Search results for: term spread
4512 Psychoeducation to Prevent Spread of HIV Among Men Who Have Sex with Men in Surabaya City
Authors: Christina Albertina Ludwinia Parung, I Gusti Ayu Maya Vratasti
Abstract:
Sexual transmission of HIV among Men who have Sex with Men (MSM) is believed to be one of the sources of the AIDS epidemic. Nowadays, government, communities, and NGOs are taking action to prevent its spread by assisting and educating groups of MSM in their countries. This assistance involves experts in many fields of study, including psychology. In the field of psychology, psychoeducation is believed to be one of the ways to assist the MSM groups. Just like in other countries, this psychoeducation assistance is also needed in Indonesia, where MSM groups are found in many cities within. Surabaya, as the second largest and densely populated city in Indonesia, is known to have a big number of MSM population. In September to December 2020, the author and a colleague conducted a mentoring effort to the MSM community at the MSM community gathering location called Gang Pattaya, in the city of Surabaya. The existence of this community is disguised by the general public, but is well known by NGOs. Community members do MSM out of their liking, although some do it in exchange for money. However, safety factors, such as using condoms for MSM, are not a priority for this community. They do MSM whether they receive a reward or not, just out of a boost of pleasure. There is no attempt to find out the health of the partner once they are attracted to each other. In general, they do not know whether they are infected with HIV. Most of them feel healthy and since they do not show any symptoms, they think it is not necessary to get tested. In the mentoring process, the researchers conduct psychoeducation, which begins with an approach to certain individuals so that they are comfortable with the researchers’ presence, then increasing awareness of safe sex behavior for HIV prevention for groups in the form of counseling using the Theory of Reasoned Action (TRA) approach. Counseling is carried out in various forms including roleplay, games, and seminars. The number of participants was 11 people, varying from 19-47 years old. Pretest related to knowledge of safe sex was carried out before conducting the intervention and post-test after the intervention. The normality test used is the Shapiro-Wilk analysis. Different tests on the data obtained were carried out using the non-parametric Wilcoxon Signed Ranks Test. None of the participants had lower post-test knowledge scores than the pre-test. Prestest and post test for safer sex behavior showed 2 participants with safer sex behavior did not change. Both belong to the senior group, while other participants have an improvement in their safer sex behavior. These findings suggest that intervention programs for MSM as an effort to reduce HIV transmission should pay attention to affective and cognitive coping strategies.Keywords: HIV, men who have sex with men, psychoeducation, psychology health, safer sex behavior, theory of reasoned action
Procedia PDF Downloads 1394511 Luxury in Fashion: Visual Analysis on Bag Advertising
Authors: Lama Ajinah
Abstract:
Luxury brands witnessed continuous growth which followed women’s desire towards individual distinctiveness and social glare. Bags are a woman’s best friend either for aesthetic or functional purposes when she leaves her home for leisure or work. One way of women constant aspiration for being distinguished while reflecting their wealth is through handbags. Subsequently, the demand and attraction by consumers towards the dazzle of luxurious brands for personal pleasure and social status have flourished. According to the literature review, a visual analysis on luxury brands has been explored yet a focus on bags was not discussed in details. Hence, a deep analysis will be dedicated on the two segments by showcasing examples of high-end bag advertising. The research is conducted to understand advertising strategies used in promoting for luxurious products. Furthermore, the paper explores the definition of the term luxury, the condition in which it is used in, and the visual language used along with the term. As luxury is an indicator of superior satisfaction, it is obtained on two levels: a personal and a social level. The examples of luxury brand ads are selected from the last five years to uncover the latest, most common strategies used to promote for luxurious brands. The methods employed in this paper consist of literature review, semiotic analysis, and content analysis. The researcher concludes with revealing the methods used in advertising while categorizing them into various themes.Keywords: advertising, brands, fashion, graphic design, luxury, semiotic analysis, semiology, visual analysis, visual communication
Procedia PDF Downloads 2444510 IPO Valuation and Profitability Expectations: Evidence from the Italian Exchange
Authors: Matteo Bonaventura, Giancarlo Giudici
Abstract:
This paper analyses the valuation process of companies listed on the Italian Exchange in the period 2000-2009 at their Initial Public Offering (IPO). One the most common valuation techniques declared in the IPO prospectus to determine the offer price is the Discounted Cash Flow (DCF) method. We develop a ‘reverse engineering’ model to discover the short term profitability implied in the offer prices. We show that there is a significant optimistic bias in the estimation of future profitability compared to ex-post actual realization and the mean forecast error is substantially large. Yet we show that such error characterizes also the estimations carried out by analysts evaluating non-IPO companies. The forecast error is larger the faster has been the recent growth of the company, the higher is the leverage of the IPO firm, the more companies issued equity on the market. IPO companies generally exhibit better operating performance before the listing, with respect to comparable listed companies, while after the flotation they do not perform significantly different in term of return on invested capital. Pre-IPO book building activity plays a significant role in partially reducing the forecast error and revising expectations, while the market price of the first day of trading does not contain information for further reducing forecast errors.Keywords: initial public offerings, DCF, book building, post-IPO profitability drop
