Search results for: implementation methodology
1377 Coastal Water Characteristics along the Saudi Arabian Coastline
Authors: Yasser O. Abualnaja1, Alexandra Pavlidou2, Taha Boksmati3, Ahmad Alharbi3, Hammad Alsulmi3, Saleh Omar Maghrabi3, Hassan Mowalad3, Rayan Mutwalli3, James H. Churchill4, Afroditi Androni2, Dionysios Ballas2, Ioannis Hatzianestis2, Harilaos Kontoyiannis2, Angeliki Konstantinopoulou2, Georgios Krokkos1, 5, Georgios Pappas2, Vassilis P. Papadopoulos2, Konstantinos Parinos2, Elvira Plakidi2, Eleni Rousselaki2, Dimitris Velaoras2, Panagiota Zachioti2, Theodore Zoulias2, Ibrahim Hoteit5.
Abstract:
The coastal areas along the Kingdom of Saudi Arabia on both the Red Sea and Arabian Gulf have been witnessing in the past decades an unprecedented economic growth and a rapid increase in anthropogenic activities. Therefore, the Saudi Arabian government has decided to frame a strategy for sustainable development of the coastal and marine environments, which comes in the context of the Vision 2030, aimed at providing the first comprehensive ‘Status Quo Assessment’ of the Kingdom’s coastal and marine environments. This strategy will serve as a baseline assessment for future monitoring activities; this baseline is relied on scientific evidence of the drivers, pressures, and their impact on the environments of the Red Sea and Arabian Gulf. A key element of the assessment was the cumulative pressures of the hotspots analysis, which was developed following the principles of the Driver-Pressure-State-Impact-Response (DPSIR) framework and using the cumulative pressure and impact assessment methodology. Ten hotspot sites were identified, eight in the Red Sea and two in the Arabian Gulf. Thus, multidisciplinary research cruises were conducted throughout the Red Sea and the Arabian Gulf coastal and marine environments in June/July 2021 and September 2021, respectively, in order to understand the relative impact of hydrography and the various pressures on the quality of seawater and sediments. The main objective was to record the physical and biogeochemical parameters along the coastal waters of the Kingdom, tracing the dispersion of contaminants related to specific pressures. The assessment revealed the effect of hydrography on the trophic status of the southern marine coastal areas of the Red Sea. Jeddah Lagoon system seems to face significant eutrophication and pollution challenges, whereas sediments are enriched in some heavy metals in many areas of the Red Sea and the Arabian Gulf. This multidisciplinary research in the Red Sea and the Arabian Gulf coastal waters will pave the way for future detailed environmental monitoring strategies for the Saudi Arabian marine environment.Keywords: arabian gulf, contaminants, hotspot, red sea
Procedia PDF Downloads 1101376 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks
Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba
Abstract:
The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.Keywords: authentication, long term evolution, security, vehicle-to-everything
Procedia PDF Downloads 1671375 Double Wishbone Pushrod Suspension Systems Co-Simulation for Racing Applications
Authors: Suleyman Ogul Ertugrul, Mustafa Turgut, Serkan Inandı, Mustafa Gorkem Coban, Mustafa Kıgılı, Ali Mert, Oguzhan Kesmez, Murat Ozancı, Caglar Uyulan
Abstract:
In high-performance automotive engineering, the realistic simulation of suspension systems is crucial for enhancing vehicle dynamics and handling. This study focuses on the double wishbone suspension system, prevalent in racing vehicles due to its superior control and stability characteristics. Utilizing MATLAB and Adams Car simulation software, we conduct a comprehensive analysis of displacement behaviors and damper sizing under various dynamic conditions. The initial phase involves using MATLAB to simulate the entire suspension system, allowing for the preliminary determination of damper size based on the system's response under simulated conditions. Following this, manual calculations of wheel loads are performed to assess the forces acting on the front and rear suspensions during scenarios such as braking, cornering, maximum vertical loads, and acceleration. Further dynamic force analysis is carried out using MATLAB Simulink, focusing on the interactions between suspension components during key movements such as bumps and rebounds. This simulation helps in formulating precise force equations and in calculating the stiffness of the suspension springs. To enhance the accuracy of our findings, we focus on a detailed kinematic and dynamic analysis. This includes the creation of kinematic loops, derivation of relevant equations, and computation of Jacobian matrices to accurately determine damper travel and compression metrics. The calculated spring stiffness is crucial in selecting appropriate springs to ensure optimal suspension performance. To validate and refine our results, we replicate the analyses using the Adams Car software, renowned for its detailed handling of vehicular dynamics. The goal is to achieve a robust, reliable suspension setup that maximizes performance under the extreme conditions encountered in racing scenarios. This study exemplifies the integration of theoretical mechanics with advanced simulation tools to achieve a high-performance suspension setup that can significantly improve race car performance, providing a methodology that can be adapted for different types of racing vehicles.Keywords: FSAE, suspension system, Adams Car, kinematic
