Search results for: cache timing attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 926

Search results for: cache timing attack

146 Cloud Based Supply Chain Traceability

Authors: Kedar J. Mahadeshwar

Abstract:

Concept introduction: This paper talks about how an innovative cloud based analytics enabled solution that could address a major industry challenge that is approaching all of us globally faster than what one would think. The world of supply chain for drugs and devices is changing today at a rapid speed. In the US, the Drug Supply Chain Security Act (DSCSA) is a new law for Tracing, Verification and Serialization phasing in starting Jan 1, 2015 for manufacturers, repackagers, wholesalers and pharmacies / clinics. Similarly we are seeing pressures building up in Europe, China and many countries that would require an absolute traceability of every drug and device end to end. Companies (both manufacturers and distributors) can use this opportunity not only to be compliant but to differentiate themselves over competition. And moreover a country such as UAE can be the leader in coming up with a global solution that brings innovation in this industry. Problem definition and timing: The problem of counterfeit drug market, recognized by FDA, causes billions of dollars loss every year. Even in UAE, the concerns over prevalence of counterfeit drugs, which enter through ports such as Dubai remains a big concern, as per UAE pharma and healthcare report, Q1 2015. Distribution of drugs and devices involves multiple processes and systems that do not talk to each other. Consumer confidence is at risk due to this lack of traceability and any leading provider is at risk of losing its reputation. Globally there is an increasing pressure by government and regulatory bodies to trace serial numbers and lot numbers of every drug and medical devices throughout a supply chain. Though many of large corporations use some form of ERP (enterprise resource planning) software, it is far from having a capability to trace a lot and serial number beyond the enterprise and making this information easily available real time. Solution: The solution here talks about a service provider that allows all subscribers to take advantage of this service. The solution allows a service provider regardless of its physical location, to host this cloud based traceability and analytics solution of millions of distribution transactions that capture lots of each drug and device. The solution platform will capture a movement of every medical device and drug end to end from its manufacturer to a hospital or a doctor through a series of distributor or retail network. The platform also provides advanced analytics solution to do some intelligent reporting online. Why Dubai? Opportunity exists with huge investment done in Dubai healthcare city also with using technology and infrastructure to attract more FDI to provide such a service. UAE and countries similar will be facing this pressure from regulators globally in near future. But more interestingly, Dubai can attract such innovators/companies to run and host such a cloud based solution and become a hub of such traceability globally.

Keywords: cloud, pharmaceutical, supply chain, tracking

Procedia PDF Downloads 510
145 The Social Structuring of Mate Selection: Assortative Marriage Patterns in the Israeli Jewish Population

Authors: Naava Dihi, Jon Anson

Abstract:

Love, so it appears, is not socially blind. We show that partner selection is socially constrained, and the freedom to choose is limited by at least two major factors or capitals: on the one hand, material resources and education, locating the partners on a scale of personal achievement and economic independence. On the other, the partners' ascriptive belonging to particular ethnic, or origin, groups, differentiated by the groups' social prestige, as well as by their culture, history and even physical characteristics. However, the relative importance of achievement and ascriptive factors, as well as the overlap between them, varies from society to society, depending on the society's structure and the factors shaping it. Israeli social structure has been shaped by the waves of new immigrants who arrived over the years. The timing of their arrival, their patterns of physical settlement and their occupational inclusion or exclusion have together created a mosaic of social groups whose principal common feature has been the country of origin from which they arrived. The analysis of marriage patterns helps illuminate the social meanings of the groups and their borders. To the extent that ethnic group membership has meaning for individuals and influences their life choices, the ascriptive factor will gain in importance relative to the achievement factor in their choice of marriage partner. In this research, we examine Jewish Israeli marriage patterns by looking at the marriage choices of 5,041 women aged 15 to 49 who were single at the census in 1983, and who were married at the time of the 1995 census, 12 years later. The database for this study was a file linking respondents from the 1983 and the 1995 censuses. In both cases, 5 percent of household were randomly chosen, so that our sample includes about 4 percent of women in Israel in 1983. We present three basic analyses: (1) Who was still single in 1983, using personal and household data from the 1983 census (binomial model), (2) Who married between 1983 and a1995, using personal and household data from the 1983 census (binomial model), (3) What were the personal characteristics of the womens’ partners in 1995, using data from the 1995 census (loglinear model). We show (i) that material and cultural capital both operate to delay marriage and to increase the probability of remaining single; and (ii) while there is a clear association between ethnic group membership and education, endogamy and homogamy both operate as separate forces which constraint (but do not determine) the choice of marriage partner, and thus both serve to reproduce the current pattern of relationships, as well as identifying patterns of proximity and distance between the different groups.

Keywords: Israel, nuptiality, ascription, achievement

Procedia PDF Downloads 101
144 Methylglyoxal Induced Glycoxidation of Human Low Density Lipoprotein: A Biophysical Perspective and Its Role in Diabetes and Periodontitis

Authors: Minhal Abidi, Moinuddin

Abstract:

Diabetes mellitus (DM) induced metabolic abnormalities causes oxidative stress which leads to the pathogenesis of complications associated with diabetes like retinopathy, nephropathy periodontitis etc. Combination of glycation and oxidation 'glycoxidation' occurs when oxidative reactions affect the early state of glycation products. Low density lipoprotein (LDL) is prone to glycoxidative attack by sugars and methylglyoxal (MGO) being a strong glycating agent may have severe impact on its structure and consequent role in diabetes. Pro-inflammatory cytokines like IL1β and TNFα produced by the action of gram negative bacteria in periodontits (PD) can in turn lead to insulin resistance. This work discusses modifications to LDL as a result of glycoxidation. The changes in the protein molecule have been characterized by various physicochemical techniques and the immunogenicity of the modified molecules was also evaluated as they presented neo-epitopes. Binding of antibodies present in diabetes patients to the native and glycated LDL has been evaluated. Role of modified epitopes in the generation of antibodies in diabetes and periodontitis has been discussed. The structural perturbations induced in LDL were analyzed by UV–Vis, fluorescence, circular dichroism and FTIR spectroscopy, molecular docking studies, thermal denaturation studies, Thioflavin T assay, isothermal titration calorimetry, comet assay. MALDI-TOF, ketoamine moieties, carbonyl content and HMF content were also quantitated in native and glycated LDL. IL1β and TNFα levels were also measured in the type 2 DM and PD patients. We report increased carbonyl content, ketoamine moieties and HMF content in glycated LDL as compared to native analogue. The results substantiate that in hyperglycemic state MGO modification of LDL causes structural perturbations making the protein antigenic which could obstruct normal physiological functions and might contribute in the development of secondary complications in diabetic patients like periodontitis.

Keywords: advanced glycation end products, diabetes mellitus, glycation, glycoxidation, low density lipoprotein, periodontitis

Procedia PDF Downloads 178
143 Framing the Dynamics and Functioning of Different Variants of Terrorist Organizations: A Business Model Perspective

Authors: Eisa Younes Alblooshi

Abstract:

Counterterrorism strategies, to be effective and efficient, require a sound understanding of the dynamics, the interlinked organizational elements of the terrorist outfits being combated, with a view to having cognizance of their strong points to be guarded against, as well as the vulnerable zones that can be targeted for optimal results in a timely fashion by counterterrorism agencies. A unique model regarding the organizational imperatives was evolved in this research through likening the terrorist organizations with the traditional commercial ones, with a view to understanding in detail the dynamics of interconnectivity and dependencies, and the related compulsions facing the leaderships of such outfits that provide counterterrorism agencies with opportunities for forging better strategies. It involved assessing the evolving organizational dynamics and imperatives of different types of terrorist organizations, to enable the researcher to construct a prototype model that defines the progression and linkages of the related organizational elements of such organizations. It required detailed analysis of how the various elements are connected, with sequencing identified, as any outfit positions itself with respect to its external environment and internal dynamics. A case study focusing on a transnational radical religious state-sponsored terrorist organization was conducted to validate the research findings and to further strengthen the specific counterterrorism strategies. Six different variants of the business model of terrorist organizations were identified, categorized based on their outreach, mission, and status of any state sponsorship. The variants represent vast majority of the range of terrorist organizations acting locally or globally. The model shows the progression and dynamics of these organizations through various dimensions including mission, leadership, outreach, state sponsorship status, resulting in the organizational structure, state of autonomy, preference divergence in its fold, recruitment core, propagation avenues, down to their capacity to adapt, resulting critically in their own life cycles. A major advantage of the model is the utility of mapping terrorist organizations according to their fits to the sundry identified variants, allowing for flexibility and differences within, enabling the researchers and counterterrorism agencies to observe a neat blueprint of the organization’s footprint, along with highlighting the areas to be evaluated for focused target zone selection and timing of counterterrorism interventions. Special consideration is given to the dimension of financing, keeping in context the latest developments regarding cryptocurrencies, hawala, and global anti-money laundering initiatives. Specific counterterrorism strategies and intervention points have been identified for each of the respective model variants, with a view to efficient and effective deployment of resources.

