally, an integral form solution is derived for p(x,t), c(x,t) and kinematics variables like particle velocity v(x,t), displacement u(x,t) and bulk modulus function k_b(x,t). Further, it is compared this visco-acoustic formulation with another form broadly used in the geophysics; it is argued that this formalism is more general and, given its integral form, it may offer several advantages from the modern parallel computing point of view. Applications to minimize the errors in modeling for FWI applied to oils resources in geophysics are discussed.

Keywords: Navier-Stokes equations, modeling, visco-acoustic, inversion FWI

Procedia PDF Downloads 514
9152 Valuing Cultural Ecosystem Services of Natural Treatment Systems Using Crowdsourced Data

Authors: Andrea Ghermandi

Abstract:

Natural treatment systems such as constructed wetlands and waste stabilization ponds are increasingly used to treat water and wastewater from a variety of sources, including stormwater and polluted surface water. The provision of ancillary benefits in the form of cultural ecosystem services makes these systems unique among water and wastewater treatment technologies and greatly contributes to determine their potential role in promoting sustainable water management practices. A quantitative analysis of these benefits, however, has been lacking in the literature. Here, a critical assessment of the recreational and educational benefits in natural treatment systems is provided, which combines observed public use from a survey of managers and operators with estimated public use as obtained using geotagged photos from social media as a proxy for visitation rates. Geographic Information Systems (GIS) are used to characterize the spatial boundaries of 273 natural treatment systems worldwide. Such boundaries are used as input for the Application Program Interfaces (APIs) of two popular photo-sharing websites (Flickr and Panoramio) in order to derive the number of photo-user-days, i.e., the number of yearly visits by individual photo users in each site. The adequateness and predictive power of four univariate calibration models using the crowdsourced data as a proxy for visitation are evaluated. A high correlation is found between photo-user-days and observed annual visitors (Pearson's r = 0.811; p-value < 0.001; N = 62). Standardized Major Axis (SMA) regression is found to outperform Ordinary Least Squares regression and count data models in terms of predictive power insofar as standard verification statistics – such as the root mean square error of prediction (RMSEP), the mean absolute error of prediction (MAEP), the reduction of error (RE), and the coefficient of efficiency (CE) – are concerned. The SMA regression model is used to estimate the intensity of public use in all 273 natural treatment systems. System type, influent water quality, and area are found to statistically affect public use, consistently with a priori expectations. Publicly available information regarding the home location of the sampled visitors is derived from their social media profiles and used to infer the distance they are willing to travel to visit the natural treatment systems in the database. Such information is analyzed using the travel cost method to derive monetary estimates of the recreational benefits of the investigated natural treatment systems. Overall, the findings confirm the opportunities arising from an integrated design and management of natural treatment systems, which combines the objectives of water quality enhancement and provision of cultural ecosystem services through public use in a multi-functional approach and compatibly with the need to protect public health.

Keywords: constructed wetlands, cultural ecosystem services, ecological engineering, waste stabilization ponds

Procedia PDF Downloads 174
9151 Expression of Hypoxia-Inducible Transmembrane Carbonic Anhydrases IX, Ca XII and Glut 1 in Ovarian Cancer

Authors: M. Sunitha, B. Nithyavani, Mathew Yohannan, S. Thiruvieni Balajji, M. A. Rathi, C. Arul Raj, P. Ragavendran, V. K. Gopalkrishnan

Abstract:

Establishment of an early and reliable biomarker for ovarian carcinogenesis whose expression can be monitored through noninvasive techniques will enable early diagnosis of cancer. Carbonic anhydrases (CA) isozymes IX and XII have been suggested to play a role in oncogenic processes. In von Hippel-Lindau (VHL)-defective tumors, the cell surface transmembrane carbonic anhydrase (CA) CA XI and CA XII genes are overexpressed because of the absence of pVHL. These enzymes are involved in causing a hypoxia condition, thereby providing an environment for metastasis. Aberrant expression of the facilitative glucose transporter GLUT I is found in a wide spectrum of epithelial malignancies. Studying the mRNA expression of CA IX, CA XII and Glut I isozymes in ovarian cancer cell lines (OAW-42 and PA-1) revealed the expression of these hypoxia genes. Immunohistochemical staining of carbonic anhydrases was also performed in 40 ovarian cancer tissues. CA IX and CA XII were expressed at 540 bp and 520 bp in OAW42, PA1 in ovarian cancer cell lines. GLUT-1 was expressed at 325bp in OAW 42, PA1 genes in ovarian cancer cell lines. Immunohistochemistry revealed high to moderate levels of expression of these enzymes. The immuostaining was seen predominantly on the cell surface membrane. The study concluded that these genes CA IX, CA XII and Glut I are expressed under hypoxic condition in tumor cells. From the present results expression of CA IX, XII and Glut I may represent potential targets in ovarian cancer therapy.

