Search results for: volunteered geographic information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11146

Search results for: volunteered geographic information

3316 Border Trade Policy to Promote Thailand - Myanmar Mae Sai, Chiang Rai Province

Authors: Sakapas Saengchai, Pichamon Chansuchai

Abstract:

Research Thai- Myanmar Border Trade Promotion Policy, Mae Sai District, Chiang Rai Province The objectives of this study were to study the policy of promoting Thai- Myanmar border trade in Mae Sai district, Chiang Rai province. And suitable models for the development of border trade in Mae Sai. Chiang Rai province This research uses qualitative methodology. The method of collecting data from research papers. Participatory Observation In-depth interviews in which the information is important, the governor of Chiang Rai. Chiang Rai Customs Service Executive Office of Mae Sai Immigration Bureau Maesai Chamber of Commerce and Private Entrepreneurs By specific sampling Data analysis uses content analysis. The study indicated that Border Trade Promotion Policy The direction taken by the government to focus on developing 1. Security is further reducing crime. Smuggling and human trafficking Including the preparation to protect people from terrorism and natural disasters. And cooperation with Burma on border security. 2. The development of wealth is the promotion of investment. The transport links, logistics value chain. Products and services across the Thai-Myanmar border. Improve the regulations and laws to promote fair trade. Convenient and fast 3. Sustainable development is the ability to generate income, quality of life of people in the Thai border to increase continuously. By using balanced natural resources, production and consumption are environmentally friendly. Which featured the participation of all sectors of the public and private sectors in the region to drive the development of the border with Thailand. Chiang Rai province To be more competitive .

Keywords: Border, Trade, Policy, Promote

Procedia PDF Downloads 174
3315 Insects and Meteorological Inventories in a Mango-Based Agroforestry System in Bangladesh

Authors: Md. Ruhul Amin, Shakura Namni, Md. Ramiz Uddin Miah, Md. Giashuddin Miah, Mohammad Zakaria, Sang Jae Suh, Yong Jung Kwon

Abstract:

Insect species abundance and diversity associated with meteorological factors during January to June 2013 at a mango-based agroforestry research field in Bangladesh, and the effects of pests and pollinator species on mango are presented in this study. Among the collected and identified insects, nine species belong to 3 orders were found as pollinator, 11 species in 5 orders as pest, and 13 species in 6 orders as predator. The mango hopper, fruit fly and stone weevil appeared as major pest because of their high levels of abundance and infestation. The hoppers caused 100% inflorescence damage followed by fruit fly (51.7% fruit) and stone weevil (31.0% mature fruit). The major pests exerted significantly higher abundance compared to pollinator, predator and minor pests. Hemipteroid insects were most abundant (60%) followed by Diptera (21%), Hymenoptera (10%), Lepidoptera (5%), and Coleoptera (4%). Insect population increased with increasing trend of temperature and humidity, and revealed peak abundance during April-May. The flower visiting insects differed in their landing duration and showed preference to forage with time of a day. Their foraging activity was found to be peaked between 11.00 am to 01.00 pm. The activity of the pollinators led to higher level of fruit set. This study provides baseline information about the phenological patterns of insect abundance in an agroforestry research field which could be an indication to incorporate some aspects of pest management.

Keywords: agroforestry, abundance, abiotic factors, insects, mango

Procedia PDF Downloads 444
3314 Time Series Simulation by Conditional Generative Adversarial Net

Authors: Rao Fu, Jie Chen, Shutian Zeng, Yiping Zhuang, Agus Sudjianto

Abstract:

Generative Adversarial Net (GAN) has proved to be a powerful machine learning tool in image data analysis and generation. In this paper, we propose to use Conditional Generative Adversarial Net (CGAN) to learn and simulate time series data. The conditions include both categorical and continuous variables with different auxiliary information. Our simulation studies show that CGAN has the capability to learn different types of normal and heavy-tailed distributions, as well as dependent structures of different time series. It also has the capability to generate conditional predictive distributions consistent with training data distributions. We also provide an in-depth discussion on the rationale behind GAN and the neural networks as hierarchical splines to establish a clear connection with existing statistical methods of distribution generation. In practice, CGAN has a wide range of applications in market risk and counterparty risk analysis: it can be applied to learn historical data and generate scenarios for the calculation of Value-at-Risk (VaR) and Expected Shortfall (ES), and it can also predict the movement of the market risk factors. We present a real data analysis including a backtesting to demonstrate that CGAN can outperform Historical Simulation (HS), a popular method in market risk analysis to calculate VaR. CGAN can also be applied in economic time series modeling and forecasting. In this regard, we have included an example of hypothetical shock analysis for economic models and the generation of potential CCAR scenarios by CGAN at the end of the paper.

Keywords: conditional generative adversarial net, market and credit risk management, neural network, time series

Procedia PDF Downloads 145
3313 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security

Authors: Temitope Francis Abiodun

Abstract:

The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.

Keywords: terrorism, non-violent state actors, private sector intelligence, security

Procedia PDF Downloads 138
3312 Semantic Indexing Improvement for Textual Documents: Contribution of Classification by Fuzzy Association Rules

Authors: Mohsen Maraoui

Abstract:

In the aim of natural language processing applications improvement, such as information retrieval, machine translation, lexical disambiguation, we focus on statistical approach to semantic indexing for multilingual text documents based on conceptual network formalism. We propose to use this formalism as an indexing language to represent the descriptive concepts and their weighting. These concepts represent the content of the document. Our contribution is based on two steps. In the first step, we propose the extraction of index terms using the multilingual lexical resource Euro WordNet (EWN). In the second step, we pass from the representation of index terms to the representation of index concepts through conceptual network formalism. This network is generated using the EWN resource and pass by a classification step based on association rules model (in attempt to discover the non-taxonomic relations or contextual relations between the concepts of a document). These relations are latent relations buried in the text and carried by the semantic context of the co-occurrence of concepts in the document. Our proposed indexing approach can be applied to text documents in various languages because it is based on a linguistic method adapted to the language through a multilingual thesaurus. Next, we apply the same statistical process regardless of the language in order to extract the significant concepts and their associated weights. We prove that the proposed indexing approach provides encouraging results.