Keywords: terrorism, counterterrorism, model, strategy

Procedia PDF Downloads 141
142 Paradigms of Sustainability: Roles and Impact of Communication in the Fashion System

Authors: Elena Pucci, Margherita Tufarelli, Leonardo Giliberti

Abstract:

As central for human and social development of the future, sustainability is becoming a recurring theme also in the fashion industry, where the need to explore new possible directions aimed at achieving sustainability goals and their communication is rising. Scholars have been devoted to the overall environmental impact of the textile and fashion industry, which, emerging as one of the world’s most polluting, today concretely assumes the need to take the path of sustainability in both products and production processes. Every day we witness the impact of our consumption, showing that the sustainability concept is as vast as complex: with a sometimes ambiguous definition, sustainability can concern projects, products, companies, sales, packagings, supply chains in relation to the actors proximity as well as traceability, raw materials procurement, and disposal. However, in its primary meaning, sustainability is the ability to maintain specific values and resources for future generations. The contribution aims to address sustainability in the fashion system as a layered problem that requires substantial changes at different levels: in the fashion product (materials, production processes, timing, distribution, and disposal), in the functioning of the system (life cycle, impact, needs, communication) and last but not least in the practice of fashion design which should conceive durable, low obsolescence and possibly demountable products. Moreover, consumers play a central role for the growing awareness, together with an increasingly strong sensitivity towards the environment and sustainable clothing. Since it is also a market demand, undertaking significant efforts to achieve total transparency and sustainability in all production and distribution processes is becoming fundamental for the fashion system. Sustainability is not to be understood as purely environmental but as the pursuit of collective well-being in relation to conscious production, human rights, and social dignity with the aim to achieve intelligent, resource, and environmentally friendly production and consumption patterns. Assuming sustainability as a layered problem makes the role of communication crucial to convey scientific or production specific content so that people can obtain and interpret information to make related decisions. Hence, if it is true that “what designers make becomes the future we inhabit'', design is facing great and challenging responsibility. The fashion industry needs a system of rules able to assess the sustainability of products, which is transparent and easily interpreted by consumers, identifying and enhancing virtuous practices. There are still complex and fragmented value chains that make it extremely difficult for brands and manufacturers to know the history of their products, to identify exactly where the risks lie, and to respond to the growing demand from consumers and civil society for responsible and sustainable production practices in the fashion industry.

Keywords: fashion design, fashion system, sustainability, communication, complexity

Procedia PDF Downloads 109
141 Characterization of Defense-Related Genes and Metabolite Profiling in Oil Palm Elaeis guineensis during Interaction with Ganoderma boninense

Authors: Mohammad Nazri Abdul Bahari, Nurshafika Mohd Sakeh, Siti Nor Akmar Abdullah

Abstract:

Basal stem rot (BSR) is the most devastating disease in oil palm. Among the oil palm pathogenic fungi, the most prevalent and virulent species associated with BSR is Ganoderma boninense. Early detection of G. boninense attack in oil palm wherein physical symptoms has not yet appeared can offer opportunities to prevent the spread of the necrotrophic fungus. However, poor understanding of molecular defense responses and roles of antifungal metabolites in oil palm against G. boninense has complicated the resolving measures. Hence, characterization of defense-related molecular responses and production of antifungal compounds during early interaction with G. boninense is of utmost important. Four month-old oil palm (Elaeis guineensis) seedlings were artificially infected with G. boninense-inoculated rubber wood block via sitting technique. RNA of samples were extracted from roots and leaves tissues at 0, 3, 7 and 11 days post inoculation (d.p.i) followed with sequencing using RNA-Seq method. Differentially-expressed genes (DEGs) of oil palm-G. boninense interaction were identified, while changes in metabolite profile will be scrutinized related to the DEGs. The RNA-Seq data generated a total of 113,829,376 and 313,293,229 paired-end clean reads from untreated (0 d.p.i) and treated (3, 7, 11 d.p.i) samples respectively, each with two biological replicates. The paired-end reads were mapped to Elaeis guineensis reference genome to screen out non-oil palm genes and subsequently generated 74,794 coding sequences. DEG analysis of phytohormone biosynthetic genes in oil palm roots revealed that at p-value ≤ 0.01, ethylene and jasmonic acid may act in antagonistic manner with salicylic acid to coordinate defense response at early interaction with G. boninense. Findings on metabolite profiling of G. boninense-infected oil palm roots and leaves are hoped to explain the defense-related compounds elicited by Elaeis guineensis in response to G. boninense colonization. The study aims to shed light on molecular defense response of oil palm at early interaction with G. boninense and promote prevention measures against Ganoderma infection.

Keywords: Ganoderma boninense, metabolites, phytohormones, RNA-Seq

Procedia PDF Downloads 245
140 Negotiating Strangeness: Narratives of Forced Return Migration and the Construction of Identities

Authors: Cheryl-Ann Sarita Boodram

Abstract:

Historically, the movement of people has been the subject of socio-political and economic regulatory policies which congeal to regulate human mobility and establish geopolitical and spatial identities and borderlands. As migratory practices evolved, so too has the problematization associated with movement, migration and citizenship. The emerging trends have led to active development of immigration technology governing human mobility and the naming of migratory practices. One such named phenomenon is ‘deportation’ or the forced removal of individuals from their adopted country. Deportation, has gained much attention within the human mobility landscape in the past twenty years following the September 2001 terrorist attack on the World Trade Centre in New York. In a reactionary move, several metropolitan countries, including Canada and the United Kingdom enacted or reviewed immigration laws which further enabled the removal of foreign born criminals to the land of their birth in the global south. Existing studies fall short of understanding the multiple textures of the forced returned migration experiences and the social injustices resulting from deportation displacement. This study brings together indigenous research methodologies through the use of participatory action research and social work with returned migrants in Trinidad and Tobago to uncover the experiences of displacement of deported nationals. The study explores the experiences of negotiating life as a ‘stranger’ and how return has influenced the construction of identities of returned nationals. Findings from this study reveal that deportation has led to inequalities and facilitated ‘othering’ of this group within their own country of birth. The study further highlighted that deportation leads to circuits of dispossession, and perpetuates inequalities. This study provides original insights into the way returned migrants negotiate, map and embody ‘strangeness’ and manage their return to a soil they consider unfamiliar and alien.

Keywords: stranger, alien geographies, displacement, deportation, negotiating strangeness, identity, otherness, alien landscapes

Procedia PDF Downloads 491
139 Streamlining .NET Data Access: Leveraging JSON for Data Operations in .NET

Authors: Tyler T. Procko, Steve Collins

Abstract:

New features in .NET (6 and above) permit streamlined access to information residing in JSON-capable relational databases, such as SQL Server (2016 and above). Traditional methods of data access now comparatively involve unnecessary steps which compromise system performance. This work posits that the established ORM (Object Relational Mapping) based methods of data access in applications and APIs result in common issues, e.g., object-relational impedance mismatch. Recent developments in C# and .NET Core combined with a framework of modern SQL Server coding conventions have allowed better technical solutions to the problem. As an amelioration, this work details the language features and coding conventions which enable this streamlined approach, resulting in an open-source .NET library implementation called Codeless Data Access (CODA). Canonical approaches rely on ad-hoc mapping code to perform type conversions between the client and back-end database; with CODA, no mapping code is needed, as JSON is freely mapped to SQL and vice versa. CODA streamlines API data access by improving on three aspects of immediate concern to web developers, database engineers and cybersecurity professionals: Simplicity, Speed and Security. Simplicity is engendered by cutting out the “middleman” steps, effectively making API data access a whitebox, whereas traditional methods are blackbox. Speed is improved because of the fewer translational steps taken, and security is improved as attack surfaces are minimized. An empirical evaluation of the speed of the CODA approach in comparison to ORM approaches ] is provided and demonstrates that the CODA approach is significantly faster. CODA presents substantial benefits for API developer workflows by simplifying data access, resulting in better speed and security and allowing developers to focus on productive development rather than being mired in data access code. Future considerations include a generalization of the CODA method and extension outside of the .NET ecosystem to other programming languages.