Keywords: ovarian cancer, carbonic anhydrase IX, XII, Glut I, tumor markers

Procedia PDF Downloads 365
9150 Visualizing the Consequences of Smoking Using Augmented Reality

Authors: B. Remya Mohan, Kamal Bijlani, R. Jayakrishnan

Abstract:

Visualization in an educational context provides the learner with visual means of information. Conceptualizing certain circumstances such as consequences of smoking can be done more effectively with the help of the technology, Augmented Reality (AR). It is a new methodology for effective learning. This paper proposes an approach on how AR based on Marker Technology simulates the harmful effects of smoking and its consequences using Unity 3D game engine. The study also illustrates the impact of AR technology on students for better learning. AR technology can be used as a method to improve learning.

Keywords: augmented reality, marker technology, multi-platform, virtual buttons

Procedia PDF Downloads 570
9149 2 Stage CMOS Regulated Cascode Distributed Amplifier Design Based On Inductive Coupling Technique in Submicron CMOS Process

Authors: Kittipong Tripetch, Nobuhiko Nakano

Abstract:

This paper proposes one stage and two stage CMOS Complementary Regulated Cascode Distributed Amplifier (CRCDA) design based on Inductive and Transformer coupling techniques. Usually, Distributed amplifier is based on inductor coupling between gate and gate of MOSFET and between drain and drain of MOSFET. But this paper propose some new idea, by coupling with differential primary windings of transformer between gate and gate of MOSFET first stage and second stage of regulated cascade amplifier and by coupling with differential secondary windings transformer of MOSFET between drain and drain of MOSFET first stage and second stage of regulated cascade amplifier. This paper also proposes polynomial modeling of Silicon Transformer passive equivalent circuit from Nanyang Technological University which is used to extract frequency response of transformer. Cadence simulation results are used to verify validity of transformer polynomial modeling which can be used to design distributed amplifier without Cadence. 4 parameters of scattering matrix of 2 port of the propose circuit is derived as a function of 4 parameters of impedance matrix.

Keywords: CMOS regulated cascode distributed amplifier, silicon transformer modeling with polynomial, low power consumption, distribute amplification technique

Procedia PDF Downloads 504
9148 Reviving Arid Lands: The Transformative Potential of Biochar in Arab Countries' Agriculture

Authors: Ahmed Azizeldein Abubaker Abdelhafez

Abstract:

This review explores the application of biochar as a strategy for enhancing soil fertility in arid regions, with a focus on Arab countries. Biochar, derived from the carbonization of biomass under low-oxygen conditions, has shown promise in improving the physical and chemical properties of soil, such as increasing water retention and nutrient availability. Despite the challenging conditions of arid and semi-arid regions, characterized by poor soil fertility and severe land degradation, biochar application has emerged as a viable method to enhance agricultural productivity and mitigate environmental issues. This paper examines various aspects of biochar, including production methods, such as pyrolysis and gasification, and the effects of biochar on soil fertility. It discusses different application techniques and presents case studies from Arab countries like Egypt, the United Arab Emirates, Saudi Arabia, Qatar, Oman, and Kuwait, highlighting the successes and challenges faced in implementing biochar technology. The review also addresses the limitations of biochar use in arid regions and suggests future research directions to optimize its effectiveness. Overall, this study underscores the potential of biochar to contribute significantly to sustainable agriculture and ecological restoration in arid environments, advocating for integrated strategies that combine biochar application with other innovative agricultural practices.

Keywords: biochar, soil fertility, arid region, Arab countries, challenges and limitations

Procedia PDF Downloads 36
9147 Digitalization: The Uneven Geography of Information and Communication Technology (ICTS) CTSoss Four Major States in India

Authors: Sanchari Mukhopadhyay

Abstract:

Today, almost the entire realm of human activities are becoming increasingly dependent on the power of information, where through ICTs it is now possible to cater distances and avail various services at a few clicks. In principle, ICTs are thus expected to blur location-specific differences and affiliations of development and bring in an inclusive society at the wake of globalization. However, eventually researchers and policy analysts realized that ICTs are also generating inequality in spite of the hope for an integrated world and widespread social well-being. Regarding this unevenness, location plays a major role as often ICT development is seen to be concentrated into pockets, leaving behind large tracks as underprivileged. Thus, understanding the spatial pattern of ICT development and distribution is significant in relation to exploring the extent to which ICTs are fulfilling the promises or reassuring the existing divisions. In addition, it is also profoundly crucial to investigate how regions are connecting and competing both locally and globally. The focus of the research paper is to evaluate the spatial structure of ICT led development in India. Thereby, it attempts to understand the state level (four selected states) pattern of ICT penetration, the pattern of diffusion across districts with respect to large urban centres and the rural-urban disparity of technology adoption. It also tries to assess the changes in access dynamisms of ICTs as one move away from a large metropolitan city towards the periphery. In brief, the analysis investigates into the tendency towards the uneven growth of development through the identification of the core areas of ICT advancement within the country and its diffusion from the core to the periphery. In order to assess the level of ICT development and rural-urban disparity across the districts of selected states, two indices named ICT Development Index and Rural-Urban Digital Divide Index have been constructed. The study mostly encompasses the latest Census (2011) of the country and TRAI (Telecom Regulatory Authority of India) in some cases.