Keywords: concept extraction, conceptual network formalism, fuzzy association rules, multilingual thesaurus, semantic indexing

Procedia PDF Downloads 141
3311 Water Quality and Coastal Management Profile Assessment of Puerto Galera Bay, Philippines

Authors: Ma. Manna Farrel B. Pinto

Abstract:

As global industrialization progresses, the environment remains to be at risk of disturbances brought by developments of cities and communities. Impacts of flourishing industries such as tourism require rapid growth of establishments and may threaten ecosystems and natural resources. Puerto Galera as a biosphere reserve and declared as the Center of the World’s Center of Marine Shorefish Biodiversity is on the brink of ecological deterioration as tourism further develops in its coastal areas. Apparently, attempts were initiated to establish a baseline for designation of protection in the economic and coastal marine zones of Puerto Galera but continuity of its implementation and coordination of concerned units remains deficient. Indications of eutrophication have been observed based on water quality analysis although parameter values still comply with the national standards for coastal waters. Water quality data, biodiversity and hydrodynamic information, gathered from studies, and local government units were analysed to assess the condition of the coast as well as acting policies implemented by the local authorities. Sources of contaminants were also located in its three main communities, and their shores wherein in recommendations for installing wastewater treatment facilities and further improvement of policies of waste discharge must be addressed. With a conceptual framework proposed in the study, a comprehensive data analysis and coordinated management are necessary to form an integrated coastal management for further protection and preservation of the sustainable coastal marine ecosystem of Puerto Galera.

Keywords: coastal management, environmental management, integrated resource management, Puerto Galera

Procedia PDF Downloads 268
3310 Stochastic Optimization of a Vendor-Managed Inventory Problem in a Two-Echelon Supply Chain

Authors: Bita Payami-Shabestari, Dariush Eslami

Abstract:

The purpose of this paper is to develop a multi-product economic production quantity model under vendor management inventory policy and restrictions including limited warehouse space, budget, and number of orders, average shortage time and maximum permissible shortage. Since the “costs” cannot be predicted with certainty, it is assumed that data behave under uncertain environment. The problem is first formulated into the framework of a bi-objective of multi-product economic production quantity model. Then, the problem is solved with three multi-objective decision-making (MODM) methods. Then following this, three methods had been compared on information on the optimal value of the two objective functions and the central processing unit (CPU) time with the statistical analysis method and the multi-attribute decision-making (MADM). The results are compared with statistical analysis method and the MADM. The results of the study demonstrate that augmented-constraint in terms of optimal value of the two objective functions and the CPU time perform better than global criteria, and goal programming. Sensitivity analysis is done to illustrate the effect of parameter variations on the optimal solution. The contribution of this research is the use of random costs data in developing a multi-product economic production quantity model under vendor management inventory policy with several constraints.

Keywords: economic production quantity, random cost, supply chain management, vendor-managed inventory

Procedia PDF Downloads 130
3309 The Determination of Stress Experienced by Nursing Undergraduate Students during Their Education

Authors: Gülden Küçükakça, Şefika Dilek Güven, Rahşan Kolutek, Seçil Taylan

Abstract:

Objective: Nursing students face with stress factors affecting academic performance and quality of life as from first moments of their educational life. Stress causes health problems in students such as physical, psycho-social, and behavioral disorders and might damage formation of professional identity by decreasing efficiency of education. In addition to determination of stress experienced by nursing students during their education, it was aimed to help review theoretical and clinical education settings for bringing stress of nursing students into positive level and to raise awareness of educators concerning their own professional behaviors. Methods: The study was conducted with 315 students studying at nursing department of Semra and Vefa Küçük Health High School, Nevşehir Hacı Bektaş Veli University in the academic year of 2015-2016 and agreed to participate in the study. “Personal Information Form” prepared by the researchers upon the literature review and “Nursing Education Stress Scale (NESS)” were used in this study. Data were assessed with analysis of variance and correlation analysis. Results: Mean NESS Scale score of the nursing students was estimated to be 66.46±16.08 points. Conclusions: As a result of this study, stress level experienced by nursing undergraduate students during their education was determined to be high. In accordance with this result, it can be recommended to determine sources of stress experienced by nursing undergraduate students during their education and to develop approaches to eliminate these stress sources.