Procedia PDF Downloads 3524509 COVID-19 Teaches Probability Risk Assessment
Authors: Sean Sloan
Abstract:
Probability Risk Assessments (PRA) can be a difficult concept for students to grasp. So in searching for different ways to describe PRA to relate it to their lives; COVID-19 came up. The parallels are amazing. Soon students began analyzing acceptable risk with the virus. This helped them to quantify just how dangerous is dangerous. The original lesson was dismissed and for the remainder of the period, the probability of risk, and the lethality of risk became the topic. Spreading events such as a COVID carrier on an airline became analogous to single fault casualties such as a Tsunami. Odds of spreading became odds of backup-diesel-generator failure – like with Fukashima Daiichi. Fatalities of the disease became expected fatalities due to radiation spread. Quantification from this discussion took it from hyperbole and emotion into one where we could rationally base guidelines. It has been one of the most effective educational devices observed.Keywords: COVID, education, probability, risk
Procedia PDF Downloads 1524508 Tumor Size and Lymph Node Metastasis Detection in Colon Cancer Patients Using MR Images
Authors: Mohammadreza Hedyehzadeh, Mahdi Yousefi
Abstract:
Colon cancer is one of the most common cancer, which predicted to increase its prevalence due to the bad eating habits of peoples. Nowadays, due to the busyness of people, the use of fast foods is increasing, and therefore, diagnosis of this disease and its treatment are of particular importance. To determine the best treatment approach for each specific colon cancer patients, the oncologist should be known the stage of the tumor. The most common method to determine the tumor stage is TNM staging system. In this system, M indicates the presence of metastasis, N indicates the extent of spread to the lymph nodes, and T indicates the size of the tumor. It is clear that in order to determine all three of these parameters, an imaging method must be used, and the gold standard imaging protocols for this purpose are CT and PET/CT. In CT imaging, due to the use of X-rays, the risk of cancer and the absorbed dose of the patient is high, while in the PET/CT method, there is a lack of access to the device due to its high cost. Therefore, in this study, we aimed to estimate the tumor size and the extent of its spread to the lymph nodes using MR images. More than 1300 MR images collected from the TCIA portal, and in the first step (pre-processing), histogram equalization to improve image qualities and resizing to get the same image size was done. Two expert radiologists, which work more than 21 years on colon cancer cases, segmented the images and extracted the tumor region from the images. The next step is feature extraction from segmented images and then classify the data into three classes: T0N0، T3N1 و T3N2. In this article, the VGG-16 convolutional neural network has been used to perform both of the above-mentioned tasks, i.e., feature extraction and classification. This network has 13 convolution layers for feature extraction and three fully connected layers with the softmax activation function for classification. In order to validate the proposed method, the 10-fold cross validation method used in such a way that the data was randomly divided into three parts: training (70% of data), validation (10% of data) and the rest for testing. It is repeated 10 times, each time, the accuracy, sensitivity and specificity of the model are calculated and the average of ten repetitions is reported as the result. The accuracy, specificity and sensitivity of the proposed method for testing dataset was 89/09%, 95/8% and 96/4%. Compared to previous studies, using a safe imaging technique (MRI) and non-use of predefined hand-crafted imaging features to determine the stage of colon cancer patients are some of the study advantages.Keywords: colon cancer, VGG-16, magnetic resonance imaging, tumor size, lymph node metastasis
Procedia PDF Downloads 594507 Part Variation Simulations: An Industrial Case Study with an Experimental Validation
Authors: Narendra Akhadkar, Silvestre Cano, Christophe Gourru
Abstract:
Injection-molded parts are widely used in power system protection products. One of the biggest challenges in an injection molding process is shrinkage and warpage of the molded parts. All these geometrical variations may have an adverse effect on the quality of the product, functionality, cost, and time-to-market. The situation becomes more challenging in the case of intricate shapes and in mass production using multi-cavity tools. To control the effects of shrinkage and warpage, it is very important to correctly find out the input parameters that could affect the product performance. With the advances in the computer-aided engineering (CAE), different tools are available to simulate the injection molding process. For our case study, we used the MoldFlow insight tool. Our aim is to predict the spread of the functional dimensions and geometrical variations on the part due to variations in the input parameters such as material viscosity, packing pressure, mold temperature, melt temperature, and injection speed. The input parameters may vary during batch production or due to variations in the machine process settings. To perform the accurate product assembly variation simulation, the first step is to perform an individual part variation simulation to render realistic tolerance ranges. In this article, we present a method to simulate part variations coming from the input parameters variation during batch production. The method is based on computer simulations and experimental validation using the full factorial design of experiments (DoE). The robustness of the simulation model is verified through input parameter wise sensitivity analysis study performed using simulations and experiments; all the results show a very good correlation in the material flow direction. There exists a non-linear interaction between material and the input process variables. It is observed that the parameters such as packing pressure, material, and mold temperature play an important role in spread on functional dimensions and geometrical variations. This method will allow us in the future to develop accurate/realistic virtual prototypes based on trusted simulated process variation and, therefore, increase the product quality and potentially decrease the time to market.Keywords: correlation, molding process, tolerance, sensitivity analysis, variation simulation