Procedia PDF Downloads 491374 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems
Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia
Abstract:
The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.Keywords: cloud computing, data management, multi-tenancy, requirements, security
Procedia PDF Downloads 1561373 The Diverse Experiences of Men Living with Disabilities Participating in Violence Prevention Interventions in Africa and Asia: Men as Victims; Men as Perpetrators
Authors: Ingrid van der Heijden, Kristen Dunkle, Rachel Jewkes
Abstract:
Background: Emerging literature on prevalence shows that men with disabilities are four more times likely than men without disabilities to experience sexual violence during their lifetime. However, compared to women with disabilities, men with disabilities still have lesser experiences of violence. While empirical evidence on the prevalence of victimization of men with disabilities is emerging, there is scarcer evidence highlighting disabled men’s perpetration of different forms of violence, particularly intimate partner violence. We can assume that men are likely to be both perpetrators and victims of violence, making more complex the causes and risks of violence. Gender norms and disability stigma play important roles in men’s experiences of violence. Men may be stigmatized because of their inability to attain hegemonic masculine ideals of strength, control over women and sexual conquest, which makes them more susceptible to emotional, physical and sexual abuse. Little to no evidence exists of men with disabilities’ experiences of perpetration of intimate partner violence, family violence or community violence. So far studies on male victimization do not succeed to offer contextual evidence that would highlight why and how men with disabilities perpetrate and/or are victims of sexual or other forms of violence. Objective: The overall aim to highlight men with disabilities’ experiences of both victimization and perpetration, and how living up to normative and hegemonic ideals of masculinity and ‘ability’ shape their experiences. It will include: identifying how gender and impairments intersect and shape their experiences of violence; identifying the contexts of and risks for violence; identifying the impacts and consequences of violence on their lives (including mental health impacts), and identifying obstacles and enablers to support and interventions to prevent violence. Methodology: In-depth qualitative interviews with 20 men with disabilities participating in interventions conducted by the What Works Global Programme for violence prevention (DIFD) in Africa and Asia. Men with a range of disabilities will be invited to share their lifetime experiences of violence. Implications for Practice: The data from this study will be used to start thinking about strategies to include men with disabilities in violence prevention strategies for both men and women. Limitations: Because men will be participating in interventions, it is assumed that they will not have severe impairments that hamper their cognitive or physical ability to participate in the intervention activities - and therefore will be able to participate in the in-depth interviews. Of course, this is a limitation of the study as it does not include those men with severe disabilities – measured by the World Health Organization’s International Classification of Functioning - who may be more vulnerable and at higher risk of experiencing violence, and who are less likely to be able to access services and interventions.Keywords: gender, men with disabilities, perpetration of violence, victimization
Procedia PDF Downloads 3221372 Chemical, Physical and Microbiological Characteristics of a Texture-Modified Beef- Based 3D Printed Functional Product
Authors: Elvan G. Bulut, Betul Goksun, Tugba G. Gun, Ozge Sakiyan Demirkol, Kamuran Ayhan, Kezban Candogan
Abstract:
Dysphagia, difficulty in swallowing solid foods and thin liquids, is one of the common health threats among the elderly who require foods with modified texture in their diet. Although there are some commercial food formulations or hydrocolloids to thicken the liquid foods for dysphagic individuals, there is still a need for developing and offering new food products with enriched nutritional, textural and sensory characteristics to safely nourish these patients. 