Keywords: ICT development, diffusion, core-periphery, digital divide

Procedia PDF Downloads 330
9146 An Ensemble Learning Method for Applying Particle Swarm Optimization Algorithms to Systems Engineering Problems

Authors: Ken Hampshire, Thomas Mazzuchi, Shahram Sarkani

Abstract:

As a subset of metaheuristics, nature-inspired optimization algorithms such as particle swarm optimization (PSO) have shown promise both in solving intractable problems and in their extensibility to novel problem formulations due to their general approach requiring few assumptions. Unfortunately, single instantiations of algorithms require detailed tuning of parameters and cannot be proven to be best suited to a particular illustrative problem on account of the “no free lunch” (NFL) theorem. Using these algorithms in real-world problems requires exquisite knowledge of the many techniques and is not conducive to reconciling the various approaches to given classes of problems. This research aims to present a unified view of PSO-based approaches from the perspective of relevant systems engineering problems, with the express purpose of then eliciting the best solution for any problem formulation in an ensemble learning bucket of models approach. The central hypothesis of the research is that extending the PSO algorithms found in the literature to real-world optimization problems requires a general ensemble-based method for all problem formulations but a specific implementation and solution for any instance. The main results are a problem-based literature survey and a general method to find more globally optimal solutions for any systems engineering optimization problem.

Keywords: particle swarm optimization, nature-inspired optimization, metaheuristics, systems engineering, ensemble learning

Procedia PDF Downloads 92
9145 An Experience Report on Course Teaching in Information Systems

Authors: Carlos Oliveira

Abstract:

This paper is a criticism of the traditional model of teaching and presents alternative teaching methods, different from the traditional lecture. These methods are accompanied by reports of experience of their application in a class. It was concluded that in the lecture, the student has a low learning rate and that other methods should be used to make the most engaging learning environment for the student, contributing (or facilitating) his learning process. However, the teacher should not use a single method, but rather a range of different methods to ensure the learning experience does not become repetitive and fatiguing for the student.

Keywords: educational practices, experience report, IT in education, teaching methods

Procedia PDF Downloads 392
9144 The Impact of Social Media Exposure on COVID- 19 Vaccine Hesitancy “A Comparative Study on the Public in Egypt and the United Arab Emirates”

Authors: Lamiaa Shehata

Abstract:

The current (COVID-19) pandemic is one of the international crises, and a lot of efforts have been directed toward the improvement of efficient vaccines, however vaccine hesitancy is one of the universal menaces that make the fulfillment of society immunity very hard. The World Health Organization acknowledges vaccine hesitancy as the society’s maximum risk to people's health protection, especially in little and moderate-revenue nations. Social media is strong in observing audience behaviors and evaluating the circulation, which would supply useful data for strategy makers. It has a significant function in spreading facts during the pandemic, it could assist to boost protective manners. The objective of this study is to determine the effects of social media exposure on vaccine hesitancy. Data were collected using a survey in a form of a structured questionnaire conducted during December 2021- January 2022 using convenient sampling techniques (680) in Egypt and the United Arab Emirates. The results revealed that there was a significant relationship between the high exposure to social media and the refusal of the Covid19 vaccine also, the percentage of the refusal of the vaccine is higher in Egypt, however, UAE forced people to take the vaccine. Furthermore, public attitudes toward COVID-19 vaccination vary from gender and region. In conclusion, policymakers must adjust their policies through the use of social media to immediate actions to vaccine-related news to support vaccination approval.

Keywords: COVID-19, hesitancy, social media, vaccine

Procedia PDF Downloads 133
9143 Automatic Tuning for a Systemic Model of Banking Originated Losses (SYMBOL) Tool on Multicore

Authors: Ronal Muresano, Andrea Pagano

Abstract:

Nowadays, the mathematical/statistical applications are developed with more complexity and accuracy. However, these precisions and complexities have brought as result that applications need more computational power in order to be executed faster. In this sense, the multicore environments are playing an important role to improve and to optimize the execution time of these applications. These environments allow us the inclusion of more parallelism inside the node. However, to take advantage of this parallelism is not an easy task, because we have to deal with some problems such as: cores communications, data locality, memory sizes (cache and RAM), synchronizations, data dependencies on the model, etc. These issues are becoming more important when we wish to improve the application’s performance and scalability. Hence, this paper describes an optimization method developed for Systemic Model of Banking Originated Losses (SYMBOL) tool developed by the European Commission, which is based on analyzing the application's weakness in order to exploit the advantages of the multicore. All these improvements are done in an automatic and transparent manner with the aim of improving the performance metrics of our tool. Finally, experimental evaluations show the effectiveness of our new optimized version, in which we have achieved a considerable improvement on the execution time. The time has been reduced around 96% for the best case tested, between the original serial version and the automatic parallel version.