Procedia PDF Downloads 1784506 Pathways and Mechanisms of Lymphocytes Emigration from Newborn Thymus
Authors: Olena Grygorieva
Abstract:
Nowadays mechanisms of thymocytes emigration from the thymus to the periphery are investigated actively. We have proposed a hypothesis of thymocytes’ migration from the thymus through lymphatic vessels during periodical short-term local edema. By morphological, hystochemical methods we have examined quantity of lymphocytes, epitelioreticulocytes, mast cells, blood and lymphatic vessels in morpho-functional areas of rats’ thymuses during the first week after birth in 4 hours interval. In newborn and beginning from 8 hour after birth every 12 hours specific density of the thymus, absolute quantity of microcirculatory vessels, especially of lymphatic ones, lymphcyte-epithelial index, quantity of mast cells and their degranulative forms increase. Structure of extracellular matrix, intrathymical microenvironment and lymphocytes’ adhesive properties change. Absolute quantity of small lymphocytes in thymic cortex changes wavy. All these changes are straightly expressed from 0 till 2, from 12 till 16, from 108 till 120 hours of postnatal life. During this periods paravasal lymphatic vessels are stuffed with lymphocytes, i.e. discrete migration of lymphocytes from the thymus occurs. After rapid edema reduction, quantity of lymphatic vessels decrease, they become empty. Therefore, in the thymus of newborn periodical short-term local edema is observed, on its top discrete migration of lymphocytes from the thymus occurs.Keywords: lymphocytes, lymphatic vessels, mast cells, thymus
Procedia PDF Downloads 2254505 Disconnect between Water, Sanitation and Hygiene Related Behaviours of Children in School and Family
Authors: Rehan Mohammad
Abstract:
Background: Improved Water, Sanitation and Hygiene (WASH) practices in schools ensure children’s health, well-being and cognitive performance. In India under various WASH interventions in schools, teachers, and other staff make every possible effort to educate children about personal hygiene, sanitation practices and harms of open defecation. However, once children get back to their families, they see other practicing inappropriate WASH behaviors, and they consequently start following them. This show disconnect between school behavior and family behavior, which needs to be bridged to achieve desired WASH outcomes. Aims and Objectives: The aim of this study is to assess the factors causing disconnect of WASH-related behaviors between school and the family of children. It also suggests behavior change interventions to bridge the gap. Methodology: The present study has chosen a mixed- method approach. Both quantitative and qualitative methods of data collection have been used in the present study. The purposive sampling for data collection has been chosen. The data have been collected from 20% children in each age group of 04-08 years and 09-12 years spread over three primary schools and 20% of households to which they belong to which is spread over three slum communities in south district of Delhi. Results: The present study shows that despite of several behavior change interventions at school level, children still practice inappropriate WASH behaviors due to disconnect between school and family behaviors. These behaviors show variation from one age group to another. The inappropriate WASH behaviors being practiced by children include open defecation, wrong disposal of garbage, not keeping personal hygiene, not practicing hand washing practices during critical junctures and not washing fruits and vegetables before eating. The present study has highlighted that 80% of children in the age group of 04-08 years still practice inappropriate WASH behaviors when they go back to their families after school whereas, this percentage has reduced to 40% in case of children in the age group 09-12 years. Present study uncovers association between school and family teaching which creates a huge gap between WASH-related behavioral practices. The study has established that children learn and de-learn the WASH behaviors due to the evident disconnect between behavior change interventions at schools and household level. The study has also made it clear that children understand the significance of appropriate WASH practices but owing to the disconnect the behaviors remain unsettled. The study proposes several behavior change interventions to sync the behaviors of children at school and family level to ensure children’s health, well-being and cognitive performance.Keywords: behavioral interventions, child health, family behavior, school behavior, WASH
Procedia PDF Downloads 1114504 The Effects of Irregular Immigration Originating from Syria on Turkey's Security Issues
Authors: Muzaffer Topgul, Hasan Atac
Abstract:
After the September 11 attacks, fight against terrorism has risen to higher levels in security concepts of the countries. The following reactions of some nation states have led to the formation of unstable areas in different parts of the World. Especially, in Iraq and Syria, the influences of radical groups have risen with the weakening of the central governments. Turkey (with the geographical proximity to the current crisis) has become a stop on the movement of people who were displaced because of terrorism. In the process, the policies of the Syrian regime resulted in a civil war which is still going on since 2011, and remain as an unresolved crisis. With the extension of the problem, changes occurred in foreign policies of the World Powers; moreover, the ongoing effects of the riots, conflicts of interests of foreign powers, conflicts in the region because of the activities of radical groups increased instability within the country. This case continues to affect the security of Turkey, particularly illegal immigration. It has exceeded the number of two million Syrians who took refuge in Turkey due to the civil war, while continuing uncertainty about the legal status of asylum seekers, besides the security problems of asylum-seekers themselves, there are problems in education, health and communication (language) as well. In this study, we will evaluate the term of immigration through the eyes of national and international law, place the disorganized and illegal immigration in security sphere, and define the elements/components of irregular migration within the changing