3D food printing is an appealing alternative in creating personalized foods for this purpose with attractive shape, soft and homogenous texture. In order to modify texture and prevent phase separation, hydrocolloids are generally used. In our laboratory, an optimized 3D printed beef-based formulation specifically for people with swallowing difficulties was developed based on the research project supported by the Scientific and Technological Research Council of Turkey (TÜBİTAK Project # 218O017). The optimized formulation obtained from response surface methodology was 60% beef powder, 5.88% gelatin, and 0.74% kappa-carrageenan (all in a dry basis). This product was enriched with powders of freeze-dried beet, celery, and red capia pepper, butter, and whole milk. Proximate composition (moisture, fat, protein, and ash contents), pH value, CIE lightness (L*), redness (a*) and yellowness (b*), and color difference (ΔE*) values were determined. Counts of total mesophilic aerobic bacteria (TMAB), lactic acid bacteria (LAB), mold and yeast, total coliforms were conducted, and detection of coagulase positive S. aureus, E. coli, and Salmonella spp. were performed. The 3D printed products had 60.11% moisture, 16.51% fat, 13.68% protein, and 1.65% ash, and the pH value was 6.19, whereas the ΔE* value was 3.04. Counts of TMAB, LAB, mold and yeast and total coliforms before and after 3D printing were 5.23-5.41 log cfu/g, < 1 log cfu/g, < 1 log cfu/g, 2.39-2.15 log EMS/g, respectively. Coagulase positive S. aureus, E. coli, and Salmonella spp. were not detected in the products. The data obtained from this study based on determining some important product characteristics of functional beef-based formulation provides an encouraging basis for future research on the subject and should be useful in designing mass production of 3D printed products of similar composition.Keywords: beef, dysphagia, product characteristics, texture-modified foods, 3D food printing
Procedia PDF Downloads 1101371 Whey Protein: A Noval Protective Agent against Oto-Toxicity Induced by Cis-Platin in Male Rat
Authors: Eitedal Daoud, Reda M.Daoud, Khaled Abdel-Wahhab, Maha M.Saber, Lobna Saber
Abstract:
Background: Cis-platin is a widely used chemotherapeutic drug to treat many malignant disorders including head and neck malignancies. Oto-nephrotxicity is an important and dose - limiting side effect of cis - platin therapy. Nowadays, more attention had been paid to oto-toxicity caused with cis-platin. Aim of the Work: This study was designed to investigate the potential protective effect of Whey protein (WP) against cis-platin induced ototoxicity compared to the effect of N-acetylcysteine (NAC) in rats. Methodology: Male albino rats were randomly divided into 6 groups: untreated rats (control), rats orally treated with whey protein (1g/kg b.w/day) for seven executive days, rats treated orally with N-acetylcysteine (500 mg/kgb.w /day) for seven executive days, rates intoxicated intraperitoneal (ip) with cis- platin (10 mg/kgb.w. once), rats treated with whey protein (1g/kgb.w./day) for seven executive days) followed by one injection (ip) of cis-platin(10 mg/kg b.w.) one hour after the last oral administration of whey protein, rats treated with N- acetylcysteine (for seven executive days followed by one injection (ip) of cis-platin (10 mg/kgb.w) one hour after the last oral administration of N-acetylcysteine. The organ of Corti, the stria vascularis and spiral ganglia were visualized by light microscopy at different magnifications. Results: Cis-platin intoxicated animals showed a significant decrease in serum level of total antioxidant capacity (TAC),with inhibition in the activity of serum glutathione-s transferase(GST) and paraoxonnase-1 (PON-1) in comparison with control. Group treated with either NAC or WP with cis-platin showed significant elevation in the activity of both GST & PON-1 with increased serum level of TAC when compared with cis-platin intoxicated rats. Animals treated with NAC or WP with cis-platin compared to those treated with cis-platin alone showed marked degree of improvement towards control rats as there was significant drop in the serum level of cortecosterone, nitric oxide (NO), and melandialdehyde (MDA).Histopathologic, in NAC pretreated group there was no changes in stria vascularis or spiral ganglia. In group pretreated with WP, there was no histopathologic alteration detected in the organ of Corti and Reissers membrane but oedema and haemorrhage were founded in the stria vascularis in small focal manner. Conclusion: Our finding showed that Whey protein is a natural dietary supplement product proved its ability of protection of anti-oxidant system and the cochlea against cis-platin induced ototoxicity.Keywords: anti-oxidant, cis-platin, N-acetylcysteine, ototoxicity, whey protein
Procedia PDF Downloads 5211370 The Phenomenology in the Music of Debussy through Inspiration of Western and Oriental Culture
Authors: Yu-Shun Elisa Pong
Abstract:
Music aesthetics related to phenomenology is rarely discussed and still in the ascendant while multi-dimensional discourses of philosophy were emerged to be an important trend in the 20th century. In the present study, a basic theory of phenomenology from Edmund Husserl (1859-1938) is revealed and discussed followed by the introduction of intentionality concepts, eidetic reduction, horizon, world, and inter-subjectivity issues. Further, phenomenology of music and general art was brought to attention by the introduction of Roman Ingarden’s The Work of Music and the Problems of its Identity (1933) and Mikel Dufrenne’s The Phenomenology of Aesthetic Experience (1953). Finally, Debussy’s music will be analyzed and discussed from the perspective of phenomenology. Phenomenology is not so much a methodology or analytics rather than a common belief. That is, as much as possible to describe