Keywords: API data access, database, JSON, .NET core, SQL server

Procedia PDF Downloads 51
138 The Effects of Leadership on the Claim of Responsibility

Authors: Katalin Kovacs

Abstract:

In most forms of violence the perpetrators intend to hide their identities. Terrorism is different. Terrorist groups often take responsibility for their attacks, and consequently they reveal their identities. This unique characteristic of terrorism has been largely overlooked, and scholars are still puzzled as to why terrorist groups claim responsibility for their attacks. Certainly, the claim of responsibility is worth analysing. It would help to have a clearer picture of what terrorist groups try to achieve and how, but also to develop an understanding of the strategic planning of terrorist attacks and the message the terrorists intend to deliver. The research aims to answer the question why terrorist groups choose to claim responsibility for some of their attacks and not for others. In order to do so the claim of responsibility is considered to be a tactical choice, based on the assumption that terrorists weigh the costs and benefits of claiming responsibility. The main argument is that terrorist groups do not claim responsibility in cases when there is no tactical advantage gained from claiming responsibility. The idea that the claim of responsibility has tactical value offers the opportunity to test these assertions using a large scale empirical analysis. The claim of responsibility as a tactical choice depends on other tactical choices, such as the choice of target, the internationality of the attack, the number of victims and whether the group occupies territory or operates as an underground group. The structure of the terrorist groups and the level of decision making also affects the claim of responsibility. Terrorists on the lower level are less disciplined than the leaders. This means that the terrorists on lower levels pay less attention to the strategic objectives and engage easier in indiscriminate violence, and consequently they would less like to claim responsibility. Therefore, the research argues that terrorists, who are on a highest level of decision making would claim responsibility for the attacks as those are who takes into account the strategic objectives. As most studies on terrorism fail to provide definitions; therefore the researches are fragmented and incomparable. Separate, isolated researches do not support comprehensive thinking. It is also very important to note that there are only a few researches using quantitative methods. The aim of the research is to develop a new and comprehensive overview of the claim of responsibility based on strong quantitative evidence. By using well-established definitions and operationalisation the current research focuses on a broad range of attributes that can have tactical values in order to determine circumstances when terrorists are more likely to claim responsibility.

Keywords: claim of responsibility, leadership, tactical choice, terrorist group

Procedia PDF Downloads 297
137 From Primer Generation to Chromosome Identification: A Primer Generation Genotyping Method for Bacterial Identification and Typing

Authors: Wisam H. Benamer, Ehab A. Elfallah, Mohamed A. Elshaari, Farag A. Elshaari

Abstract:

A challenge for laboratories is to provide bacterial identification and antibiotic sensitivity results within a short time. Hence, advancement in the required technology is desirable to improve timing, accuracy and quality. Even with the current advances in methods used for both phenotypic and genotypic identification of bacteria the need is there to develop method(s) that enhance the outcome of bacteriology laboratories in accuracy and time. The hypothesis introduced here is based on the assumption that the chromosome of any bacteria contains unique sequences that can be used for its identification and typing. The outcome of a pilot study designed to test this hypothesis is reported in this manuscript. Methods: The complete chromosome sequences of several bacterial species were downloaded to use as search targets for unique sequences. Visual basic and SQL server (2014) were used to generate a complete set of 18-base long primers, a process started with reverse translation of randomly chosen 6 amino acids to limit the number of the generated primers. In addition, the software used to scan the downloaded chromosomes using the generated primers for similarities was designed, and the resulting hits were classified according to the number of similar chromosomal sequences, i.e., unique or otherwise. Results: All primers that had identical/similar sequences in the selected genome sequence(s) were classified according to the number of hits in the chromosomes search. Those that were identical to a single site on a single bacterial chromosome were referred to as unique. On the other hand, most generated primers sequences were identical to multiple sites on a single or multiple chromosomes. Following scanning, the generated primers were classified based on ability to differentiate between medically important bacterial and the initial results looks promising. Conclusion: A simple strategy that started by generating primers was introduced; the primers were used to screen bacterial genomes for match. Primer(s) that were uniquely identical to specific DNA sequence on a specific bacterial chromosome were selected. The identified unique sequence can be used in different molecular diagnostic techniques, possibly to identify bacteria. In addition, a single primer that can identify multiple sites in a single chromosome can be exploited for region or genome identification. Although genomes sequences draft of isolates of organism DNA enable high throughput primer design using alignment strategy, and this enhances diagnostic performance in comparison to traditional molecular assays. In this method the generated primers can be used to identify an organism before the draft sequence is completed. In addition, the generated primers can be used to build a bank for easy access of the primers that can be used to identify bacteria.

Keywords: bacteria chromosome, bacterial identification, sequence, primer generation

Procedia PDF Downloads 176
136 Evaluation of the Effectiveness of Barriers for the Control of Rats in Rice Plantation Field

Authors: Melina, Jumardi Jumardi, Erwin Erwin, Sri Nuraminah, Andi Nasruddin

Abstract:

The rice field rat (Rattus argentiventer Robinson and Kloss) is a pest causing the greatest yield loss of rice plants, especially in lowland agroecosystems with intensive cropping patterns (2-3 plantings per year). Field mice damage rice plants at all stages of growth, from seedling to harvest, even in storage warehouses. Severe damage with yield loss of up to 100% occurs if rats attack rice at the generative stage because the plants are no longer able to recover by forming new tillers. Farmers mainly use rodenticides in the form of poisoned baits or as fumigants, which are applied to rat burrow holes. This practice is generally less effective because mice are able to avoid the poison or become resistant after several exposures to it. In addition, excessive use of rodenticides can have negative impacts on the environment and non-target organisms. For this reason, this research was conducted to evaluate the effectiveness of fences as an environmentally friendly mechanical control method in reducing rice yield losses due to rat attacks. This study used a factorial randomized block design. The first factor was the fence material, namely galvanized zinc plate and plastic. The second factor was the height of the fence, namely 25, 50, 75, and 100 cm from the ground level. Each treatment combination was repeated five times. Data shows that zinc fences with a height of 75 and 100 cm are able to provide full protection to plants from rat infestations throughout the planting season. However, zinc fences with a height of 25 and 50 cm failed to prevent rat attacks. Plastic fences with a height of 25 and 50 cm failed to prevent rat attacks during the planting season, whereas 75 and 100 cm were able to prevent rat attacks until all the crops outside of the fence had been eaten by rats. The rat managed to get into the fence by biting the plastic fence close to the ground. Thus, the research results show that fences made of zinc plate with a height of at least 75 cm from the ground surface are effective in preventing plant damage caused by rats. To our knowledge, this research is the first to quantify the effectiveness of fences as a control of field rodents.

Keywords: rice field rat, Rattus argentiventer, fence, rice

Procedia PDF Downloads 14
135 Cinema and the Documentation of Mass Killings in Third World Countries: A Study of Selected African Films

Authors: Chijindu D. Mgbemere

Abstract:

Mass killing also known as genocide is the systematic killing of people from national, ethnic, or religious group, or an attempt to do so. The act has been there before 1948, when it was officially recognized for what it is. From then, the world has continued to witness genocide in diverse forms- negating different measures by the United Nations and its agencies to curb it. So far, all the studies and documentations on this subject are biased in favor of radio and the print. This paper therefore extended the interrogation of genocide, drumming its devastating effects, using the film medium; and in doing so devised innovative and pragmatic approach to genocide scholarship. It further centered attention on the factors and impacts of genocide, with a view to determine how effective film can be in such a study. The study is anchored on Bateson’s Framing Theory. Four films- Hotel Rwanda, Half of a Yellow Sun, Attack on Darfur, and sarafina, were analyzed, based on background, factors/causes, impacts, and development of genocide, via Content Analysis. The study discovered that: as other continents strive towards peace, acts of genocide are on the increase in African. Bloodletting stereotypes give Africa negative image in the global society. Difficult political frameworks, the trauma of postcolonial state, aggravated by ethnic and religious intolerance, and limited access to resources are responsible for high cases of genocide in Africa. The media, international communities, and peace agencies often abet other than prevent genocide or mass killings in Africa. High human casualty and displacement, children soldering, looting, hunger, rape, sex-slavery and abuse, mental and psychosomatic stress disorders are some of the impacts of genocide. Genocidaires are either condemned or killed. Grievances can be vented using civil resistance, negotiation, adjudication, arbitration, and mediation. The cinema is an effective means of studying and documenting genocide. Africans must factor the image laundering of their continent into consideration. Punishment of genocidaires without an attempt to de-radicalize them is counterproductive.