Keywords: stress, nursing education, nursing student, nursing education stress

Procedia PDF Downloads 470
3308 Combining ASTER Thermal Data and Spatial-Based Insolation Model for Identification of Geothermal Active Areas

Authors: Khalid Hussein, Waleed Abdalati, Pakorn Petchprayoon, Khaula Alkaabi

Abstract:

In this study, we integrated ASTER thermal data with an area-based spatial insolation model to identify and delineate geothermally active areas in Yellowstone National Park (YNP). Two pairs of L1B ASTER day- and nighttime scenes were used to calculate land surface temperature. We employed the Emissivity Normalization Algorithm which separates temperature from emissivity to calculate surface temperature. We calculated the incoming solar radiation for the area covered by each of the four ASTER scenes using an insolation model and used this information to compute temperature due to solar radiation. We then identified the statistical thermal anomalies using land surface temperature and the residuals calculated from modeled temperatures and ASTER-derived surface temperatures. Areas that had temperatures or temperature residuals greater than 2σ and between 1σ and 2σ were considered ASTER-modeled thermal anomalies. The areas identified as thermal anomalies were in strong agreement with the thermal areas obtained from the YNP GIS database. Also the YNP hot springs and geysers were located within areas identified as anomalous thermal areas. The consistency between our results and known geothermally active areas indicate that thermal remote sensing data, integrated with a spatial-based insolation model, provides an effective means for identifying and locating areas of geothermal activities over large areas and rough terrain.

Keywords: thermal remote sensing, insolation model, land surface temperature, geothermal anomalies

Procedia PDF Downloads 372
3307 Early-Stage Venture Investment Model: Evidence from Saudi Arabia

Authors: Tibah Alharbi, Renzo Cordina, David Power

Abstract:

Relatively few studies have explored how venture capitalist investors (VCs) make investment decisions and the information they rely on when taking an equity stake in an investee company. In addition, little is known about how much investors monitor start-ups after the decision to invest has been made. The VC scene in the US or European context is understood better than that of developing countries such as those in the Middle East. Although some differences among VC investors have been identified, the reasons behind such differences have not been fully explored – especially in a country such as Saudi Arabia. Therefore, this research seeks to understand the impact of external factors on the VC investor’ behaviour. The unique cultural and legal environments in the Kingdom of Saudi Arabia, the growing VC sector in the country, and the increasing importance attached to start-ups under the Saudi Government’s Vision 2030 program make such an investigation timely. Ascertaining the perceptions of VC investors in such a context will provide a deeper understanding of the determinants of VC investment in a novel setting. Using semi-structured interviews with over 20 participants, the research explores the structure of VC funds, the cycle of the VC investment in a start-up from the sourcing of deals, the screening and evaluation of such deals, the closing of such deals, and finally, the monitoring of such investments before the decision to exit such deals at the appropriate time. The results show some similarities to the VC model, which characterizes such investment in the US and Europe, but several differences emerge given the unique cultural and legal settings within the Kingdom. The results provide an in-depth understanding of the VC investors’ mindset relative to the existing studies in the literature.

Keywords: exit, monitoring, start-ups, venture capital

Procedia PDF Downloads 149
3306 Development of a Matlab® Program for the Bi-Dimensional Truss Analysis Using the Stiffness Matrix Method

Authors: Angel G. De Leon Hernandez

Abstract:

A structure is defined as a physical system or, in certain cases, an arrangement of connected elements, capable of bearing certain loads. The structures are presented in every part of the daily life, e.g., in the designing of buildings, vehicles and mechanisms. The main goal of a structure designer is to develop a secure, aesthetic and maintainable system, considering the constraint imposed to every case. With the advances in the technology during the last decades, the capabilities of solving engineering problems have increased enormously. Nowadays the computers, play a critical roll in the structural analysis, pitifully, for university students the vast majority of these software are inaccessible due to the high complexity and cost they represent, even when the software manufacturers offer student versions. This is exactly the reason why the idea of developing a more reachable and easy-to-use computing tool. This program is designed as a tool for the university students enrolled in courser related to the structures analysis and designs, as a complementary instrument to achieve a better understanding of this area and to avoid all the tedious calculations. Also, the program can be useful for graduated engineers in the field of structural design and analysis. A graphical user interphase is included in the program to make it even simpler to operate it and understand the information requested and the obtained results. In the present document are included the theoretical basics in which the program is based to solve the structural analysis, the logical path followed in order to develop the program, the theoretical results, a discussion about the results and the validation of those results.

Keywords: stiffness matrix method, structural analysis, Matlab® applications, programming

Procedia PDF Downloads 124
3305 A Spatial Hypergraph Based Semi-Supervised Band Selection Method for Hyperspectral Imagery Semantic Interpretation

Authors: Akrem Sellami, Imed Riadh Farah

Abstract:

Hyperspectral imagery (HSI) typically provides a wealth of information captured in a wide range of the electromagnetic spectrum for each pixel in the image. Hence, a pixel in HSI is a high-dimensional vector of intensities with a large spectral range and a high spectral resolution. Therefore, the semantic interpretation is a challenging task of HSI analysis. We focused in this paper on object classification as HSI semantic interpretation. However, HSI classification still faces some issues, among which are the following: The spatial variability of spectral signatures, the high number of spectral bands, and the high cost of true sample labeling. Therefore, the high number of spectral bands and the low number of training samples pose the problem of the curse of dimensionality. In order to resolve this problem, we propose to introduce the process of dimensionality reduction trying to improve the classification of HSI. The presented approach is a semi-supervised band selection method based on spatial hypergraph embedding model to represent higher order relationships with different weights of the spatial neighbors corresponding to the centroid of pixel. This semi-supervised band selection has been developed to select useful bands for object classification. The presented approach is evaluated on AVIRIS and ROSIS HSIs and compared to other dimensionality reduction methods. The experimental results demonstrate the efficacy of our approach compared to many existing dimensionality reduction methods for HSI classification.