Keywords: algorithm optimization, bank failures, OpenMP, parallel techniques, statistical tool

Procedia PDF Downloads 364
9142 Effect of Naameh Landfill (Lebanon) on Groundwater Quality of the Surrounding Area

Authors: Rana Sawaya, Jalal Halwani, Isam Bashour, Nada Nehme

Abstract:

Mismanagement of municipal solid wastes in Lebanon might lead to serious environmental problems, especially that a big portion of mixed wastes including putrescible is transferred to Naameh landfill. One of the consequences of municipal solid waste deposition is the production of landfill leachate, which if unproperly treated will threaten the main crucial matrices such as soil, water, and air. The main aim of this one of a kind study is to assess the risk posed to groundwater as a result of leachate infiltration on off-site wells especially after stoppage of Naameh landfill's operation end of the year 2016 and initiation of the capping process which is still ongoing and will be finalized in December 2019. For this purpose, nine representative points around the landfill were selected to undergo physicochemical and microbial analysis on a seasonal basis (every three months). The study extended from the year 2014 until the end of the year 2016 (closure of Naameh landfill). The preliminary data obtained are statistically analyzed using the Statistical Package for Social Sciences (SPSS) and was found in conformity with international and Lebanese norms. Thus, the study will be extended an additional year, especially after the finalization of capping and the results obtained, will enable us to propose new techniques and tools (treatment systems) in water resources management depending on the direction of its usage (domestic, irrigation, drinking).

Keywords: contamination, groundwater, leachate, Lebanon, solid waste

Procedia PDF Downloads 128
9141 Academic Literacy: Semantic-Discursive Resource and the Relationship with the Constitution of Genre for the Development of Writing

Authors: Lucia Rottava

Abstract:

The present study focuses on academic literacy and addresses the impact of semantic-discursive resources on the constitution of genres that are produced in such context. The research considers the development of writing in the academic context in Portuguese. Researches that address academic literacy and the characteristics of the texts produced in this context are rare, mainly with focus on the development of writing, considering three variables: the constitution of the writer, the perception of the reader/interlocutor and the organization of the informational text flow. The research aims to map the semantic-discursive resources of the written register in texts of several genres and produced by students in the first semester of the undergraduate course in letters. The hypothesis raised is that writing in the academic environment is not a recurrent literacy practice for these learners and can be explained by the ontogenetic and phylogenetic nature of language development. Qualitative in nature, the present research has as empirical data texts produced in a half-yearly course of Reading and Textual Production; these data result from the proposition of four different writing proposals, in a total of 600 texts. The corpus is analyzed based on semantic-discursive resources, seeking to contemplate relevant aspects of language (grammar, discourse and social context) that reveal the choices made in the reader/writer interrelationship and the organizational flow of the text. Among the semantic-discursive resources, the analysis includes three resources, including (a) appraisal and negotiation to understand the attitudes negotiated (roles of the participants of the discourse and their relationship with the other); (b) ideation to explain the construction of the experience (activities performed and participants); and (c) periodicity to outline the flow of information in the organization of the text according to the genre it instantiates. The results indicate the organizational difficulties of the flow of the text information. Cartography contributes to the understanding of the way writers use language in an effort to present themselves, evaluate someone else’s work, and communicate with readers.

Keywords: academic writing, portuguese mother tongue, semantic-discursive resources, sistemic funcional linguistic

Procedia PDF Downloads 119
9140 Understanding the Fundamental Driver of Semiconductor Radiation Tolerance with Experiment and Theory

Authors: Julie V. Logan, Preston T. Webster, Kevin B. Woller, Christian P. Morath, Michael P. Short

Abstract:

Semiconductors, as the base of critical electronic systems, are exposed to damaging radiation while operating in space, nuclear reactors, and particle accelerator environments. What innate property allows some semiconductors to sustain little damage while others accumulate defects rapidly with dose is, at present, poorly understood. This limits the extent to which radiation tolerance can be implemented as a design criterion. To address this problem of determining the driver of semiconductor radiation tolerance, the first step is to generate a dataset of the relative radiation tolerance of a large range of semiconductors (exposed to the same radiation damage and characterized in the same way). To accomplish this, Rutherford backscatter channeling experiments are used to compare the displaced lattice atom buildup in InAs, InP, GaP, GaN, ZnO, MgO, and Si as a function of step-wise alpha particle dose. With this experimental information on radiation-induced incorporation of interstitial defects in hand, hybrid density functional theory electron densities (and their derived quantities) are calculated, and their gradient and Laplacian are evaluated to obtain key fundamental information about the interactions in each material. It is shown that simple, undifferentiated values (which are typically used to describe bond strength) are insufficient to predict radiation tolerance. Instead, the curvature of the electron density at bond critical points provides a measure of radiation tolerance consistent with the experimental results obtained. This curvature and associated forces surrounding bond critical points disfavors localization of displaced lattice atoms at these points, favoring their diffusion toward perfect lattice positions. With this criterion to predict radiation tolerance, simple density functional theory simulations can be conducted on potential new materials to gain insight into how they may operate in demanding high radiation environments.

Keywords: density functional theory, GaN, GaP, InAs, InP, MgO, radiation tolerance, rutherford backscatter channeling

Procedia PDF Downloads 169
9139 Off-Policy Q-learning Technique for Intrusion Response in Network Security

Authors: Zheni S. Stefanova, Kandethody M. Ramachandran

Abstract:

With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS.

Keywords: cyber security, intrusion prevention, optimal policy, Q-learning

Procedia PDF Downloads 231
9138 Clinicians’ Experiences with IT Systems in a UK District General Hospital: A Qualitative Analysis

Authors: Sunny Deo, Eve Barnes, Peter Arnold-Smith

Abstract:

Introduction: Healthcare technology is a rapidly expanding field in healthcare, with enthusiasts suggesting a revolution in the quality and efficiency of healthcare delivery based on the utilisation of better e-healthcare, including the move to paperless healthcare. The role and use of computers and programmes for healthcare have been increasing over the past 50 years. Despite this, there is no standardised method of assessing the quality of hardware and software utilised by frontline healthcare workers. Methods and subjects: Based on standard Patient Related Outcome Measures, a questionnaire was devised with the aim of providing quantitative and qualitative data on clinicians’ perspectives of their hospital’s Information Technology (IT). The survey was distributed via the Institution’s Intranet to all contracted doctors, and the survey's qualitative results were analysed. Qualitative opinions were grouped as positive, neutral, or negative and further sub-grouped into speed/usability, software/hardware, integration, IT staffing, clinical risk, and wellbeing. Analysis was undertaken on the basis of doctor seniority and by specialty. Results: There were 196 responses, with 51% from senior doctors (consultant grades) and the rest from junior grades, with the largest group of respondents 52% coming from medicine specialties. Differences in the proportion of principle and sub-groups were noted by seniority and specialty. Negative themes were by far the commonest stated opinion type, occurring in almost 2/3’s of responses (63%), while positive comments occurred less than 1 in 10 (8%). Conclusions: This survey confirms strongly negative attitudes to the current state of electronic documentation and IT in a large single-centre cohort of hospital-based frontline physicians after two decades of so-called progress to a paperless healthcare system. Greater use would provide further insights and potentially optimise the focus of development and delivery to improve the quality and effectiveness of IT for clinicians and their patients.

Keywords: information technology, electronic patient records, digitisation, paperless healthcare

Procedia PDF Downloads 87
9137 VHL, PBRM1, and SETD2 Genes in Kidney Cancer: A Molecular Investigation

Authors: Rozhgar A. Khailany, Mehri Igci, Emine Bayraktar, Sakip Erturhan, Metin Karakok, Ahmet Arslan

Abstract:

Kidney cancer is the most lethal urological cancer accounting for 3% of adult malignancies. VHL, a tumor-suppressor gene, is best known to be associated with renal cell carcinoma (RCC). The VHL functions as negative regulator of hypoxia inducible factors. Recent sequencing efforts have identified several novel frequent mutations of histone modifying and chromatin remodeling genes in ccRCC (clear cell RCC) including PBRM1 and SETD2. The PBRM1 gene encodes the BAF180 protein, which involved in transcriptional activation and repression of selected genes. SETD2 encodes a histone methyltransferase, which may play a role in suppressing tumor development. In this study, RNAs of 30 paired tumor and normal samples that were grouped according to the types of kidney cancer and clinical characteristics of patients, including gender and average age were examined by RT-PCR, SSCP and sequencing techniques. VHL, PBRM1 and SETD2 expressions were relatively down-regulated. However, statistically no significance was found (Wilcoxon signed rank test, p > 0.05). Interestingly, no mutation was observed on the contrary of previous studies. Understanding the molecular mechanisms involved in the pathogenesis of RCC has aided the development of molecular-targeted drugs for kidney cancer. Further analysis is required to identify the responsible genes rather than VHL, PBRM1 and SETD2 in kidney cancer.