Keywords: African film, genocide, framing theory, mass murder

Procedia PDF Downloads 103
134 Effect of Soil Resistivity on the Development of a Cathodic Protection System Using Zinc Anode

Authors: Chinedu F. Anochie

Abstract:

The deterioration of materials as a result of their interaction with the environment has been a huge challenge to engineering. Many steps have been taking to tackle corrosion and its effects on harmful effects on engineering materials and structures. Corrosion inhibition, coating, passivation, materials selection, and cathodic protection are some of the methods utilized to curtail the rate at which materials corrode. The use of sacrificial anodes (magnesium, aluminum, or zinc) to protect the metal of interest is a widespread technique used to prevent corrosion in underground structures, ship hauls, and other structures susceptible to corrosion attack. However, certain factors, like resistivity, affect the performance of sacrificial anodes. To establish the effect of soil resistivity on the effectiveness of a cathodic protection system, a mild steel specimen was cathodically protected around Workshop 2 area, Federal University of Technology, Owerri, Nigeria. Design calculations showed that one zinc anode was sufficient to protect the pipe. The specimen (mild steel pipe) was coated with white and black polykene tapes and was subsequently buried in a high resistivity soil. The pipe-to-soil potential measurements were obtained using a digital fluke multimeter. The protection potential obtained on installation was higher than the minimum protection criteria. However, the potential results obtained over a fourteen-day intervals continually decreased to a value significantly lower than the minimum protection criteria. This showed that the sacrificial anode (zinc) was rendered ineffective by the high resistivity of the area of installation. It has been shown that the resistivity of the soil has a marked effect on the feasibility of cathodic protection systems. This work justified that zinc anode cannot be used for cathodic protection around Workshop 2 area, Federal University of Technology, Owerri, Nigeria, because of the high resistivity of the area. An experimental data which explains the effectiveness of galvanic anode cathodic protection system on corrosion control of a small steel structure, exposed to a soil of high resistivity has been established.

Keywords: cathodic protection, corrosion, pipe, sacrificial anode

Procedia PDF Downloads 162
133 Health Literacy: Collaboration between Clinician and Patient

Authors: Cathy Basterfield

Abstract:

Issue: To engage in one’s own health care, health professionals need to be aware of an individual’s specific skills and abilities for best communication. One of the most discussed is health literacy. One of the assumed skills and abilities for adults is an individuals’ health literacy. Background: A review of publicly available health content appears to assume all adult readers will have a broad and full capacity to read at a high level of literacy, often at a post-school education level. Health information writers and clinicians need to recognise one critical area for why there may be little or no change in a person’s behaviour, or no-shows to appointments. Perhaps unintentionally, they are miscommunicating with the majority of the adult population. Health information contains many literacy domains. It usually includes technical medical terms or jargon. Many fact sheets and other information require scientific literacy with or without specific numerical literacy. It may include graphs, percentages, timing, distance, or weights. Each additional word or concept in these domains decreases the readers' ability to meaningfully read, understand and know what to do with the information. An attempt to begin to read the heading where long or unfamiliar words are used will reduce the readers' motivation to attempt to read. Critically people who have low literacy are overwhelmed when pages are covered with lots of words. People attending a health environment may be unwell or anxious about a diagnosis. These make it harder to read, understand and know what to do with the information. But access to health information must consider an even wider range of adults, including those with poor school attainment, migrants, and refugees. It is also homeless people, people with mental health illnesses, or people who are ageing. People with low literacy also may include people with lifelong disabilities, people with acquired disabilities, people who read English as a second (or third) language, people who are Deaf, or people who are vision impaired. Outcome: This paper will discuss Easy English, which is developed for adults. It uses the audiences’ everyday words, short sentences, short words, and no jargon. It uses concrete language and concrete, specific images to support the text. It has been developed in Australia since the mid-2000s. This paper will showcase various projects in the health domain which use Easy English to improve the understanding and functional use of written information for the large numbers of adults in our communities who do not have the health literacy to manage a range of day to day reading tasks. See examples from consent forms, fact sheets and choice options, instructions, and other functional documents, where Easy English has been developed. This paper will ask individuals to reflect on their own work practice and consider what written information must be available in Easy English. It does not matter how cutting-edge a new treatment is; when adults can not read or understand what it is about and the positive and negative outcomes, they are less likely to be engaged in their own health journey.

Keywords: health literacy, inclusion, Easy English, communication

Procedia PDF Downloads 104
132 Evaluation of Batch Splitting in the Context of Load Scattering

Authors: S. Wesebaum, S. Willeke

Abstract:

Production companies are faced with an increasingly turbulent business environment, which demands very high production volumes- and delivery date flexibility. If a decoupling by storage stages is not possible (e.g. at a contract manufacturing company) or undesirable from a logistical point of view, load scattering effects the production processes. ‘Load’ characterizes timing and quantity incidence of production orders (e.g. in work content hours) to workstations in the production, which results in specific capacity requirements. Insufficient coordination between load (demand capacity) and capacity supply results in heavy load scattering, which can be described by deviations and uncertainties in the input behavior of a capacity unit. In order to respond to fluctuating loads, companies try to implement consistent and realizable input behavior using the capacity supply available. For example, a uniform and high level of equipment capacity utilization keeps production costs down. In contrast, strong load scattering at workstations leads to performance loss or disproportionately fluctuating WIP, whereby the logistics objectives are affected negatively. Options for reducing load scattering are e.g. shifting the start and end dates of orders, batch splitting and outsourcing of operations or shifting to other workstations. This leads to an adjustment of load to capacity supply, and thus to a reduction of load scattering. If the adaptation of load to capacity cannot be satisfied completely, possibly flexible capacity must be used to ensure that the performance of a workstation does not decrease for a given load. Where the use of flexible capacities normally raises costs, an adjustment of load to capacity supply reduces load scattering and, in consequence, costs. In the literature you mostly find qualitative statements for describing load scattering. Quantitative evaluation methods that describe load mathematically are rare. In this article the authors discuss existing approaches for calculating load scattering and their various disadvantages such as lack of opportunity for normalization. These approaches are the basis for the development of our mathematical quantification approach for describing load scattering that compensates the disadvantages of the current quantification approaches. After presenting our mathematical quantification approach, the method of batch splitting will be described. Batch splitting allows the adaptation of load to capacity to reduce load scattering. After describing the method, it will be explicitly analyzed in the context of the logistic curve theory by Nyhuis using the stretch factor α1 in order to evaluate the impact of the method of batch splitting on load scattering and on logistic curves. The conclusion of this article will be to show how the methods and approaches presented can help companies in a turbulent environment to quantify the occurring work load scattering accurately and apply an efficient method for adjusting work load to capacity supply. In this way, the achievements of the logistical objectives are increased without causing additional costs.

Keywords: batch splitting, production logistics, production planning and control, quantification, load scattering

Procedia PDF Downloads 382
131 Efficacy of Coconut Shell Pyrolytic Oil Distillate in Protecting Wood Against Bio-Deterioration

Authors: K. S. Shiny, R. Sundararaj

Abstract:

Coconut trees (Cocos nucifera L.) are grown in many parts of India and world because of its multiple utilities. During pyrolysis, coconut shells yield oil, which is a dark thick liquid. Upon simple distillation it produces a more or less colourless liquid, termed coconut shell pyrolytic oil distillate (CSPOD). This manuscript reports and discusses the use of coconut shell pyrolytic oil distillate as a potential wood protectant against bio-deterioration. Since botanical products as ecofriendly wood protectant is being tested worldwide, the utilization of CPSOD as wood protectant is of great importance. The efficacy of CSPOD as wood protectant was evaluated as per Bureau of Indian Standards (BIS) in terms of its antifungal, antiborer, and termiticidal activities. Specimens of Rubber wood (Hevea brasiliensis) in six replicate each for two treatment methods namely spraying and dipping (48hrs) were employed. CSPOD was found to impart total protection against termites for six months compared to control under field conditions. For assessing the efficacy of CSPOD against fungi, the treated blocks were subjected to the attack of two white rot fungi Tyromyces versicolor (L.) Fr. and Polyporus sanguineus (L.) G. Mey and two brown rot fungi, Polyporus meliae (Undrew.) Murrill. and Oligoporus placenta (Fr.) Gilb. & Ryvarden. Results indicated that treatment with CSPOD significantly protected wood from the damage caused by the decay fungi. Efficacy of CSPOD against wood borer Lyctus africanus Lesne was carried out using six pairs of male and female beetles and it gave promising results in protecting the treated wood blocks when compared to control blocks. As far as the treatment methods were concerned, dip treatment was found to be more effective when compared to spraying. The results of the present investigation indicated that CSPOD is a promising botanical compound which has the potential to replace synthetic wood protectants. As coconut shell, pyrolytic oil is a waste byproduct of coconut shell charcoal industry, its utilization as a wood preservative will expand the economic returns from such industries.