Keywords: dimensionality reduction, hyperspectral image, semantic interpretation, spatial hypergraph

Procedia PDF Downloads 309
3304 Preparation of Wireless Networks and Security; Challenges in Efficient Accession of Encrypted Data in Healthcare

Authors: M. Zayoud, S. Oueida, S. Ionescu, P. AbiChar

Abstract:

Background: Wireless sensor network is encompassed of diversified tools of information technology, which is widely applied in a range of domains, including military surveillance, weather forecasting, and earthquake forecasting. Strengthened grounds are always developed for wireless sensor networks, which usually emerges security issues during professional application. Thus, essential technological tools are necessary to be assessed for secure aggregation of data. Moreover, such practices have to be incorporated in the healthcare practices that shall be serving in the best of the mutual interest Objective: Aggregation of encrypted data has been assessed through homomorphic stream cipher to assure its effectiveness along with providing the optimum solutions to the field of healthcare. Methods: An experimental design has been incorporated, which utilized newly developed cipher along with CPU-constrained devices. Modular additions have also been employed to evaluate the nature of aggregated data. The processes of homomorphic stream cipher have been highlighted through different sensors and modular additions. Results: Homomorphic stream cipher has been recognized as simple and secure process, which has allowed efficient aggregation of encrypted data. In addition, the application has led its way to the improvisation of the healthcare practices. Statistical values can be easily computed through the aggregation on the basis of selected cipher. Sensed data in accordance with variance, mean, and standard deviation has also been computed through the selected tool. Conclusion: It can be concluded that homomorphic stream cipher can be an ideal tool for appropriate aggregation of data. Alongside, it shall also provide the best solutions to the healthcare sector.

Keywords: aggregation, cipher, homomorphic stream, encryption

Procedia PDF Downloads 263
3303 Identification and Prioritisation of Students Requiring Literacy Intervention and Subsequent Communication with Key Stakeholders

Authors: Emilie Zimet

Abstract:

During networking and NCCD moderation meetings, best practices for identifying students who require Literacy Intervention are often discussed. Once these students are identified, consideration is given to the most effective process for prioritising those who have the greatest need for Literacy Support and the allocation of resources, tracking of intervention effectiveness and communicating with teachers/external providers/parents. Through a workshop, the group will investigate best practices to identify students who require literacy support and strategies to communicate and track their progress. In groups, participants will examine what they do in their settings and then compare with other models, including the researcher’s model, to decide the most effective path to identification and communication. Participants will complete a worksheet at the beginning of the session to deeply consider their current approaches. The participants will be asked to critically analyse their own identification processes for Literacy Intervention, ensuring students are not overlooked if they fall into the borderline category. A cut-off for students to access intervention will be considered so as not to place strain on already stretched resources along with the most effective allocation of resources. Furthermore, communicating learning needs and differentiation strategies to staff is paramount to the success of an intervention, and participants will look at the frequency of communication to share such strategies and updates. At the end of the session, the group will look at creating or evolving models that allow for best practices for the identification and communication of Literacy Interventions. The proposed outcome for this research is to develop a model of identification of students requiring Literacy Intervention that incorporates the allocation of resources and communication to key stakeholders. This will be done by pooling information and discussing a variety of models used in the participant's school settings.

Keywords: identification, student selection, communication, special education, school policy, planning for intervention

Procedia PDF Downloads 48
3302 Liver and Liver Lesion Segmentation From Abdominal CT Scans

Authors: Belgherbi Aicha, Hadjidj Ismahen, Bessaid Abdelhafid

Abstract:

The interpretation of medical images benefits from anatomical and physiological priors to optimize computer- aided diagnosis applications. Segmentation of liver and liver lesion is regarded as a major primary step in computer aided diagnosis of liver diseases. Precise liver segmentation in abdominal CT images is one of the most important steps for the computer-aided diagnosis of liver pathology. In this papers, a semi- automated method for medical image data is presented for the liver and liver lesion segmentation data using mathematical morphology. Our algorithm is currency in two parts. In the first, we seek to determine the region of interest by applying the morphological filters to extract the liver. The second step consists to detect the liver lesion. In this task; we proposed a new method developed for the semi-automatic segmentation of the liver and hepatic lesions. Our proposed method is based on the anatomical information and mathematical morphology tools used in the image processing field. At first, we try to improve the quality of the original image and image gradient by applying the spatial filter followed by the morphological filters. The second step consists to calculate the internal and external markers of the liver and hepatic lesions. Thereafter we proceed to the liver and hepatic lesions segmentation by the watershed transform controlled by markers. The validation of the developed algorithm is done using several images. Obtained results show the good performances of our proposed algorithm

Keywords: anisotropic diffusion filter, CT images, hepatic lesion segmentation, Liver segmentation, morphological filter, the watershed algorithm

Procedia PDF Downloads 453
3301 Transcriptomic Analyses of Kappaphycus alvarezii under Different Wavelengths of Light

Authors: Vun Yee Thien, Kenneth Francis Rodrigues, Clemente Michael Vui Ling Wong, Wilson Thau Lym Yong

Abstract:

Transcriptomes associated with the process of photosynthesis have offered insights into the mechanism of gene regulation in terrestrial plants; however, limited information is available as far as macroalgae are concerned. This investigation aims to decipher the underlying mechanisms associated with photosynthesis in the red alga, Kappaphycus alvarezii, by performing a differential expression analysis on a de novo assembled transcriptomes. Comparative analysis of gene expression was designed to examine the alteration of light qualities and its effect on physiological mechanisms in the red alga. High-throughput paired-end RNA-sequencing was applied to profile the transcriptome of K. alvarezii irradiated with different wavelengths of light (blue 492-455 nm, green 577-492 nm and red 780-622 nm) as compared to the full light spectrum, resulted in more than 60 million reads individually and assembled using Trinity and SOAPdenovo-Trans. The transcripts were annotated in the NCBI non-redundant (nr) protein, SwissProt, KEGG and COG databases with a cutoff E-value of 1e-5 and nearly 30% of transcripts were assigned to functional annotation by Blast searches. Differential expression analysis was performed using edgeR. The DEGs were designated to six categories: BL (blue light) regulated, GL (green light) regulated, RL (red light) regulated, BL or GL regulated, BL or RL regulated, GL or RL regulated, and either BL, GL or RL regulated. These DEGs were mapped to terms in KEGG database and compared with the whole transcriptome background to search for genes that regulated by light quality. The outcomes of this study will enhance our understanding of molecular mechanisms underlying light-induced responses in red algae.