in detail the different human experience, relative to the object of purpose. Such idea has been practiced in various guises for centuries, only till the early 20th century Phenomenology was better refined through the works of Husserl, Heidegger, Sartre, Merleau-Ponty and others. Debussy was born in an age when the Western society began to accept the multi-cultural baptism. With his unusual sensitivity to the oriental culture, Debussy has presented considerable inspiration, absorption, and echo in his music works. In fact, his relationship with nature is far from echoing the idea of Chinese ancient literati and nature. Although he is not the first composer to associate music with human and nature, the unique quality and impact of his works enable him to become a significant figure in music aesthetics. Debussy’s music tried to develop a quality analogous of nature, and more importantly, based on vivid life experience and artistic transformation to achieve the realm of pure art. Such idea that life experience comes before artwork, either clear or vague, simple or complex, was later presented abstractly in his late works is still an interesting subject worth further discussion. Debussy’s music has existed for more than or close to a century. It has received musicology researcher’s attention as much as other important works in the history of Western music. Among the pluralistic discussion about Debussy’s art and ideas, phenomenological aesthetics has enlightened new ideas and view angles to relook his great works and even gave some previous arguments legitimacy. Overall, this article provides a new insight of Debussy’s music from phenomenological exploration and it is believed phenomenology would be an important pathway in the research of the music aesthetics.Keywords: Debussy's music, music esthetics, oriental culture, phenomenology
Procedia PDF Downloads 2741369 The Correlation between Emotional Intelligence and Locus of Control: Empirical Study on Lithuanian Youth
Authors: Dalia Antiniene, Rosita Lekaviciene
Abstract:
The qualitative methodology based study is designed to reveal a connection between emotional intelligence (EI) and locus of control (LC) within the population of Lithuanian youth. In the context of emotional problems, the locus of control reflects how one estimates the causes of his/her emotions: internals (internal locus of control) associate their emotions with their manner of thinking, whereas externals (external locus of control) consider emotions to be evoked by external circumstances. On the other hand, there is little empirical data about this connection, and the results in disposition are often contradictory. In the conducted study 1430 young people, aged 17 to 27, from various regions of Lithuania were surveyed. The subjects were selected by quota sampling, maintaining natural proportions of the general Lithuanian youth population. To assess emotional intelligence the EI-DARL test (i.e. self-report questionnaire consisting of 75 items) was implemented. The emotional intelligence test, created applying exploratory factor analysis, reveals four main dimensions of EI: understanding of one’s own emotions, regulation of one’s own emotions, understanding other’s emotions, and regulation of other’s emotions (subscale reliability coefficients fluctuate between 0,84 and 0,91). An original 16-item internality/externality scale was used to examine the locus of control (internal consistency of the Externality subscale - 0,75; Internality subscale - 0,65). The study has determined that the youth understands and regulates other people’s emotions better than their own. Using the K-mean cluster analysis method, it was established that there are three groups of subjects according to their EI level – people with low, medium and high EI. After comparing means of subjects’ favorability of statements on the Internality/Externality scale, a predominance of internal locus of control in the young population was established. The multiple regression models has shown that a rather strong statistically significant correlation exists between total EI, EI subscales and LC. People who tend to attribute responsibility for the outcome of their actions to their own abilities and efforts have higher EI and, conversely, the tendency to attribute responsibility to external forces is related more with lower EI. While pursuing their goals, young people with high internality have a predisposition to analyze perceived emotions and, therefore, gain emotional experience: they learn to control their natural reactions and to act adequately in a situation at hand. Thus the study unfolds, that a person’s locus of control and emotional intelligence are related phenomena and allows us to draw a conclusion, that a person’s internality/externality is a reliable predictor of total EI and its components.Keywords: emotional intelligence, externality, internality, locus of control
Procedia PDF Downloads 2211368 Automated Transformation of 3D Point Cloud to BIM Model: Leveraging Algorithmic Modeling for Efficient Reconstruction
Authors: Radul Shishkov, Orlin Davchev
Abstract:
The digital era has revolutionized architectural practices, with building information modeling (BIM) emerging as a pivotal tool for architects, engineers, and construction professionals. However, the transition from traditional methods to BIM-centric approaches poses significant challenges, particularly in the context of existing structures. This research introduces a technical approach to bridge this gap through the development of algorithms that facilitate the automated transformation of 3D point cloud data into detailed BIM models. The core of this research lies in the application of algorithmic modeling and computational design methods to interpret and reconstruct point cloud data -a collection of data points in space, typically produced by 3D scanners- into comprehensive BIM models. This process involves complex stages of data cleaning, feature extraction, and geometric reconstruction, which are traditionally time-consuming and prone to human error. By automating these stages, our approach significantly enhances the efficiency and accuracy of creating BIM models for existing buildings. The proposed algorithms are designed to identify key architectural elements within point clouds, such as walls, windows, doors, and other structural components, and to translate these elements into their corresponding BIM representations. This includes the integration of parametric modeling techniques to ensure that the generated BIM models are not only geometrically accurate but also embedded with essential architectural and structural information. Our methodology has been tested on several real-world case studies, demonstrating its capability to handle diverse architectural styles and complexities. The results showcase a substantial reduction in time and resources required for BIM model generation while maintaining high levels of accuracy and detail. This research contributes significantly to the field of architectural technology by providing a scalable and efficient solution for the integration of existing structures into the BIM framework. It paves the way for more seamless and integrated workflows in renovation and heritage conservation projects, where the accuracy of existing conditions plays a critical role. The implications of this study extend beyond architectural practices, offering potential benefits in urban planning, facility management, and historic preservation.Keywords: BIM, 3D point cloud, algorithmic modeling, computational design, architectural reconstruction
Procedia PDF Downloads 611367 Assessment of Bisphenol A and 17 α-Ethinyl Estradiol Bioavailability in Soils Treated with Biosolids
Authors: I. Ahumada, L. Ascar, C. Pedraza, J. Montecino
Abstract:
It has been found that the addition of biosolids to soil is beneficial to soil health, enriching soil with essential nutrient elements. Although this sludge has properties that allow for the improvement of the physical features and productivity of agricultural and forest soils and the recovery of degraded soils, they also contain trace elements, organic trace and pathogens that can cause damage to the environment. The application of these biosolids to land without the total reclamation and the treated wastewater can transfer these compounds into terrestrial and aquatic environments, giving rise to potential accumulation in plants. The general aim of this study was to evaluate the bioavailability of bisphenol A (BPA), and 17 α-ethynyl estradiol (EE2) in a soil-biosolid system using wheat (Triticum aestivum) plant assays and a predictive extraction method using a solution of hydroxypropyl-β-cyclodextrin (HPCD) to determine if it is a reliable surrogate for this bioassay. Two soils were obtained from the central region of Chile (Lo Prado and Chicauma). Biosolids were obtained from a regional wastewater treatment plant. The soils were amended with biosolids at 90 Mg ha-1. Soils treated with biosolids, spiked with 10 mgkg-1 of the EE2 and 15 mgkg-1 and 30 mgkg-1of BPA were also included. The BPA, and EE2 concentration were determined in biosolids, soils and plant samples through ultrasound assisted extraction, solid phase extraction (SPE) and gas chromatography coupled to mass spectrometry determination (GC/MS). The bioavailable fraction found of each one of soils cultivated with wheat plants was compared with results obtained through a cyclodextrin biosimulator method. The total concentration found in biosolid from a treatment plant was 0.150 ± 0.064 mgkg-1 and 12.8±2.9 mgkg-1 of EE2 and BPA respectively. BPA and EE2 bioavailability is affected by the organic matter content and the physical and chemical properties of the soil. The bioavailability response of both compounds in the two soils varied with the EE2 and BPA concentration. It was observed in the case of EE2, the bioavailability in wheat plant crops contained higher concentrations in the roots than in the shoots. The concentration of EE2 increased with increasing biosolids rate. On the other hand, for BPA, a higher concentration was found in the shoot than the roots of the plants. The predictive capability the HPCD extraction was assessed using a simple linear correlation test, for both compounds in wheat plants. The correlation coefficients for the EE2 obtained from the HPCD extraction with those obtained from the wheat plants were r= 0.99 and p-value ≤ 0.05. On the other hand, in the case of BPA a correlation was not found. Therefore, the methodology was validated with respect to wheat plants bioassays, only in the EE2 case. Acknowledgments: The authors thank FONDECYT 1150502.Keywords: emerging compounds, bioavailability, biosolids, endocrine disruptors