Keywords: coconut shell pyrolytic oil distillate, eco-friendly wood protection, termites, wood borers, wood decay fungi

Procedia PDF Downloads 352
130 The Effect of Three-Dimensional Morphology on Vulnerability Assessment of Atherosclerotic Plaque

Authors: M. Zareh, H. Mohammadi, B. Naser

Abstract:

Atherosclerotic plaque rupture is the main trigger of heart attack and brain stroke which are the leading cause of death in developed countries. Better understanding of rupture-prone plaque can help clinicians detect vulnerable plaques- rupture prone or instable plaques- and apply immediate medical treatment to prevent these life-threatening cardiovascular events. Therefore, there are plenty of studies addressing disclosure of vulnerable plaques properties. Necrotic core and fibrous tissue are two major tissues constituting atherosclerotic plaque; using histopathological and numerical approaches, many studies have demonstrated that plaque rupture is strongly associated with a large necrotic core and a thin fibrous cap, two morphological characteristic which can be acquired by two-dimensional imaging of atherosclerotic plaque present in coronary and carotid arteries. Plaque rupture is widely considered as a mechanical failure inside plaque tissue; this failure occurs when the stress within plaque excesses the strength of tissue material; hence, finite element method, a strong numerical approach, has been extensively applied to estimate stress distribution within plaques with different compositions which is then used for assessment of various vulnerability characteristics including plaque morphology, material properties and blood pressure. This study aims to evaluate significance of three-dimensional morphology on vulnerability degree of atherosclerotic plaque. To reach this end, different two-dimensional geometrical models of atherosclerotic plaques are considered based on available data and named Main 2D Models (M2M). Then, for each of these M2Ms, two three-dimensional idealistic models are created. These two 3D models represent two possible three-dimensional morphologies which might exist for a plaque with similar 2D morphology to one of M2Ms. Finite element method is employed to estimate stress, von-Mises stress, within each 3D models. Results indicate that for each M2Ms stress can significantly varies due to possible 3D morphological changes in that plaque. Also, our results show that an atherosclerotic plaque with thick cap may experience rupture if it has a critical 3D morphology. This study highlights the effect of 3D geometry of plaque on its instability degree and suggests that 3D morphology of plaque might be necessary to more effectively and accurately assess atherosclerotic plaque vulnerability.

Keywords: atherosclerotic plaque, plaque rupture, finite element method, 3D model

Procedia PDF Downloads 292
129 Exploring the Physical Activity Behavior and Needs of Adolescent Girls: A Mixed-Methods Study

Authors: Vicki R. Voskuil, Jorgie M. Watson

Abstract:

Despite the well-established health benefits of physical activity (PA), most adolescents do not meet guidelines recommending 60 minutes of moderate to vigorous physical activity (MVPA) each day. Adolescent girls engage in less PA than boys, a difference that increases with age. By the 9th grade, only 20% of girls report meeting recommendations for PA with lower percentages for black and Hispanic girls compared to white girls. The purpose of the study was to explore the physical activity (PA) behavior and needs of adolescent girls. Study aims included assessment of adolescent girls’ PA behavior; facilitators of and barriers to PA, PA needs, and acceptability of the Fitbit-Flex 2 activity tracker. This exploratory study used a qualitative and quantitative approach. The qualitative approach involved a focus group using a semi-structured interview technique. PA was measured using the Fitbit-Flex 2 activity tracker. Steps, distance, and active minutes were recorded for one week. A Fitbit survey was also administered to assess acceptability. SPSS Version 22.0 and ATLAS.ti Version 8 were used to analyze data. Girls in the ninth grade were recruited from a high school in the Midwest (n=11). Girls were excluded if they were involved in sports or other organized PA ≥ 3 days per week, had a health condition that prevented or limited PA, or could not read and write English. Participants received a Fitbit-Flex 2 activity tracker to wear for one week. At the end of the week, girls returned the Fitbit and participated in a focus group. Girls responded to open-ended questions regarding their PA behavior and shared their ideas for future intervention efforts aimed at increasing PA among adolescents. Girls completed a survey assessing their perceptions of the Fitbit. Mean age of the girls was 15.3 years (SD=0.44). On average girls took 6,520 steps and walked 2.73 miles each day. Girls stated their favorite types of PA were walking, riding bike, and running. Most girls stated they did PA for 30 minutes or more at a time once a day or every other day. The top 3 facilitators of PA reported by girls were friends, family, and transportation. The top 3 barriers included health issues, lack of motivation, and weather. Top intervention ideas were community service projects, camps, and using a Fitbit activity tracker. Girls felt the best timing of a PA program would be in the summer. Fitbit survey results showed 100% of girls would use a Fitbit on most days if they had one. Ten (91%) girls wore the Fitbit on all days. Seven (64%) girls used the Fitbit app and all reported they liked it. Findings indicate that PA participation for this sample is consistent with previous studies. Adolescent girls are not meeting recommended daily guidelines for PA. Fitbit activity trackers were positively received by all participants and could be used in future interventions aimed at increasing PA for adolescent girls. PA interventions that take place in the summer with friends and include community service projects may increase PA and be well received by this population.

Keywords: adolescents, girls, interventions, physical activity

Procedia PDF Downloads 214
128 The Community Stakeholders’ Perspectives on Sexual Health Education for Young Adolescents in Western New York, USA: A Qualitative Descriptive Study

Authors: Sadandaula Rose Muheriwa Matemba, Alexander Glazier, Natalie M. LeBlanc

Abstract:

In the United States, up to 10% of girls and 22 % of boys 10-14 years have had sex, 5% of them had their first sex before 11 years, and the age of first sexual encounter is reported to be 8 years. Over 4,000 adolescent girls, 10-14 years, become pregnant every year, and 2.6% of the abortions in 2019 were among adolescents below 15 years. Despite these negative outcomes, little research has been conducted to understand the sexual health education offered to young adolescents ages 10-14. Early sexual health education is one of the most effective strategies to help lower the rate of early pregnancies, HIV infections, and other sexually transmitted. Such knowledge is necessary to inform best practices for supporting the healthy sexual development of young adolescents and prevent adverse outcomes. This qualitative descriptive study was conducted to explore the community stakeholders’ experiences in sexual health education for young adolescents ages 10-14 and ascertain the young adolescents’ sexual health support needs. Maximum variation purposive sampling was used to recruit a total sample of 13 community stakeholders, including health education teachers, members of youth-based organizations, and Adolescent Clinic providers in Rochester, New York State, in the United States of America from April to June 2022. Data were collected through semi-structured individual in-depth interviews and were analyzed using MAXQDA following a conventional content analysis approach. Triangulation, team analysis, and respondent validation to enhance rigor were also employed to enhance study rigor. The participants were predominantly female (92.3%) and comprised of Caucasians (53.8%), Black/African Americans (38.5%), and Indian-American (7.7%), with ages ranging from 23-59. Four themes emerged: the perceived need for early sexual health education, preferred timing to initiate sexual health conversations, perceived age-appropriate content for young adolescents, and initiating sexual health conversations with young adolescents. The participants described encouraging and concerning experiences. Most participants were concerned that young adolescents are living in a sexually driven environment and are not given the sexual health education they need, even though they are open to learning sexual health materials. There was consensus on the need to initiate sexual health conversations early at 4 years or younger, standardize sexual health education in schools and make age-appropriate sexual health education progressive. These results show that early sexual health education is essential if young adolescents are to delay sexual debut, prevent early pregnancies, and if the goal of ending the HIV epidemic is to be achieved. However, research is needed on a larger scale to understand how best to implement sexual health education among young adolescents and to inform interventions for implementing contextually-relevant sexuality education for this population. These findings call for increased multidisciplinary efforts in promoting early sexual health education for young adolescents.