Keywords: de novo transcriptome sequencing, differential gene expression, Kappaphycus alvareziired, red alga

Procedia PDF Downloads 511
3300 Preclinical Evidence of Pharmacological Effect from Medicinal Hemp

Authors: Muhammad nor Farhan Sa'At, Xin Y. Lim, Terence Y. C. Tan, Siti Hajar M. Rosli, Syazwani S. Ali, Ami F. Syed Mohamed

Abstract:

INTRODUCTION: Hemp (Cannabis sativa subsp. sativa), commonly used for industrial purposes, differs from marijuana by containing lower levels of delta-9-tetrahydronannabidiol- the principal psychoactive constituent in cannabis. Due to its non-psychoactive nature, there has been growing interest in hemp’s therapeutic potential, which has been investigated through pre-clinical and clinical study modalities. OBJECTIVE: To provide an overview of the current landscape of hemp research, through recent scientific findings specific to the pharmacological effects of the medicinal hemp plant and its derived compounds. METHODS: This review was conducted through a systematic search strategy according to the preferred reporting items for systematic review and meta-analysis-ScR (PRISMA-ScR) checklist on electronic databases including MEDLINE, OVID (OVFT, APC Journal Club, EBM Reviews), Cochrane Library Central and Clinicaltrials.gov. RESULTS: From 65 primary articles reviewed, there were 47 pre-clinical studies related to medicinal hemp. Interestingly, the hemp derivatives showed several potential activities such as anti-oxidative, anti-hypertensive, anti-inflammatory, anti-diabetic, anti-neuroinflammatory, anti-arthritic, anti-acne, and anti-microbial activities. Renal protective effects and estrogenic properties were also exhibited in vitro. CONCLUSION: Medicinal hemp possesses various pharmacological effects tested in vitro and in vivo. Information provided in this review could be used as tool to strengthen the study design of future clinical trial research.

Keywords: Preclinical, Herbal Medicine, Hemp, Cannabis

Procedia PDF Downloads 138
3299 Efficiency and Scale Elasticity in Network Data Envelopment Analysis: An Application to International Tourist Hotels in Taiwan

Authors: Li-Hsueh Chen

Abstract:

Efficient operation is more and more important for managers of hotels. Unlike the manufacturing industry, hotels cannot store their products. In addition, many hotels provide room service, and food and beverage service simultaneously. When efficiencies of hotels are evaluated, the internal structure should be considered. Hence, based on the operational characteristics of hotels, this study proposes a DEA model to simultaneously assess the efficiencies among the room production division, food and beverage production division, room service division and food and beverage service division. However, not only the enhancement of efficiency but also the adjustment of scale can improve the performance. In terms of the adjustment of scale, scale elasticity or returns to scale can help to managers to make decisions concerning expansion or contraction. In order to construct a reasonable approach to measure the efficiencies and scale elasticities of hotels, this study builds an alternative variable-returns-to-scale-based two-stage network DEA model with the combination of parallel and series structures to explore the scale elasticities of the whole system, room production division, food and beverage production division, room service division and food and beverage service division based on the data of international tourist hotel industry in Taiwan. The results may provide valuable information on operational performance and scale for managers and decision makers.

Keywords: efficiency, scale elasticity, network data envelopment analysis, international tourist hotel

Procedia PDF Downloads 225
3298 Chronic Cognitive Impacts of Mild Traumatic Brain Injury during Aging

Authors: Camille Charlebois-Plante, Marie-Ève Bourassa, Gaelle Dumel, Meriem Sabir, Louis De Beaumont

Abstract:

To the extent of our knowledge, there has been little interest in the chronic effects of mild traumatic brain injury (mTBI) on cognition during normal aging. This is rather surprising considering the impacts on daily and social functioning. In addition, sustaining a mTBI during late adulthood may increase the effect of normal biological aging in individuals who consider themselves normal and healthy. The objective of this study was to characterize the persistent neuropsychological repercussions of mTBI sustained during late adulthood, on average 12 months prior to testing. To this end, 35 mTBI patients and 42 controls between the ages of 50 and 69 completed an exhaustive neuropsychological assessment lasting three hours. All mTBI patients were asymptomatic and all participants had a score ≥ 27 at the MoCA. The evaluation consisted of 20 standardized neuropsychological tests measuring memory, attention, executive and language functions, as well as information processing speed. Performance on tests of visual (Brief Visuospatial Memory Test Revised) and verbal memory (Rey Auditory Verbal Learning Test and WMS-IV Logical Memory subtest), lexical access (Boston Naming Test) and response inhibition (Stroop) revealed to be significantly lower in the mTBI group. These findings suggest that a mTBI sustained during late adulthood induces lasting effects on cognitive function. Episodic memory and executive functions seem to be particularly vulnerable to enduring mTBI effects.