security concept. Ultimately, this article will assess the effects of the Syrian refuges to Turkey’s short-term, mid-term, and long-term security in the light of the national and international data flows and solutions will be presented to the ongoing problem. While explaining the security problems the data and the donnees obtained from the nation and international corporations will be examined thorough the human security dimensions such as living conditions of the immigrants, the ratio of the genders, especially birth rate occasions, the education circumstances of the immigrant children, the effects of the illegal passing on the public order. In addition, the demographic change caused by the immigrants will be analyzed, the changing economical conditions where the immigrants mostly accumulate, and their participation in public life will be worked on and the economical obstacles sourcing due to irregular immigration will be clarified. By the entire datum gathered from the educational, cultural, social, economic, demographical extents, the regional factors affecting the migration and the role of irregular migration in Turkey’s future security will be revealed by implication to current knowledge sources.Keywords: displaced people, human security, irregular migration, refugees
Procedia PDF Downloads 3084503 Novel Adaptive Radial Basis Function Neural Networks Based Approach for Short-Term Load Forecasting of Jordanian Power Grid
Authors: Eyad Almaita
Abstract:
In this paper, a novel adaptive Radial Basis Function Neural Networks (RBFNN) algorithm is used to forecast the hour by hour electrical load demand in Jordan. A small and effective RBFNN model is used to forecast the hourly total load demand based on a small number of features. These features are; the load in the previous day, the load in the same day in the previous week, the temperature in the same hour, the hour number, the day number, and the day type. The proposed adaptive RBFNN model can enhance the reliability of the conventional RBFNN after embedding the network in the system. This is achieved by introducing an adaptive algorithm that allows the change of the weights of the RBFNN after the training process is completed, which will eliminates the need to retrain the RBFNN model again. The data used in this paper is real data measured by National Electrical Power co. (Jordan). The data for the period Jan./2012-April/2013 is used train the RBFNN models and the data for the period May/2013- Sep. /2013 is used to validate the models effectiveness.Keywords: load forecasting, adaptive neural network, radial basis function, short-term, electricity consumption
Procedia PDF Downloads 3444502 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester
Procedia PDF Downloads 1484501 A Comparative Study of Deep Learning Methods for COVID-19 Detection
Authors: Aishrith Rao
Abstract:
COVID 19 is a pandemic which has resulted in thousands of deaths around the world and a huge impact on the global economy. Testing is a huge issue as the test kits have limited availability and are expensive to manufacture. Using deep learning methods on radiology images in the detection of the coronavirus as these images contain information about the spread of the virus in the lungs is extremely economical and time-saving as it can be used in areas with a lack of testing facilities. This paper focuses on binary classification and multi-class classification of COVID 19 and other diseases such as pneumonia, tuberculosis, etc. Different deep learning methods such as VGG-19, COVID-Net, ResNET+ SVM, Deep CNN, DarkCovidnet, etc., have been used, and their accuracy has been compared using the Chest X-Ray dataset.Keywords: deep learning, computer vision, radiology, COVID-19, ResNet, VGG-19, deep neural networks
Procedia PDF Downloads 1604500 The Role of Interest Groups in Foreign Policy: Assessing the Influence of the 'Pro-Jakarta Lobby' in Australia and Indonesia's Bilateral Relations
Authors: Bec Strating
Abstract:
This paper examines the ways that domestic politics and pressure–generated through lobbying, public diplomacy campaigns and other tools of soft power-contributes to the formation of short-term and long-term national interests, priorities and strategies of states in their international relations. It primarily addresses the conceptual problems regarding the kinds of influence that lobby groups wield in foreign policy and how this influence might be assessed. Scholarly attention has been paid to influential foreign policy lobbies and interest groups, particularly in the areas of US foreign policy. Less attention has been paid to how lobby groups might influence the foreign policy of a middle power such as Australia. This paper examines some of the methodological complexities in developing and conducting a research project that can measure the nature and influence of lobbies on foreign affairs priorities and activities. This paper will use Australian foreign policy in the context of its historical bilateral relationship with Indonesia as a case study for considering the broader issues of domestic influences on foreign policy. Specifically, this paper will use the so-called ‘pro-Jakarta lobby’ as an example of an interest group. The term ‘pro-Jakarta lobby’ is used in media commentary and scholarship to describe an amorphous collection of individuals who have sought to influence Australian foreign policy in favour of Indonesia. The term was originally applied to a group of Indonesian experts at the Australian National University in the 1980s but expanded to include journalists, think tanks and key diplomats. The concept of the ‘pro-Jakarta lobby’ was developed largely through criticisms of Australia’s support for Indonesia’s sovereignty of East Timor and West Papua. Pro-Independence supporters were integral for creating the ‘lobby’ in their rhetoric and criticisms about the influence on Australian foreign policy. In these critical narratives, the ‘pro-Jakarta lobby’ supported a realist approach to relations with Indonesia during the years of President Suharto’s regime, which saw appeasement of Indonesia as paramount to values of democracy and human rights. The lobby was viewed as integral in embedding a form of ‘foreign policy exceptionalism’ towards Indonesia in Australian policy-making circles. However, little critical and scholarly attention has been paid to nature, aims, strategies and activities of the ‘pro-Jakarta lobby.' This paper engages with methodological issues of foreign policy analysis: what was the ‘pro-Jakarta lobby’? Why was it considered more successful than other activist groups in shaping policy? And how can its influence on Australia’s approach to Indonesia be tested in relation to other contingent factors shaping policy? In addressing these questions, this case study will assist in addressing a broader scholarly concern about the capacities of collectives or individuals in shaping and directing the foreign policies of states.Keywords: foreign policy, interests groups, Australia, Indonesia