Keywords: kidney cancer, molecular biomarker, expression analysis, mutation screening

Procedia PDF Downloads 454
9136 Comparison of Quality Indices for Sediment Assessment in Ireland

Authors: Tayyaba Bibi, Jenny Ronan, Robert Hernan, Kathleen O’Rourke, Brendan McHugh, Evin McGovern, Michelle Giltrap, Gordon Chambers, James Wilson

Abstract:

Sediment contamination is a major source of ecosystem stress and has received significant attention from the scientific community. Both the Water Framework Directive (WFD) and Marine Strategy Framework Directive (MSFD) require a robust set of tools for biological and chemical monitoring. For the MSFD in particular, causal links between contaminant and effects need to be assessed. Appropriate assessment tools are required in order to make an accurate evaluation. In this study, a range of recommended sediment bioassays and chemical measurements are assessed in a number of potentially impacted and lowly impacted locations around Ireland. Previously, assessment indices have been developed on individual compartments, i.e. contaminant levels or biomarker/bioassay responses. A number of assessment indices are applied to chemical and ecotoxicological data from the Seachange project (Project code) and compared including the metal pollution index (MPI), pollution load index (PLI) and Chapman index for chemistry as well as integrated biomarker response (IBR). The benefits and drawbacks of the use of indices and aggregation techniques are discussed. In addition to this, modelling of raw data is investigated to analyse links between contaminant and effects.

Keywords: bioassays, contamination indices, ecotoxicity, marine environment, sediments

Procedia PDF Downloads 223
9135 Empowering Through Photovoice and Entrepreneurship: A Lived Experience of Alcohol-Induced Disorder and Recovery in Zambia

Authors: Rabson Banda

Abstract:

This abstract delves into the transformative journey of Rabson Banda, a visionary leader in Zambia who has harnessed the power of photovoice, mental fitness, and entrepreneurship to combat substance use disorders in the face of limited job opportunities in Africa. Rabson's personal battle with alcohol-induced disorder serves as the foundation for his pioneering work in establishing Elevated Initiatives, a grassroots organization dedicated to empowering individuals struggling with addiction through innovative approaches. Through the lens of photovoice, Rabson Banda amplifies the voices of those affected by substance abuse, providing a platform for self-expression and healing. By intertwining mental fitness techniques and entrepreneurial skills, he equips individuals with the tools needed to break free from the cycle of addiction and chart a new path toward holistic wellness and economic independence. Rabson Banda's story embodies resilience, hope, and the unwavering belief in the transformative power of community-driven initiatives. His work not only addresses the immediate challenges of substance use disorders but also addresses the root causes of addiction by advocating for increased job opportunities and economic empowerment in Zambia and across Africa for decent job creation and Entrepreneurship: A Lived Experience of Alcohol-Induced Disorder and Recovery in Zambia.

Keywords: mental fitness, entrepreneurship, photovoice, descent jobs

Procedia PDF Downloads 34
9134 Growth Model and Properties of a 3D Carbon Aerogel

Authors: J. Marx, D. Smazna, R. Adelung, B. Fiedler

Abstract:

Aerographite is a 3D interconnected carbon foam. Its tetrapodal morphology is based on the zinc oxide (ZnO) template structure, which is replicated in the chemical vapour deposition (CVD) into a hollow carbon structure. This replication process is analyzed in ex-situ studies via interrupted synthesis and the observation of the reaction progress by using scanning electron (SEM), transmission electron microscopy (TEM) and Raman spectroscopy techniques. Based on the epitaxial growth process, with a layer-by-layer growth behaviour of the wall thickness or number of layers and the catalytical graphitization of the deposited amorphous carbon into graphitic carbon by zinc, a growth model is created. The properties of aerographite, such as the electrical conductivity is dependent on the graphitization and number of layer (wall thickness). Wall thicknesses between 3 nm and 22 nm are achieved by a controlled stepwise reduction of the synthesis time on the basis of the developed growth model, and by a further thermal treatment at 1800 °C the graphitization of the presented carbon foam is modified. The variation of the wall thickness leads to an optimum defect density (ID/IG ratio) and the graphitization to an improvement in the electrical conductivity. Furthermore, a metallic conducting behaviour of untreated and 1800 °C treated aerographite can be observed. Due to these structural and defective modifications, a fundamental structural-property equation for the description of their influences on the electrical conductivity is developed.