Keywords: cognitive function, late adulthood, mild traumatic brain injury, neuropsychology

Procedia PDF Downloads 169
3297 Assessment of the Implementation of Recommended Teaching and Evaluation Methods of NCE Arabic Language Curriculum in Colleges of Education in North Western Nigeria

Authors: Hamzat Shittu Atunnise

Abstract:

This study on Assessment of the Implementation of Recommended Teaching and Evaluation Methods of the Nigeria Certificate in Education (NCE) Arabic Language Curriculum in Colleges of Education in North Western Nigeria was conducted with four objectives, four research questions and four null hypotheses. Descriptive survey design was used and the multistage sampling procedure adopted. Frequency count and percentage were used to answer research questions and chi-square was used to test all the null hypotheses at an Alpha 0.05 level of significance. Two hundred and ninety one subjects were drawn as sample. Questionnaires were used for data collection. The Context, Input, Process and Product (CIPP) model of evaluation was employed. The study findings indicated that: there were no significant difference in the perceptions of lecturers and students from Federal and State Colleges of Education on the following: extent of which lecturers employ appropriate methods in teaching the language and extent of which recommended evaluation methods are utilized for the implementation of Arabic Curriculum. Based on these findings, it was recommended among other things that: lecturers should adopt teaching methodologies that promote interactive learning; Governments should ensure that information and communication technology facilities are made available and usable in all Colleges of Education; Lecturers should vary their evaluation methods because other methods of evaluation can meet and surpass the level of learning and understanding which essay type questions are believed to create and that language labs should be used in teaching Arabic in Colleges of Education because comprehensive language learning is possible through both classroom and language lab teaching.

Keywords: assessment, arabic language, curriculum, methods of teaching, evaluation methods, NCE

Procedia PDF Downloads 66
3296 The Use of Surveys to Combat Fake News in Media Literacy Education

Authors: Jaejun Jong

Abstract:

Fake news has recently become a serious international problem. Therefore, researchers and policymakers worldwide have sought to understand fake news and develop strategies to combat it. This study consists of two primary parts: (1) a literature review of how surveys were used to understand fake news and identify problems caused by fake news, and (2) a discussion of how surveys were used to fight back against fake news in educational settings. This second section specifically analyzes surveys used to evaluate a South Korean elementary school program designed to improve students’ metacognition and critical thinking. This section seeks to identify potential problems that may occur in the elementary school setting. The literature review shows that surveys can help people to understand fake news based on its traits rather than its definition due to the lack of agreement on the definition of fake news. The literature review also shows that people are not good at identifying fake news or evaluating their own ability to identify fake news; indeed, they are more likely to share information that aligns with their previous beliefs. In addition, the elementary school survey data shows that there may be substantial errors in the program evaluation process, likely caused by processing errors or the survey procedure, though the exact cause is not specified. Such a significant error in evaluating the effects of the educational program prevents teachers from making proper decisions and accurately evaluating the program. Therefore, identifying the source of such errors would improve the overall quality of education, which would benefit both teachers and students.

Keywords: critical thinking, elementary education, program evaluation, survey

Procedia PDF Downloads 105
3295 Effective Student Engaging Strategies to Enhance Academic Learning in Middle Eastern Classrooms: An Action Research Approach

Authors: Anjum Afrooze

Abstract:

The curriculum at General Sciences department in Prince Sultan University includes ‘Physical science’ for Computer Science, Information Technology and Business courses. Students are apathetic towards Physical Science and question, as to, ‘How this course is related to their majors?’ English is not a native language for the students and also for many instructors. More than sixty percent of the students come from institutions where English is not the medium of instruction, which makes student learning and academic achievement challenging. After observing the less enthusiastic student cohort for two consecutive semesters, the instructor was keen to find effective strategies to enhance learning and further encourage deep learning by engaging students in different tasks to empower them with necessary skills and motivate them. This study is participatory action research, in which instructor designs effective tasks to engage students in their learning. The study is conducted through two semesters with a total of 200 students. The effectiveness of this approach is studied using questionnaire at the end of each semester and teacher observation. Major outcomes of this study were overall improvement in students attitude towards science learning, enhancement of multiple skills like note taking, problem solving, language proficiency and also fortifying confidence. This process transformed instructor into engaging and reflecting practitioner. Also, these strategies were implemented by other instructors teaching the course and proved effective in opening a path to changes in related areas of the course curriculum. However, refinement in the strategies could be done based on student evaluation and instructors observation.

Keywords: group activity, language proficiency, reasoning skills, science learning

Procedia PDF Downloads 147
3294 Investigating the Effectiveness of a 3D Printed Composite Mold

Authors: Peng Hao Wang, Garam Kim, Ronald Sterkenburg

Abstract:

In composite manufacturing, the fabrication of tooling and tooling maintenance contributes to a large portion of the total cost. However, as the applications of composite materials continue to increase, there is also a growing demand for more tooling. The demand for more tooling places heavy emphasis on the industry’s ability to fabricate high quality tools while maintaining the tool’s cost effectiveness. One of the popular techniques of tool fabrication currently being developed utilizes additive manufacturing technology known as 3D printing. The popularity of 3D printing is due to 3D printing’s ability to maintain low material waste, low cost, and quick fabrication time. In this study, a team of Purdue University School of Aviation and Transportation Technology (SATT) faculty and students investigated the effectiveness of a 3D printed composite mold. A steel valve cover from an aircraft reciprocating engine was modeled utilizing 3D scanning and computer-aided design (CAD) to create a 3D printed composite mold. The mold was used to fabricate carbon fiber versions of the aircraft reciprocating engine valve cover. The carbon fiber valve covers were evaluated for dimensional accuracy and quality while the 3D printed composite mold was evaluated for durability and dimensional stability. The data collected from this study provided valuable information in the understanding of 3D printed composite molds, potential improvements for the molds, and considerations for future tooling design.