Keywords: community stakeholders’ perspectives, sexual development, sexual health education, young adolescents

Procedia PDF Downloads 66
127 Unveiling the Reaction Mechanism of N-Nitroso Dimethyl Amine Formation from Substituted Hydrazine Derivatives During Ozonation: A Computational Study

Authors: Rehin Sulay, Anandhu Krishna, Jintumol Mathew, Vibin Ipe Thomas

Abstract:

N-Nitrosodimethyl amine, the simplest member of the N-Nitrosoamine family, is a carcinogenic and mutagenic agent that has gained considerable research interest owing to its toxic nature. Ozonation of industrially important hydrazines such as unsymmetrical dimethylhydrazine (UDMH) or monomethylhydrazine (MMH) has been associated with NDMA formation and accumulation in the environment. UDMH/MMH - ozonation also leads to several other transformation products such as acetaldehyde dimethyl hydrazone (ADMH), tetramethyl tetra azene (TMT), diazomethane, methyl diazene, etc, which can be either precursors or competitors for NDMA formation.In this work, we explored the formation mechanism of ADMH and TMT from UDMH-ozonation and their further oxidation to NDMA using the second-order Moller Plesset perturbation theory employing the 6-311G(d) basis set. We have also investigated how MMH selectively forms methyl diazene and diazomethane under normal conditions and NDMA in the presence of excess ozone. Our calculations indicate that the reactions proceed via an initial H abstraction from the hydrazine –NH2 group followed by the oxidation of the generated N-radical species. The formation of ADMH from the UDMH-ozone reaction involves an acetaldehyde intermediate, which then reacts with a second UDMH molecule to generate ADMH. The preferable attack of ozone molecule on N=C bond of ADMH generates DMAN intermediate, which subsequently undergoes oxidation to form NDMA. Unlike other transformation products, TMT formation occurs via the dimerization of DMAN. Though there exist a N=N bonds in the TMT, which are preferable attacking sites for ozone, experimental studies show the lower yields of NDMA formation, which corroborates with the high activation barrier required for the process(42kcal/mol).Overall, our calculated results agree well with the experimental observations and rate constants. Computational calculations bring insights into the electronic nature and kinetics of the elementary reactions of this pathway, enabled by computed energies of structures that are not possible to access experimentally.

Keywords: reaction mechanism, ozonation, substituted hydrazine, transition state

Procedia PDF Downloads 63
126 Dynamic Ambulance Deployment to Reduce Ambulance Response Times Using Geographic Information Systems

Authors: Masoud Swalehe, Semra Günay

Abstract:

Developed countries are losing many lives to non-communicable diseases as compared to their developing counterparts. The effects of these diseases are mostly sudden and manifest at a very short time prior to death or a dangerous attack and this has consolidated the significance of emergency medical system (EMS) as one of the vital areas of healthcare service delivery. The primary objective of this research is to reduce ambulance response times (RT) of Eskişehir province EMS since a number of studies have established a relationship between ambulance response times and survival chances of patients especially out of hospital cardiac arrest (OHCA) victims. It has been found out that patients who receive out of hospital medical attention in few (4) minutes after cardiac arrest because of low ambulance response times stand higher chances of survival than their counterparts who take longer times (more than 12 minutes) to receive out of hospital medical care because of higher ambulance response times. The study will make use of geographic information systems (GIS) technology to dynamically reallocate ambulance resources according to demand and time so as to reduce ambulance response times. Geospatial-time distribution of ambulance calls (demand) will be used as a basis for optimal ambulance deployment using system status management (SSM) strategy to achieve much demand coverage with the same number of ambulance resources to cause response time reduction. Drive-time polygons will be used to come up with time specific facility coverage areas and suggesting additional facility candidate sites where ambulance resources can be moved to serve higher demands making use of network analysis techniques. Emergency Ambulance calls’ data from 1st January 2014 to 31st December 2014 obtained from Eskişehir province health directorate will be used in this study. This study will focus on the reduction of ambulance response times which is a key Emergency Medical Services performance indicator.

Keywords: emergency medical services, system status management, ambulance response times, geographic information system, geospatial-time distribution, out of hospital cardiac arrest

Procedia PDF Downloads 285
125 Submarines Unmanned Vehicle for Underwater Exploration and Monitoring System in Indonesia

Authors: Nabila Dwi Agustin, Ria Septitis Mentari, Nugroho Adi Sasongko

Abstract:

Indonesia is experiencing a crisis in the development of defense equipment. Most of Indonesia's defense equipment must import its parts from other countries. Moreover, the area of Indonesia is 2/3 of its territory is the sea areas. For the protection of marine areas, Indonesia relies solely on submarines in monitoring conditions and whether or not intruders enter their territory. In fact, we know the submarine has a large size so that the expenses are getting bigger, the time it takes longer and needs a big maneuver to operate the submarine. Indeed, the submarine can only be operated for deeper seas. Many other countries enter the underwater world of Indonesia but Indonesia could not do anything due to the limitations of underwater monitoring system. At the same time, reconnaissance and monitor for shallow seas cannot be done by submarine. Equipment that can be used for surveillance of shallow underwater areas shall be made. This study reviewed the current research and development initiative of the submarine unmanned vehicle (SUV) or unmanned undersea vehicle (UUV) in Indonesia. This can explore underwater without the need for an operator to operate in it, but we can monitor it from a long distance. UUV has several advantages that size can be reduced as we desired, rechargeable ship batteries, has a detection sonar commonly found on a submarine and agile movement to detect at shallow sea depth. In the sonar sensors consisted of MEMS (Micro Electro Mechanical System), the sonar system runs more efficiently and effectively to monitor the target. UUV that has been developed will be very useful if the equipment is used around the outlying islands and outer from Indonesia especially the island frequented by foreign submarines without us know. The impact of this may not be felt now but it will allow foreign countries to attack Indonesia from within for the future. In addition, UUV needs to be equipped with a anti-radar system so that submarines of other countries crossing borders cannot detect it and Indonesia anti-submarine vessels can take further security measures. As the recommendation, Indonesia should take decisive steps in the state border rules, especially submarines of other countries that deliberately cross the borders of the state. This decisive action not only by word alone but also action as well. Indonesia government should show the strength and sovereignty as the entire society unites and applies the principle of universal peace.

Keywords: submarine unmanned vehicle, submarine, development of defense equipment, the border of Indonesia

Procedia PDF Downloads 132
124 Midwives’ Perceptions and Experiences of Recommending and Delivering Vaccines to Pregnant Women Following the COVID-19 Pandemic

Authors: Cath Grimley, Debra Bick, Sarah Hillman, Louise Clarke, Helen Atherton, Jo Parsons

Abstract:

The problem: Women in the UK are offered influenza (flu), pertussis (whooping cough) and COVID-19 vaccinations during their pregnancy but uptake of all three vaccines is below the desired rate. These vaccines are offered during pregnancy as pregnant women are at an increased risk of hospitalisation, morbidity, and mortality from these illnesses. Exposure to these diseases during pregnancy can also have a negative impact on the unborn baby with an increased risk of serious complications both while in utero and following birth. The research aims to explore perceptions about the vaccinations offered in pregnancy both from the perspectives of pregnant women and midwives. To determine factors that influence pregnant women’s decisions about whether or not to accept the vaccines following the Covid-19 pandemic and to explore midwives’ experiences of recommending and delivering vaccines. The approach: This research follows a qualitative design involving semi-structured interviews with pregnant women and midwives in the UK. Interviews with midwives explored vaccination discussions they routinely have with pregnant women and identified some of the barriers to vaccination that pregnant women discuss with them. Interviews with pregnant women explored their views since the COVID-19 pandemic about vaccinations offered during pregnancy, and whether the pandemic has influenced perceptions of vulnerability to illness in pregnant women. Midwives were recruited via participating hospitals and midwife specific social media groups. Pregnant women were recruited via participating hospitals and community groups. All interviews were conducted remotely (using telephone or Microsoft Teams) and analysed using thematic analysis. Findings: 43 pregnant women and 16 midwives were recruited and interviewed. The findings presented here will focus on data from midwives. Topics identified included three key themes for midwives. These were 1) Delivery of vaccinations which includes the convenience of offering vaccinations while attending standard antenatal appointments and practical barriers faced in delivering these vaccinations at hospital. 2) Messages and guidance included the importance of up-to-date informational needs for midwives to deliver vaccines and that uncertainty and conflicting messages about the COVID-19 vaccine during pregnancy were a barrier to delivery. 3) Recommendations to have vaccines look at all aspects of recommendations such as how recommendations are communicated, the contents of the recommendation, the importance of the vaccine and the impact of those recommendations on whether women accept the vaccine. Implications: Findings highlight the importance for midwives to receive clear and consistent information so they can feel confident in relaying this information while recommending and delivering vaccines to pregnant women. Emphasising why vaccines are important when recommending vaccinations to pregnant women in addition to standard information on the availability and timing will add to the strength and impact of that recommendation in helping women to make informed decisions about accepting vaccines. The findings of this study will inform the development of an intervention to increase vaccination uptake amongst pregnant women.