Keywords: electrical conductivity, electron microscopy (SEM/TEM), graphitization, wall thickness

Procedia PDF Downloads 150
9133 Mechanical Characterization of Porcine Skin with the Finite Element Method Based Inverse Optimization Approach

Authors: Djamel Remache, Serge Dos Santos, Michael Cliez, Michel Gratton, Patrick Chabrand, Jean-Marie Rossi, Jean-Louis Milan

Abstract:

Skin tissue is an inhomogeneous and anisotropic material. Uniaxial tensile testing is one of the primary testing techniques for the mechanical characterization of skin at large scales. In order to predict the mechanical behavior of materials, the direct or inverse analytical approaches are often used. However, in case of an inhomogeneous and anisotropic material as skin tissue, analytical approaches are not able to provide solutions. The numerical simulation is thus necessary. In this work, the uniaxial tensile test and the FEM (finite element method) based inverse method were used to identify the anisotropic mechanical properties of porcine skin tissue. The uniaxial tensile experiments were performed using Instron 8800 tensile machine®. The uniaxial tensile test was simulated with FEM, and then the inverse optimization approach (or the inverse calibration) was used for the identification of mechanical properties of the samples. Experimentally results were compared to finite element solutions. The results showed that the finite element model predictions of the mechanical behavior of the tested skin samples were well correlated with experimental results.

Keywords: mechanical skin tissue behavior, uniaxial tensile test, finite element analysis, inverse optimization approach

Procedia PDF Downloads 402
9132 Powering Connections: Synergizing Sales and Marketing for Electronics Engineering with Web Development.

Authors: Muhammad Awais Kiani, Abdul Basit Kiani, Maryam Kiani

Abstract:

Synergizing Sales and Marketing for Electronics Engineering with Web Development, explores the dynamic relationship between sales, marketing, and web development within the electronics engineering industry. This study is important for the power of digital platforms to connect with customers. Which increases brand visibility and drives sales. It highlights the need for collaboration between sales and marketing teams, as well as the integration of web development strategies to create seamless user experiences and effective lead generation. Furthermore, It also emphasizes the role of data analytics and customer insights in optimizing sales and marketing efforts in the ever-evolving landscape of electronics engineering. Sales and marketing play a crucial role in driving business growth, and in today's digital landscape, web development has become an integral part of these strategies. Web development enables businesses to create visually appealing and user-friendly websites that effectively showcase their products or services. It allows for the integration of e-commerce functionalities, enabling seamless online transactions. Furthermore, web development helps businesses optimize their online presence through search engine optimization (SEO) techniques, social media integration, and content management systems. This abstract highlights the symbiotic relationship between sales marketing in the electronics industry and web development, emphasizing the importance of a strong online presence in achieving business success.

Keywords: electronics industry, web development, sales, marketing

Procedia PDF Downloads 110
9131 Synthesis of Novel Nanostructure Copper(II) Metal-Organic Complex for Photocatalytic Degradation of Remdesivir Antiviral COVID-19 from Aqueous Solution: Adsorption Kinetic and Thermodynamic Studies

Authors: Sam Bahreini, Payam Hayati

Abstract:

Metal-organic coordination [Cu(L)₄(SCN)₂] was synthesized applying ultrasonic irradiation, and its photocatalytic performance for the degradation of Remdesivir (RS) under sunlight irradiation was systematically explored for the first time in this study. The physicochemical properties of the synthesized photocatalyst were investigated using Fourier-transform infrared (FT-IR), field emission scanning electron microscopy (FE-SEM), powder x-ray diffraction (PXRD), energy-dispersive x-ray (EDX), thermal gravimetric analysis (TGA), diffuse reflectance spectroscopy (DRS) techniques. Systematic examinations were carried out by changing irradiation time, temperature, solution pH value, contact time, RS concentration, and catalyst dosage. The photodegradation kinetic profiles were modeled in pseudo-first order, pseudo-second-order, and intraparticle diffusion models reflected that photodegradation onto [Cu(L)₄(SCN)₂] catalyst follows pseudo-first order kinetic model. The fabricated [Cu(L)₄(SCN)₂] nanostructure bandgap was determined as 2.60 eV utilizing the Kubelka-Munk formula from the diffuse reflectance spectroscopy method. Decreasing chemical oxygen demand (COD) (from 70.5 mgL-1 to 36.4 mgL-1) under optimal conditions well confirmed mineralizing of the RS drug. The values of ΔH° and ΔS° was negative, implying the process of adsorption is spontaneous and more favorable in lower temperatures.

Keywords: Photocatalytic degradation, COVID-19, density functional theory (DFT), molecular electrostatic potential (MEP)

Procedia PDF Downloads 166
9130 A Research on Determining the Viability of a Job Board Website for Refugees in Kenya

Authors: Prince Mugoya, Collins Oduor Ondiek, Patrick Kanyi Wamuyu

Abstract:

Refugee Job Board Website is a web-based application that provides a platform for organizations to post jobs specifically for refugees. Organizations upload job opportunities and refugees can view them on the website. The website also allows refugees to input their skills and qualifications. The methodology used to develop this system is a waterfall (traditional) methodology. Software development tools include Brackets which will be used to code the website and PhpMyAdmin to store all the data in a database.