Keywords: additive manufacturing, carbon fiber, composite tooling, molds

Procedia PDF Downloads 115
3293 Gastronomy: The Preferred Digital Business Models and Impacts in Business Economics within Hospitality, Tourism, and Catering Sectors through Online Commerce

Authors: John Oupa Hlatshwayo

Abstract:

Background: There seem to be preferred digital business models with varying impacts within hospitality, tourism and catering sub-sectors explored through online commerce, as all are ingrained in the business economics domain. Aim: A study aims to establish if such phenomena (Digital Business Models) exist and to what extent if any, within the hospitality, tourism and catering industries, respectively. Setting: This is a qualitative study conducted by exploring several (Four) institutions globally through Case Studies. Method: This research explored explanatory case studies to answer questions about ‘how’ or ’why’ with little control by a researcher over the occurrence of events. It is qualitative research, deductive, and inductive methods. Hence, a comprehensive approach to analyzing qualitative data was attainable through immersion by reading to understand the information. Findings: The results corroborated the notion that digital business models are applicable, by and large, in business economics. Thus, three sectors wherein enterprises operate in the business economics sphere have been narrowed down i.e. hospitality, tourism and catering, are also referred to as triangular polygons due to the atypical nature of being ‘stand-alone’, yet ‘sub-sectors’, but there are confounding factors to consider. Conclusion: The significance of digital business models and digital transformation shows an inevitable merger between business and technology within Hospitality, Tourism, and Catering. Contribution: Such symbiotic relationship of business and technology, persistent evolution of clients’ interface with end-products, forever changing market, current adaptation as well as adjustment to ‘new world order’ by enterprises must be embraced constantly without fail by Business Practitioners, Academics, Business Students, Organizations and Governments.

Keywords: digital business models, hospitality, tourism, catering, business economics

Procedia PDF Downloads 22
3292 Correlations between Pushing Skills and Pushing Perceptions, Second-Stage Labor Duration, Postpartum Fatigue, and Birth Satisfaction

Authors: Yu-Ching Huang

Abstract:

Background: Delivery bridges the antepartum and postpartum period. Subsequent fatigue can affect indices, including postpartum recovery and life quality. Milk secretion, breastfeeding quality, and newborn participation may be compromised. Correspondingly, using proper pushing skills during the second stage of labor has the potential to effectively reduce postpartum fatigue and enhance birth satisfaction in new mothers. Purpose: To compare the effects of using different pushing skills on maternal pushing perception, postpartum fatigue, and birth satisfaction. Methodology: The present study used a descriptive research approach and recruited 382 participants from a medical center in northern Taiwan. Data were collected using a structured questionnaire, which included a demographic and obstetrics information datasheet, the Labor Pushing Experience Scale, a fatigue scale, and a birth satisfaction scale. Research Results: Using pushing skills (including upright position [t= 2.28, p < .05] and delayed pushing [t= -1.98, p < .05] during the second stage of labor was shown to enhance birth satisfaction in participants. Additionally, open glottis pushing ( t = 5.46, p < .001) resulted in a mean duration of second-stage labor that was 17.67 minutes less than that achieved using Valsalva pushing. Moreover, a better perceived pushing experience was associated with lower perceived postpartum fatigue (r = .46, p < .05) and higher birth satisfaction (r = -.16, p < .05). Finally, postpartum fatigue perception was negatively associated with birth satisfaction (r = -.16, p < .05). Conclusion and Clinical Application: The findings suggest that midwives should advocate that women adopt upright positions, delayed pushing, and open glottis pushing during the second stage of labor in order to enhance their birth satisfaction.

Keywords: second stage labor duration of pushing skill, pushing experience perception, postpartum fatigue, birth satisfaction

Procedia PDF Downloads 267
3291 Bring Your Own Device Security Model in a Financial Institution of South Africa

Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren

Abstract:

This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.

Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis

Procedia PDF Downloads 34
3290 A Modified Nonlinear Conjugate Gradient Algorithm for Large Scale Unconstrained Optimization Problems

Authors: Tsegay Giday Woldu, Haibin Zhang, Xin Zhang, Yemane Hailu Fissuh

Abstract:

It is well known that nonlinear conjugate gradient method is one of the widely used first order methods to solve large scale unconstrained smooth optimization problems. Because of the low memory requirement, attractive theoretical features, practical computational efficiency and nice convergence properties, nonlinear conjugate gradient methods have a special role for solving large scale unconstrained optimization problems. Large scale optimization problems are with important applications in practical and scientific world. However, nonlinear conjugate gradient methods have restricted information about the curvature of the objective function and they are likely less efficient and robust compared to some second order algorithms. To overcome these drawbacks, the new modified nonlinear conjugate gradient method is presented. The noticeable features of our work are that the new search direction possesses the sufficient descent property independent of any line search and it belongs to a trust region. Under mild assumptions and standard Wolfe line search technique, the global convergence property of the proposed algorithm is established. Furthermore, to test the practical computational performance of our new algorithm, numerical experiments are provided and implemented on the set of some large dimensional unconstrained problems. The numerical results show that the proposed algorithm is an efficient and robust compared with other similar algorithms.