Procedia PDF Downloads 3434499 Homogenization of Culture and Its Effect on Preferred Reading of Media Communications Aimed at Members of Generation Z
Authors: Philip Katz
Abstract:
The research examines preferred reading of contemporary ads aimed at Generation Z through digital media. A qualitative analysis of focus groups consisting of members of Generation Z from 13 countries in Europe, the Middle East, South America and Asia has shown that, among this cohort, the influence of national culture does not create a strong impediment to understanding media communications targeting Generation Z. The familiarity of members of Generation Z with other countries’ popular culture through the spread of digital media has allowed a homogenizing effect and allowed a greater understanding of those cultures among this generation that lessens the impact of geographic separation.Keywords: audience, Generation Z, marketing communication, preferred reading
Procedia PDF Downloads 1774498 Estimating the Technological Deviation Impact on the Value of the Output Parameter of the Induction Converter
Authors: Marinka K. Baghdasaryan, Siranush M. Muradyan, Avgen A. Gasparyan
Abstract:
Based on the experimental data, the impact of resistance and reactance of the winding, as well as the magnetic permeability of the magnetic circuit steel material on the value of the electromotive force of the induction converter is investigated. The obtained results allow to estimate the main technological spreads and determine the maximum level of the electromotive force change. By the method of experiment planning, the expression of a polynomial for the electromotive force which can be used to estimate the adequacy of mathematical models to be used at the investigation and design of induction converters is obtained.Keywords: induction converter, electromotive force, expectation, technological spread, deviation, planning an experiment, polynomial, confidence level
Procedia PDF Downloads 4644497 A Review on Using Executive Function to Understand the Limited Efficacy of Weight-Loss Interventions
Authors: H. Soltani, Kevin Laugero
Abstract:
Obesity is becoming an increasingly critical issue in the United States due to the steady and substantial increase in prevalence over the last 30 years. Existing interventions have been able to help participants achieve short-term weight loss, but have failed to show long-term results. The complex nature of behavioral change remains one of the most difficult barriers in promoting sustainable weight-loss in overweight individuals. Research suggests that the 'intention-behavior gap' can be explained by a person’s ability to regulate higher-order thinking, or Executive Function (EF). A review of 63 research articles was completed in fall of 2017 to identify the role of EF in regulating eating behavior and to identify whether there is a potential for improving dietary quality by enhancing EF. Results showed that poor EF is positively associated with obesogenic behavior, namely increased consumption of highly palatable foods, eating in the absence of hunger, high saturated fat intake and low fruit and vegetable consumption. Recent research has indicated that interventions targeting an improvement in EF can be successful in helping promote healthy behaviors. Furthermore, interventions of longer duration have a more lasting and versatile effect on weight loss and maintenance. This may present an opportunity for the increasingly ubiquitous use of mobile application technology.Keywords: eating behavior, executive function, nutrition, obesity, weight-loss
Procedia PDF Downloads 1654496 Gendering Science, Technology and Innovation: The Case of R&D in Turkey
Authors: Setenay Nil Doğan, Ece Oztan
Abstract:
Research and development (R&D) as a term denotes the innovative studies conducted systematically to increase knowledge and its practices. As R&D intensity of Turkey (0,84%) is quite below the EU average intensity score, it has displayed a continuous increase since the 2000s. Also, the development of human capital in R&D has been one of the basic aims of National Strategy of Science, Technology, and Innovation, and National Innovation System 2023 of Turkey. R&D is considered to one of the fields in which the gender gap is wide. The reflections of the analogy of leaky pipeline, a term used for vertical differentiation in academy can also be observed in those scientific activities related with the private sector. In the private sector, the gender gap becomes wider: the percentage of female researchers in the universities (41%) decreases to 24% in the private sector. Though half of the undergraduates and gradutes are female in Turkey, a widening gender gap is observed in terms of employment in R&D. Given this background, this paper will focus on gendered dynamics of careers in R&D through the interviews conducted with 25 female and 25 male employees, working in a university technopark and some of the large RD centers in Turkey working in several sectors such as electronics, automotive etc. Focusing on some aspects of gender differences in terms of career experiences in R&D and innovation, mobility, participation to the projects, patents and inclusion to other innovatory activities, home-work balance, it aims to explore the relationships between science, technology, innovation and gender.Keywords: gender, innovation, R&D, science, technology
Procedia PDF Downloads 4414495 Caring for the Bedridden Older Members: Beliefs and Values of Northern Thai Families
Authors: Budsarin Padwang, Darunee Jongudomkarn, Thawan Nieamsup, Autchareeya Patumwan, Rutja Phuphaibul
Abstract:
In Northern Thailand, a pilot study by the qualitative data, on caring for family members with chronic illness/bedridden based on in-depth interviews of the 12 elderly caregivers in family was carried out during November to December 2017. There are four families that living with three generations in the family. This report is part of a larger study of 'The intergenerational contract of the family in long-term care for older members' to understand the situation and context related to the research questions. Content analysis was obtained and the results revealed as followings. 1) No choice and no freedom: most caregivers were asked by their family members to do the care giving roles because of various appropriate reasons and they could not refuse and felt like having no freedom. 2) ‘Katanyu’ to the parents: The Thai ideology of making merit by taking care of parents was beliefs to do the best in their caregiver roles. 3) The family commitments: The issues of family caring and relationships were the key value of keeping family members to take care of older members with chronic illness/bedridden. The preliminary findings can be beneficial for other regions and will lead to in-depth explore to answer the research questions of the larger study in the future.Keywords: intergenerational contract, long term care, older members, generational family
Procedia PDF Downloads 1564494 Accounting for Downtime Effects in Resilience-Based Highway Network Restoration Scheduling
Authors: Zhenyu Zhang, Hsi-Hsien Wei
Abstract:
Highway networks play a vital role in post-disaster recovery for disaster-damaged areas. Damaged bridges in such networks can disrupt the recovery activities by impeding the transportation of people, cargo, and reconstruction resources. Therefore, rapid restoration of damaged bridges is of paramount importance to long-term disaster recovery. In the post-disaster recovery phase, the key to restoration scheduling for a highway network is prioritization of bridge-repair tasks. Resilience is widely used as a measure of the ability to recover with which a network can return to its pre-disaster level of functionality. In practice, highways will be temporarily blocked during the downtime of bridge restoration, leading to the decrease of highway-network functionality. The failure to take downtime effects into account can lead to overestimation of network resilience. Additionally, post-disaster recovery of highway networks is generally divided into emergency bridge repair (EBR) in the response phase and long-term bridge repair (LBR) in the recovery phase, and both of EBR and LBR are different in terms of restoration objectives, restoration duration, budget, etc. Distinguish these two phases are important to precisely quantify highway network resilience and generate suitable restoration schedules for highway networks in the recovery phase. To address the above issues, this study proposes a novel resilience quantification method for the optimization of long-term bridge repair schedules (LBRS) taking into account the impact of EBR activities and restoration downtime on a highway network’s functionality. A time-dependent integer program with recursive functions is formulated for optimally scheduling LBR activities. Moreover, since uncertainty always exists in the LBRS problem, this paper extends the optimization model from the deterministic case to the stochastic case. A hybrid genetic algorithm that integrates a heuristic approach into a traditional genetic algorithm to accelerate the evolution process is developed. The proposed methods are tested using data from the 2008 Wenchuan earthquake, based on a regional highway network in Sichuan, China, consisting of 168 highway bridges on 36 highways connecting 25 cities/towns. The results show that, in this case, neglecting the bridge restoration downtime can lead to approximately 15% overestimation of highway network resilience. Moreover, accounting for the impact of EBR on network functionality can help to generate a more specific and reasonable LBRS. The theoretical and practical values are as follows. First, the proposed network recovery curve contributes to comprehensive quantification of highway network resilience by accounting for the impact of both restoration downtime and EBR activities on the recovery curves. Moreover, this study can improve the highway network resilience from the organizational dimension by providing bridge managers with optimal LBR strategies.Keywords: disaster management, highway network, long-term bridge repair schedule, resilience, restoration downtime
Procedia PDF Downloads 1504493 Modeling and Simulation for Infection Processes of Bird Flu within a Poultry Farm
Authors: Tertia Delia Nova, Masaji Watanabge
Abstract:
Infection of bird flu within a poultry farm involves hosts, virus, and medium. Intrusion of bird flu into a poultry farm divides the population into two groups; healthy and susceptible chickens and infected chickens. A healthy and susceptible bird is infected to become an infected bird. Bird flu viruses spread among chickens through medium such as air and droppings, and increase in hosts. A model for an infection process of bird flu within a poultry farm is described, numerical techniques are illustrated, and numerical results are introduced.Keywords: bird flu, poultry farm, model for an infection process, flu viruses
Procedia PDF Downloads 2544492 The Comparison of Bird’s Population between Naturally Regenerated Acacia Forest with Adjacent Secondary Indigenous Forest in Universiti Malaysia Sabah
Authors: Jephte Sompud, Emily A. Gilbert, Andy Russel Mojiol, Cynthia B. Sompud, Alim Biun
Abstract:
Naturally regenerated acacia forest and secondary indigenous forest forms some of the urban forests in Sabah. Naturally regenerated acacia trees are usually seen along the road that exists as forest islands. Acacia tree is not an indigenous tree species in Sabah that was introduced in the 1960’s as fire breakers that eventually became one of the preferred trees for forest plantation for paper and pulp production. Due to its adaptability to survive even in impoverished soils and poor-irrigated land, this species has rapidly spread throughout Sabah through natural regeneration. Currently, there is a lack of study to investigate the bird population in the naturally regenerated acacia forest. This study is important because it shed some light on the role of naturally regenerated acacia forest on bird’s population, as bird is known to be a good bioindicator forest health. The aim of this study was to document the bird’s population in naturally regenerated acacia forest with that adjacent secondary indigenous forest. The study site for this study was at Universiti Malaysia Sabah (UMS) Campus. Two forest types in the