Keywords: information technology, refugee, skills, utilization, economy, jobs

Procedia PDF Downloads 161
9129 Exploration of Bullying Perceptions in Adolescents in Sekolah Menengah Kejuruan Negeri 1 Manado

Authors: Madjid Nancy, Rakinaung Natalia, Lumowa Fresy

Abstract:

Background: Bullying becomes one of the problems that concern the world of education, especially in adolescents, which has a negative impact on learning achievement, psychology, and physical health. The psychological impact is shame, depression, distress, fear, sadness, and anxiety, so that if prolonged leave can lead to depression in the victim. While the impact on physical health in the form of bruises on the hit area, blisters, swelling and in more severe cases will lead to death. Objectives: This study aims to explore the perception of bullying in adolescent students Sekolah Menengah Kejuruan (SMK) Negeri 1 Manado and the people associated with that adolescent students. Methods: This research uses descriptive qualitative research design and using thematic analysis, and supported by Urie Bronfenbrenner Ecological Framework. The data collection that will be used is by in-depth interview. Sampling using purposive sampling and snowball techniques. This research was conducted at SMK Negeri 1 Manado. Result: From the analysis obtained three themes with the categories: 1) the perception of bullying with categories are: Understanding of Bullying and The Impact of Bullying, 2) the originator of bullying with categories are: Fulfillment of Youth Development Tasks and Needs, Peers Influence, and Family Communication; 3) the effort to handle bullying with categories are: the Individual Coping and Teacher Role. Conclusion: This research get three themes, those are perception of bullying, bullying’s originator and the effort of handling bullying.

Keywords: adolscent, students, bullying, perception

Procedia PDF Downloads 133
9128 Proposal of Non-Destructive Inspection Function Based on Internet of Things Technology Using Drone

Authors: Byoungjoon Yu, Jihwan Park, Sujung Sin, Junghyun Im, Minsoo Park, Sehwan Park, Seunghee Park

Abstract:

In this paper, we propose a technology to monitor the soundness of an Internet-based bridge using a non-conductive inspection function. There has been a collapse accident due to the aging of the bridge structure, and it is necessary to prepare for the deterioration of the bridge. The NDT/SHM system for maintenance of existing bridge structures requires a large number of inspection personnel and expensive inspection costs, and access of expensive and large equipment to measurement points is required. Because current drone inspection equipment can only be inspected through camera, it is difficult to inspect inside damage accurately, and the results of an internal damage evaluation are subjective, and it is difficult for non-specialists to recognize the evaluation results. Therefore, it is necessary to develop NDT/SHM techniques for maintenance of new-concept bridge structures that allow for free movement and real-time evaluation of measurement results. This work is financially supported by Korea Ministry of Land, Infrastructure, and Transport (MOLIT) as 'Smart City Master and Doctor Course Grant Program' and a grant (14SCIP-B088624-01) from Construction Technology Research Program funded by Ministry of Land, Infrastructure and Transport of Korean government.

Keywords: Structural Health Monitoring, SHM, non-contact sensing, nondestructive testing, NDT, Internet of Things, autonomous self-driving drone

Procedia PDF Downloads 262
9127 Lockit: A Logic Locking Automation Software

Authors: Nemanja Kajtez, Yue Zhan, Basel Halak

Abstract:

The significant rise in the cost of manufacturing of nanoscale integrated circuits (IC) has led the majority of IC design companies to outsource the fabrication of their products to other companies, often located in different countries. This multinational nature of the hardware supply chain has led to a host of security threats, including IP piracy, IC overproduction, and Trojan insertion. To combat that, researchers have proposed logic locking techniques to protect the intellectual properties of the design and increase the difficulty of malicious modification of its functionality. However, the adoption of logic locking approaches is rather slow due to the lack of the integration with IC production process and the lack of efficacy of existing algorithms. This work automates the logic locking process by developing software using Python that performs the locking on a gate-level netlist and can be integrated with the existing digital synthesis tools. Analysis of the latest logic locking algorithms has demonstrated that the SFLL-HD algorithm is one of the most secure and versatile in trading-off levels of protection against different types of attacks and was thus selected for implementation. The presented tool can also be expanded to incorporate the latest locking mechanisms to keep up with the fast-paced development in this field. The paper also presents a case study to demonstrate the functionality of the tool and how it could be used to explore the design space and compare different locking solutions. The source code of this tool is available freely from (https://www.researchgate.net/publication/353195333_Source_Code_for_The_Lockit_Tool).

Keywords: design automation, hardware security, IP piracy, logic locking

Procedia PDF Downloads 170
9126 Cryptography Based Authentication Methods

Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf

Abstract:

This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.

Keywords: information security, cryptography, system access control, authentication, network security

Procedia PDF Downloads 465