Keywords: conjugate gradient method, global convergence, large scale optimization, sufficient descent property

Procedia PDF Downloads 209
3289 Common Causes of Eye Removal Surgery in Turkish Patients: A Review of 226 Cases

Authors: Titap Yazicioglu

Abstract:

Purpose: To determine the etiological factors responsible for the eye removal surgery and to evaluate our surgical results. Material and Methods: Medical records of 226 patients, who underwent eye removal surgery, were analyzed retrospectively. Demographic information, clinical history, surgical procedure, and histopathological data were all collected. Evisceration surgery was performed under general anesthesia in all patients except tumor cases and one patient with rhino-orbital mucormycosis. The patients were followed for an average of 16.46±10.78 months and checked for the possible complications, cosmesis, and functional results.Results: 144 men, and 82 women,with a mean age of 41.78±22.6 years, were underwent enucleation (n=15) or evisceration (n=211) due to traumatic (n=169) and non-traumatic (n=57) causes. In the traumatic group, 79.8% of 169 patients were injured by penetrating and 14.2% by blunt trauma.3.6% of the patients were injured in a traffic accident, and 2.4% of them were injured by explosives. In the non-traumatic group, 40% of 25 patients had post-traumatic endophthalmitis, 32% had endophthalmitis due to corneal ulceration and melting, and 24% had endophthalmitis after cataract surgery. One patient had panophthalmitis due to rhino-orbital mucormycosis. Another cause in the non-traumatic group was glaucoma, of which 92.3% had neovascular glaucoma, and 8.7% had congenital glaucoma. Of the 14 patients who were enucleated for tumor, 35.7% had retinoblastoma, 14.3% had medulloepithelioma, 42.9% had uveal melanoma, and 7.1% had metastatic tumor from paranasal sinuses.The most common complaint in the follow-up period was discharging, seen in all prosthesis-wearing patients. 13.3% of the patients had itching due to ocular prosthesis. 4.4% of the patients were complaining about deep superior sulcus. 4.4% had pyogenic granuloma, and 17.8% had implant exposure. Conclusion: Etiological factors should be carefully evaluated, and precautions should be taken in order to reduce the devastating effect of the physical loss of the eye.

Keywords: enucleation, evisceration, ocular injury, etiology, frequency

Procedia PDF Downloads 113
3288 A Comprehensive Characterization of Cell-free RNA in Spent Blastocyst Medium and Quality Prediction for Blastocyst

Authors: Huajuan Shi

Abstract:

Background: The biopsy of the preimplantation embryo may increase the potential risk and concern of embryo viability. Clinically discarded spent embryo medium (SEM) has entered the view of researchers, sparking an interest in noninvasive embryo screening. However, one of the major restrictions is the extremelty low quantity of cf-RNA, which is difficult to efficiently and unbiased amplify cf-RNA using traditional methods. Hence, there is urgently need to an efficient and low bias amplification method which can comprehensively and accurately obtain cf-RNA information to truly reveal the state of SEM cf-RNA. Result: In this present study, we established an agarose PCR amplification system, and has significantly improved the amplification sensitivity and efficiency by ~90 fold and 9.29 %, respectively. We applied agarose to sequencing library preparation (named AG-seq) to quantify and characterize cf-RNA in SEM. The number of detected cf-RNAs (3533 vs 598) and coverage of 3' end were significantly increased, and the noise of low abundance gene detection was reduced. The increasing percentage 5' end adenine and alternative splicing (AS) events of short fragments (< 400 bp) were discovered by AG-seq. Further, the profiles and characterizations of cf-RNA in spent cleavage medium (SCM) and spent blastocyst medium (SBM) indicated that 4‐mer end motifs of cf-RNA fragments could remarkably differentiate different embryo development stages. Significance: This study established an efficient and low-cost SEM amplification and library preparation method. Not only that, we successfully described the characterizations of SEM cf-RNA of preimplantation embryo by using AG-seq, including abundance features fragment lengths. AG-seq facilitates the study of cf-RNA as a noninvasive embryo screening biomarker and opens up potential clinical utilities of trace samples.

Keywords: cell-free RNA, agarose, spent embryo medium, RNA sequencing, non-invasive detection

Procedia PDF Downloads 65
3287 Error Detection and Correction for Onboard Satellite Computers Using Hamming Code

Authors: Rafsan Al Mamun, Md. Motaharul Islam, Rabana Tajrin, Nabiha Noor, Shafinaz Qader

Abstract:

In an attempt to enrich the lives of billions of people by providing proper information, security and a way of communicating with others, the need for efficient and improved satellites is constantly growing. Thus, there is an increasing demand for better error detection and correction (EDAC) schemes, which are capable of protecting the data onboard the satellites. The paper is aimed towards detecting and correcting such errors using a special algorithm called the Hamming Code, which uses the concept of parity and parity bits to prevent single-bit errors onboard a satellite in Low Earth Orbit. This paper focuses on the study of Low Earth Orbit satellites and the process of generating the Hamming Code matrix to be used for EDAC using computer programs. The most effective version of Hamming Code generated was the Hamming (16, 11, 4) version using MATLAB, and the paper compares this particular scheme with other EDAC mechanisms, including other versions of Hamming Codes and Cyclic Redundancy Check (CRC), and the limitations of this scheme. This particular version of the Hamming Code guarantees single-bit error corrections as well as double-bit error detections. Furthermore, this version of Hamming Code has proved to be fast with a checking time of 5.669 nanoseconds, that has a relatively higher code rate and lower bit overhead compared to the other versions and can detect a greater percentage of errors per length of code than other EDAC schemes with similar capabilities. In conclusion, with the proper implementation of the system, it is quite possible to ensure a relatively uncorrupted satellite storage system.

Keywords: bit-flips, Hamming code, low earth orbit, parity bits, satellite, single error upset

Procedia PDF Downloads 131