campus were chosen as a study site, of which were naturally regenerated Acacia Forest and adjacent secondary indigenous forest, located at the UMS Hill. A total of 21 sampling days were conducted in each of the forest types. The method used during this study was solely mist nets with three pockets. Whenever a bird is caught, it is extracted from the net to be identified and measurements were recorded in a standard data sheet. Mist netting was conducted from 6 morning until 5 evening. This study was conducted between February to August 2014. Birds that were caught were ring banded to initiate a long-term study on the understory bird’s population in the Campus The data was analyzed using descriptive analysis, diversity indices, and t-test. The bird population diversity at naturally regenerated Acacia forest with those at the secondary indigenous forest was calculated using two common indices, of which were Shannon-Wiener and Simpson diversity index. There were 18 families with 33 species that were recorded from both sites. The number of species recorded at the naturally regenerated acacia forest was 26 species while at the secondary indigenous forest were 19 species. The Shannon diversity index for Naturally Regenerated Acacia Forest and secondary indigenous forests were 2.87 and 2.46. The results show that there was very significantly higher species diversity at the Naturally Regenerated Acacia Forest as opposed to the secondary indigenous forest (p<0.001). This suggests that Naturally Regenerated Acacia forest plays an important role in urban bird conservation. It is recommended that Naturally Regenerated Acacia Forests should be considered as an established urban forest conservation area as they do play a role in biodiversity conservation. More future studies in Naturally Regenerated Acacia Forest should be encouraged to determine the status and value of biodiversity conservation of this ecosystem.Keywords: naturally regenerated acacia forest, bird population diversity, Universiti Malaysia Sabah, biodiversity conservation
Procedia PDF Downloads 4274491 The Emergence and Influence of Early European Opera: A Historical and Analytical Study
Authors: Yan Jiajun, Baroque Opera, Florentine Camerata
Abstract:
This paper explores the origins, development, and cultural impact of early European opera, particularly focusing on its inception in late 16th century Italy and its subsequent spread across Europe. Through an in-depth analysis of key operas and performers, this study demonstrates how opera served as both a reflection of and an influence on the social, political, and economic landscapes of early modern Europe. The discussion includes the role of public opera houses, the commercialization of the art form, and the significance of the prima donna, supported by references to relevant literature and historical documents.Keywords: early European opera, baroque opera, Florentine camerata, prima donna, cultural impact
Procedia PDF Downloads 114490 Frequency- and Content-Based Tag Cloud Font Distribution Algorithm
Authors: Ágnes Bogárdi-Mészöly, Takeshi Hashimoto, Shohei Yokoyama, Hiroshi Ishikawa
Abstract:
The spread of Web 2.0 has caused user-generated content explosion. Users can tag resources to describe and organize them. Tag clouds provide rough impression of relative importance of each tag within overall cloud in order to facilitate browsing among numerous tags and resources. The goal of our paper is to enrich visualization of tag clouds. A font distribution algorithm has been proposed to calculate a novel metric based on frequency and content, and to classify among classes from this metric based on power law distribution and percentages. The suggested algorithm has been validated and verified on the tag cloud of a real-world thesis portal.Keywords: tag cloud, font distribution algorithm, frequency-based, content-based, power law
Procedia PDF Downloads 5054489 Cardiopulmonary Disease in Bipolar Disorder Patient with History of SJS: Evidence Based Case Report
Authors: Zuhrotun Ulya, Muchammad Syamsulhadi, Debree Septiawan
Abstract:
Patients with bipolar disorder are three times more likely to suffer cardiovascular disorders than the general population, which will influence their level of morbidity and rate of mortality. Bipolar disorder also affects the pulmonary system. The choice of long term-monotherapy and other combinative therapies have clinical impacts on patients. This study investigates the case of a woman who has been suffering from bipolar disorder for 16 years, and who has a history of Steven Johnson Syndrome. At present she is suffering also from cardiovascular and pulmonary disorder. An analysis of the results of this study suggests that there is a relationship between cardiovascular disorder, drug therapies, Steven Johnson Syndrome and mood stabilizer obtained from the PubMed, Cochrane, Medline, and ProQuest (publications between 2005 and 2015). Combination therapy with mood stabilizer is recommended for patients who do not have side effect histories from these drugs. The replacement drugs and combinations may be applied, especially for those with bipolar disorders, and the combination between atypical antipsychotic groups and mood stabilizers is often made. Clinicians, however, should be careful with the patients’ physical and metabolic changes, especially those who have experienced long-term therapy and who showed a history of Steven Johnson Syndrome (for which clinicians probably prescribed one type of medicine).Keywords: cardiopulmonary disease, bipolar disorder, SJS, therapy
Procedia PDF Downloads 4304488 Microwave Tomography: The Analytical Treatment for Detecting Malignant Tumor Inside Human Body
Authors: Muhammad Hassan Khalil, Xu Jiadong
Abstract:
Early detection through screening is the best tool short of a perfect treatment against the malignant tumor inside the breast of a woman. By detecting cancer in its early stages, it can be recognized and treated before it has the opportunity to spread and change into potentially dangerous. Microwave tomography is a new imaging method based on contrast in dielectric properties of materials. The mathematical theory of microwave tomography involves solving an inverse problem for Maxwell’s equations. In this paper, we present designed antenna for breast cancer detection, which will use in microwave tomography configuration.Keywords: microwave imaging, inverse scattering, breast cancer, malignant tumor detection