Keywords: vaccination, pregnancy, qualitative, interviews, Covid-19, midwives

Procedia PDF Downloads 81
123 C-Spine Imaging in a Non-trauma Centre: Compliance with NEXUS Criteria Audit

Authors: Andrew White, Abigail Lowe, Kory Watkins, Hamed Akhlaghi, Nicole Winter

Abstract:

The timing and appropriateness of diagnostic imaging are critical to the evaluation and management of traumatic injuries. Within the subclass of trauma patients, the prevalence of c-spine injury is less than 4%. However, the incidence of delayed diagnosis within this cohort has been documented as up to 20%, with inadequate radiological examination most cited issue. In order to assess those in which c-spine injury cannot be fully excluded based on clinical examination alone and, therefore, should undergo diagnostic imaging, a set of criteria is used to provide clinical guidance. The NEXUS (National Emergency X-Radiography Utilisation Study) criteria is a validated clinical decision-making tool used to facilitate selective c-spine radiography. The criteria allow clinicians to determine whether cervical spine imaging can be safely avoided in appropriate patients. The NEXUS criteria are widely used within the Emergency Department setting given their ease of use and relatively straightforward application and are used in the Victorian State Trauma System’s guidelines. This audit utilized retrospective data collection to examine the concordance of c-spine imaging in trauma patients to that of the NEXUS criteria and assess compliance with state guidance on diagnostic imaging in trauma. Of the 183 patients that presented with trauma to the head, neck, or face (244 excluded due to incorrect triage), 98 did not undergo imaging of the c-spine. Out of those 98, 44% fulfilled at least one of the NEXUS criteria, meaning the c-spine could not be clinically cleared as per the current guidelines. The criterion most met was intoxication, comprising 42% (18 of 43), with midline spinal tenderness (or absence of documentation of this) the second most common with 23% (10 of 43). Intoxication being the most met criteria is significant but not unexpected given the cohort of patients seen at St Vincent’s and within many emergency departments in general. Given these patients will always meet NEXUS criteria, an element of clinical judgment is likely needed, or concurrent use of the Canadian C-Spine Rules to exclude the need for imaging. Midline tenderness as a met criterion was often in the context of poor or absent documentation relating to this, emphasizing the importance of clear and accurate assessments. The distracting injury was identified in 7 out of the 43 patients; however, only one of these patients exhibited a thoracic injury (T11 compression fracture), with the remainder comprising injuries to the extremities – some studies suggest that C-spine imaging may not be required in the evaluable blunt trauma patient despite distracting injuries in any body regions that do not involve the upper chest. This emphasises the need for standardised definitions for distracting injury, at least at a departmental/regional level. The data highlights the currently poor application of the NEXUS guidelines, with likely common themes throughout emergency departments, highlighting the need for further education regarding implementation and potential refinement/clarification of criteria. Of note, there appeared to be no significant differences between levels of experience with respect to inappropriately clearing the c-spine clinically with respect to the guidelines.

Keywords: imaging, guidelines, emergency medicine, audit

Procedia PDF Downloads 61
122 Statistical Comparison of Ensemble Based Storm Surge Forecasting Models

Authors: Amin Salighehdar, Ziwen Ye, Mingzhe Liu, Ionut Florescu, Alan F. Blumberg

Abstract:

Storm surge is an abnormal water level caused by a storm. Accurate prediction of a storm surge is a challenging problem. Researchers developed various ensemble modeling techniques to combine several individual forecasts to produce an overall presumably better forecast. There exist some simple ensemble modeling techniques in literature. For instance, Model Output Statistics (MOS), and running mean-bias removal are widely used techniques in storm surge prediction domain. However, these methods have some drawbacks. For instance, MOS is based on multiple linear regression and it needs a long period of training data. To overcome the shortcomings of these simple methods, researchers propose some advanced methods. For instance, ENSURF (Ensemble SURge Forecast) is a multi-model application for sea level forecast. This application creates a better forecast of sea level using a combination of several instances of the Bayesian Model Averaging (BMA). An ensemble dressing method is based on identifying best member forecast and using it for prediction. Our contribution in this paper can be summarized as follows. First, we investigate whether the ensemble models perform better than any single forecast. Therefore, we need to identify the single best forecast. We present a methodology based on a simple Bayesian selection method to select the best single forecast. Second, we present several new and simple ways to construct ensemble models. We use correlation and standard deviation as weights in combining different forecast models. Third, we use these ensembles and compare with several existing models in literature to forecast storm surge level. We then investigate whether developing a complex ensemble model is indeed needed. To achieve this goal, we use a simple average (one of the simplest and widely used ensemble model) as benchmark. Predicting the peak level of Surge during a storm as well as the precise time at which this peak level takes place is crucial, thus we develop a statistical platform to compare the performance of various ensemble methods. This statistical analysis is based on root mean square error of the ensemble forecast during the testing period and on the magnitude and timing of the forecasted peak surge compared to the actual time and peak. In this work, we analyze four hurricanes: hurricanes Irene and Lee in 2011, hurricane Sandy in 2012, and hurricane Joaquin in 2015. Since hurricane Irene developed at the end of August 2011 and hurricane Lee started just after Irene at the beginning of September 2011, in this study we consider them as a single contiguous hurricane event. The data set used for this study is generated by the New York Harbor Observing and Prediction System (NYHOPS). We find that even the simplest possible way of creating an ensemble produces results superior to any single forecast. We also show that the ensemble models we propose generally have better performance compared to the simple average ensemble technique.

Keywords: Bayesian learning, ensemble model, statistical analysis, storm surge prediction

Procedia PDF Downloads 292
121 Citrullinated Myelin Basic Protein Mediated Inflammation in Astrocytes

Authors: Lali Shanshiashvili, Marika Chikviladze, Nino Mamulashvili, Maia Sepashvili, Nana Narmania, David Mikeladze

Abstract:

Purpose: During demyelinating inflammatory diseases and after the damage of the myelin sheet, myelin-derived proteins, including myelin basic protein (MBP), are secreted into the extracellular space. MBP shows extensive post-translational modifications, including the deimination of arginine residues. Deiminated MBP is structurally less ordered, susceptible to proteolytic attack, and more immunogenic than the unmodified one. It is hypothesized that MBP could change the inflammatory response in astrocytes. Methods: MBP was isolated and purified from bovine brain white matter. Primary astrocyte cultures were prepared from whole brains of 2-day-old Wistar rats. For evaluation of glutamate uptake/release in astrocytes following treatment of cells with MBP charge isomers, Glutamate Assay Kit was used. The expression of EAAT-2 (excitatory amino acid transporters), peroxisome proliferator-activated receptor gamma (PPAR- γ), inhibitor of nuclear factor kappa B (IkB), and high mobility group protein B1 (HMGB1) in astrocytes were assayed by Western Blot analysis. Results: This study investigated the action of deiminated isomer (C8) on the cultured primary astrocytes and compared its effects with the effects of unmodified C1 isomers. The study found that C8 and C1 MBP differently act on the uptake and release of glutamate in astrocytes: nonmodified C1 MBP increases the uptake of glutamate and does not change the release, whereas C8 decreases the release of glutamate but does not alter the uptake. Nevertheless, both isomers increased the expression of PPAR-γ and EAAT2 in the same intensity. However, immunostaining and Western Blots of cell lysates showed a decrease of IkB and increased expression of HMGB1 after the treatment of astrocytes by C8. Moreover, in the presence of C8, astrocytes release more nitric oxide than unmodified C1 isomers. Conclusion: These data suggest that the deiminated isomer of MBP evokes an inflammatory response and enhances the ability of astrocytes to release proinflammatory mediators through activation of NF-kB after the breakdown of myelin sheets. Acknowledgment: This research was supported by the SRNSF Georgia RF17_534 grant.

Keywords: myelin basic protein, glutamate, deimination, astrocytes, inflammation

Procedia PDF Downloads 189
120 Representations of Wolves (Canis lupus) in Feature Films: The Detailed Analysis of the Text and Picture in the Chosen Movies

Authors: Barbara Klimek

Abstract:

Wolves are one of the most misrepresented species in literature and the media. They’re often portrayed as vicious, man-eating beasts whose main life goal is to hunt and kill people. Many movie directors use wolves as their main characters in different types of films, especially horror, thriller and science fiction movies to create gore and fear. This, in turn, results in people being afraid of wolves and wanting to destroy them. Such cultural creations caused wolves being stalked, abused and killed by people and in many areas they were completely destroyed. This paper analyzes the representations of wolves in the chosen films in the four main portrayed aspects: 1. the overall picture – true versus false, positive versus negative, based on stereotypes or realistic, displaying wolf behavior typical of the species or fake 2. subjectivity – how humans treat and talk about the animals – as subjects or as objects 3. animal welfare – how humans treat wolves and nature, are the human – animal relations positive and appropriate or negative and abusive 4. empathy – are human characters shown to co-feel the suffering with the wolves, do they display signs of empathy towards the animals, do the animals empathize with humans? The detailed analysis of the text and pictures presented in the chosen films concludes that wolves are especially misrepresented in the movies. Their behavior is shown as fake and negative, based on stereotypes and myths, the human – animal relations are shown mainly as negative where people fear the animals and hunt them and wolves stalk, follow, attack and kill humans. It shows that people do not understand the needs of these animals and are unable to show empathy towards them. The article will discuss the above-mentioned study results in detail and will present many examples. Animal representations in cultural creations, including film have a great impact on how people treat particular species of animals. The media shape people’s attitudes, what in turn results in people either respecting and protecting the animals or fearing, disliking and destroying the particular species.