Procedia PDF Downloads 3714487 Integrating Cooperative Education Experience into Engineering Curriculum: An Approach
Authors: Robin Lok-Wang Ma
Abstract:
The Center/Unit for Industry Engagement and Collaboration, as well as Internship, play a significant role at university. In general, the Center serves as the official interface between the industry and the School or Department to cultivate students’ early exposure to professional experience. The missions of the Center are not limited to provide a communication channel and collaborative platform for the industries and the university but also to assist students to build up their career paths early while still in the university. In recent years, a cooperative education experience (commonly known as a co-op) has been strongly advocated for students to make the school-to-work transition. The nature of the co-op program is not only consistent with the internships/final year design projects, but it is also more industrial-oriented with academic support from faculty at the university. The purpose of this paper is to describe an approach to how cooperative education experience can be integrated into Engineering Curriculum. It provides a mutual understanding and exchange of ideas for the approach between the university and the industry. A suggested format in terms of timeline, duration, selection of candidates, students, and companies’ expectations for the co-op program is described. Also, feedbacks from employers/industries show that a longer-term co-op program is well suited for students compared with a short-term internship. To this end, it provides a new insight into collaboration and/or partnership between the university and the industries to prepare professional work-ready graduates.Keywords: cooperative education, industry, engagement, collaboration
Procedia PDF Downloads 954486 Literature Analysis of Nutrition in South Africa and How SA Harvest Aims to Improve Nutrition
Authors: Ali Conn, Kimberly Allen
Abstract:
Food and nutrition play a significant role in humans. It helps them function, grow, and develop into better individuals. However, as essential as food may seem to most people, it is not the case for everyone. South Africans, for example, have been suffering from hunger and poverty for the longest time now. With the spread of the COVID-19 virus, their situations have become worse. Millions of children and their families do not have access to food, hence no proper nutrition. They could barely make ends meet, so they make sure to make the most of what little they have for their household. Fortunately, organizations like SA Harvest aim to end hunger in South Africa. However, they still need to know more about how they can help South Africans with their current diet. Currently, most of the diets are composed of maize and rice. They do not have much to spend on fruits, so these commodities are seen as a luxury. With the help of organizations like SA Harvest, South Africans will be educated and more aware of what they need to eat.Keywords: nutrition, public health, SA Harvest, food
Procedia PDF Downloads 1284485 Short-Term Incarceration in South Africa and the Shaping of Legal Consciousness
Authors: Thato Masiangoako
Abstract:
While being home to one of the greatest constitutions in the world, South Africa is also notorious for brutal policing practices, endemic corruption, and an overstrained criminal justice system. This apparent gap between the normative conceptions of the law and the actual experiences of being subjected to the criminal justice system forms the crux of this study. This study explores how community activists, student activists, and migrants in Johannesburg, who rely on the law for protection and effective political expression and participation and understand the law through their experiences of arrest and short-term incarceration. This work introduces the concept of legal consciousness to the South African context, whilst also drawing very heavily from South African literature of the law and criminal justice system. This research is grounded in the experiences of arrest and pre-trial and immigration detention shared by these individuals, which are used to develop a rich account of legal consciousness in South Africa. It also sheds light on some of the ways in which the criminal justice system sustains its legitimacy within a post-apartheid framework despite the gaps between what the law ought to be and it actually is. The study argues that the ways in which these groups make sense of their experiences of the criminal justice system and the law, more broadly, are closely bound to their socio-political identities. This calls the core values of equality and dignity that undergird South Africa’s Constitution into question.Keywords: criminal justice, immigrant detention, legal consciousness, remand detention
Procedia PDF Downloads 2434484 Graph Cuts Segmentation Approach Using a Patch-Based Similarity Measure Applied for Interactive CT Lung Image Segmentation
Authors: Aicha Majda, Abdelhamid El Hassani
Abstract:
Lung CT image segmentation is a prerequisite in lung CT image analysis. Most of the conventional methods need a post-processing to deal with the abnormal lung CT scans such as lung nodules or other lesions. The simplest similarity measure in the standard Graph Cuts Algorithm consists of directly comparing the pixel values of the two neighboring regions, which is not accurate because this kind of metrics is extremely sensitive to minor transformations such as noise or other artifacts problems. In this work, we propose an improved version of the standard graph cuts algorithm based on the Patch-Based similarity metric. The boundary penalty term in the graph cut algorithm is defined Based on Patch-Based similarity measurement instead of the simple intensity measurement in the standard method. The weights between each pixel and its neighboring pixels are Based on the obtained new term. The graph is then created using theses weights between its nodes. Finally, the segmentation is completed with the minimum cut/Max-Flow algorithm. Experimental results show that the proposed method is very accurate and efficient, and can directly provide explicit lung regions without any post-processing operations compared to the standard method.Keywords: graph cuts, lung CT scan, lung parenchyma segmentation, patch-based similarity metric
Procedia PDF Downloads 1694483 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego
Procedia PDF Downloads 81