Keywords: film, movies, representations, wolves

Procedia PDF Downloads 189
119 Transducers for Measuring Displacements of Rotating Blades in Turbomachines

Authors: Pavel Prochazka

Abstract:

The study deals with transducers for measuring vibration displacements of rotating blade tips in turbomachines. In order to prevent major accidents with extensive economic consequences, it shows an urgent need for every low-pressure steam turbine stage being equipped with modern non-contact measuring system providing information on blade loading, damage and residual lifetime under operation. The requirement of measuring vibration and static characteristics of steam turbine blades, therefore, calls for the development and operational verification of both new types of sensors and measuring principles and methods. The task is really demanding: to measure displacements of blade tips with a resolution of the order of 10 μm by speeds up to 750 m/s, humidity 100% and temperatures up to 200 °C. While in gas turbines are used primarily capacitive and optical transducers, these transducers cannot be used in steam turbines. The reason is moisture vapor, droplets of condensing water and dirt, which disable the function of sensors. Therefore, the most feasible approach was to focus on research of electromagnetic sensors featuring promising characteristics for given blade materials in a steam environment. Following types of sensors have been developed and both experimentally and theoretically studied in the Institute of Thermodynamics, Academy of Sciences of the Czech Republic: eddy-current, Hall effect, inductive and magnetoresistive. Eddy-current transducers demand a small distance of 1 to 2 mm and change properties in the harsh environment of steam turbines. Hall effect sensors have relatively low sensitivity, high values of offset, drift, and especially noise. Induction sensors do not require any supply current and have a simple construction. The magnitude of the sensors output voltage is dependent on the velocity of the measured body and concurrently on the varying magnetic induction, and they cannot be used statically. Magnetoresistive sensors are formed by magnetoresistors arranged into a Wheatstone bridge. Supplying the sensor from a current source provides better linearity. The MR sensors can be used permanently for temperatures up to 200 °C at lower values of the supply current of about 1 mA. The frequency range of 0 to 300 kHz is by an order higher comparing to the Hall effect and induction sensors. The frequency band starts at zero frequency, which is very important because the sensors can be calibrated statically. The MR sensors feature high sensitivity and low noise. The symmetry of the bridge arrangement leads to a high common mode rejection ratio and suppressing disturbances, which is important, especially in industrial applications. The MR sensors feature high sensitivity, high common mode rejection ratio, and low noise, which is important, especially in industrial applications. Magnetoresistive transducers provide a range of excellent properties indicating their priority for displacement measurements of rotating blades in turbomachines.

Keywords: turbines, blade vibration, blade tip timing, non-contact sensors, magnetoresistive sensors

Procedia PDF Downloads 104
118 Victimization in Schizophrenia: A Cross-Sectional Prospective Study

Authors: Mehmet Budak, Mehmet Fatih Ustundag

Abstract:

Objectives: In this research, we studied the extent of exposure to physical violence and committing violence in patients diagnosed with schizophrenia in comparison to a control group consisting of patients with psychiatric diseases other than psychotic and mood disorders. Method: Between August 2019 and October 2019, a total of 100 hospitalized patients diagnosed with schizophrenia (clinically in remission, Brief Psychiatric Rate Scale < 30) were sequentially studied while undergoing inpatient treatment at Erenkoy Mental Health Training and Research Hospital. From the outpatient clinic, 50 patients with psychiatric disorders other than psychotic disorders or mood disorders were consecutively included as a control group. All participants were evaluated by the sociodemographic data that also questions the history of violence, physical examination, bilateral comparative hand, and forearm anterior-posterior and lateral radiography. Results: While 59% of patients with schizophrenia and 28% of the control group stated that they were exposed to physical violence at least once in a lifetime (p < 0,001); a defensive wound or fracture was detected in 29% of patients with schizophrenia and 2% of the control group (p < 0.001). On the other hand, 61% of patients diagnosed with schizophrenia, and 32% of the control group expressed that they committed physical violence at least once in a lifetime (p: 0.001). A self-destructive wound or fracture was detected in 53% of the patients with schizophrenia and 24% of the control group (p: 0,001). In the schizophrenia group, the rate of committing physical violence is higher in those with substance use compared to those without substance use (p:0.049). Also, wounds and bone fractures (boxer’s fracture) resulting from self-injury are more common in schizophrenia patients with substance use (p:0,002). In the schizophrenia group, defensive wounds and parry fractures (which are located in the hand, forearm, and arm usually occur as a result of a trial to shield the face against an aggressive attack and are known to be the indicators of interpersonal violence) are higher in those with substance use compared to those who do not (p:0,007). Conclusion: This study shows that exposure to physical violence and the rate of violence is higher in patients with schizophrenia compared to the control group. It is observed that schizophrenia patients who are stigmatized as being aggressive are more exposed to violence. Substance use in schizophrenia patients increases both exposure to physical violence and the use of physical violence. Physical examination and anamnesis that question violence are important tools to reveal the exposure to violence in patients. Furthermore, some specific bone fractures and wounds could be used to detect victimization even after plenty of time passes.

Keywords: fracture, physical violence, schizophrenia, substance use

Procedia PDF Downloads 155
117 Biochar-induced Metals Immobilization in the Soil as Affected by Citric Acid

Authors: Md. Shoffikul Islam, Hongqing Hu

Abstract:

Reducing trace elements' mobility and bioavailability through amendment addition, especially biochar (BC), is a cost-effective and efficient method to address their toxicity in the soil environment. However, the low molecular weight organic acids (LMWOAs) in the rhizosphere could affect BC's efficiency to stabilize trace metals as the LMWOAs could either mobilize or fix metals in the soils. Therefore, understanding the BC's and LMWOAs' interaction mechanisms on metals stabilization in the rhizosphere is crucial. The present study explored the impact of BC derived from rice husk and citric acid (CA) and the combination of BC and CA on the redistribution of cadmium (Cd), lead (Pb), and zinc (Zn) among their geochemical forms through incubation experiment. The changes of zeta potential and X-ray diffraction (XRD) pattern of BC and BC-amended soils to investigate the probable mechanisms of trace elements' immobilization by BC under the CA attack were also examined. The rice husk BC at 5% (w/w) was mixed with the air-dry soil (an Anthrosols) contaminated with Cd, Pb, and Zn in the plastic pot. The 2, 5, 10, and 20 mM kg-1 (w/v) of CA were added separately into the pot. All the ingredients were mixed thoroughly with the soil. A control (CK) treatment was also prepared without BC and CA addition. After 7, 15, and 60 days of incubation with 60% (w/v) moisture level at 25 °C, the incubated soils were determined for pH and EC and were sequentially extracted to assess the metals' transformation in soil. The electronegative charges and XRD peaks of BC and BC-amended soils were also measured. Compared to CK, the application of BC, low level of CA (2 mM kg-1 soil) (CA2), and BC plus the low concentration of CA (BC-CA2) considerably declined the acid-soluble Cd, Pb, and Zn in which BC-CA2 was found to be the most effective treatment. The reversed trends were observed concerning the high levels of CA (>5-20 mM kg-1 soil) and the BC plus high concentrations of CA treatments. BC-CA2 changed the highest amounts of acid-soluble and reducible metals to the oxidizable and residual forms with time. The most increased electronegative charges of BC-CA2 indicate its (BC-CA2) highest Cd, Pb, and Zn immobilizing efficiency, probably through metals adsorption and fixation with the negative charge sites. The XRD study revealed the presence of P, O, CO32-, and Cl1- in BC, which might be responsible for the precipitation of CdCO3, pyromorphite, and hopeite in the case of Cd, Pb, and Zn immobilization, respectively. The findings depicted that the low concentration of CA increased metals' stabilization, whereas the high levels of CA enhanced their mobilization. The BC-CA2 emerged as the best amendment among treatments for metals stabilization in contaminated soils.

Keywords: Biochar, citric acid, immobilization, trace elements contaminated soil

Procedia PDF Downloads 62