Procedia PDF Downloads 1441366 Evaluation of Sequential Polymer Flooding in Multi-Layered Heterogeneous Reservoir
Authors: Panupong Lohrattanarungrot, Falan Srisuriyachai
Abstract:
Polymer flooding is a well-known technique used for controlling mobility ratio in heterogeneous reservoirs, leading to improvement of sweep efficiency as well as wellbore profile. However, low injectivity of viscous polymer solution attenuates oil recovery rate and consecutively adds extra operating cost. An attempt of this study is to improve injectivity of polymer solution while maintaining recovery factor, enhancing effectiveness of polymer flooding method. This study is performed by using reservoir simulation program to modify conventional single polymer slug into sequential polymer flooding, emphasizing on increasing of injectivity and also reduction of polymer amount. Selection of operating conditions for single slug polymer including pre-injected water, polymer concentration and polymer slug size is firstly performed for a layered-heterogeneous reservoir with Lorenz coefficient (Lk) of 0.32. A selected single slug polymer flooding scheme is modified into sequential polymer flooding with reduction of polymer concentration in two different modes: Constant polymer mass and reduction of polymer mass. Effects of Residual Resistance Factor (RRF) is also evaluated. From simulation results, it is observed that first polymer slug with the highest concentration has the main function to buffer between displacing phase and reservoir oil. Moreover, part of polymer from this slug is also sacrificed for adsorption. Reduction of polymer concentration in the following slug prevents bypassing due to unfavorable mobility ratio. At the same time, following slugs with lower viscosity can be injected easily through formation, improving injectivity of the whole process. A sequential polymer flooding with reduction of polymer mass shows great benefit by reducing total production time and amount of polymer consumed up to 10% without any downside effect. The only advantage of using constant polymer mass is slightly increment of recovery factor (up to 1.4%) while total production time is almost the same. Increasing of residual resistance factor of polymer solution yields a benefit on mobility control by reducing effective permeability to water. Nevertheless, higher adsorption results in low injectivity, extending total production time. Modifying single polymer slug into sequence of reduced polymer concentration yields major benefits on reducing production time as well as polymer mass. With certain design of polymer flooding scheme, recovery factor can even be further increased. This study shows that application of sequential polymer flooding can be certainly applied to reservoir with high value of heterogeneity since it requires nothing complex for real implementation but just a proper design of polymer slug size and concentration.Keywords: polymer flooding, sequential, heterogeneous reservoir, residual resistance factor
Procedia PDF Downloads 4741365 R Statistical Software Applied in Reliability Analysis: Case Study of Diesel Generator Fans
Authors: Jelena Vucicevic
Abstract:
Reliability analysis represents a very important task in different areas of work. In any industry, this is crucial for maintenance, efficiency, safety and monetary costs. There are ways to calculate reliability, unreliability, failure density and failure rate. This paper will try to introduce another way of calculating reliability by using R statistical software. R is a free software environment for statistical computing and graphics. It compiles and runs on a wide variety of UNIX platforms, Windows and MacOS. The R programming environment is a widely used open source system for statistical analysis and statistical programming. It includes thousands of functions for the implementation of both standard and new statistical methods. R does not limit user only to operation related only to these functions. This program has many benefits over other similar programs: it is free and, as an open source, constantly updated; it has built-in help system; the R language is easy to extend with user-written functions. The significance of the work is calculation of time to failure or reliability in a new way, using statistic. Another advantage of this calculation is that there is no need for technical details and it can be implemented in any part for which we need to know time to fail in order to have appropriate maintenance, but also to maximize usage and minimize costs. In this case, calculations have been made on diesel generator fans but the same principle can be applied to any other part. The data for this paper came from a field engineering study of the time to failure of diesel generator fans. The ultimate goal was to decide whether or not to replace the working fans with a higher quality fan to prevent future failures. Seventy generators were studied. For each one, the number of hours of running time from its first being put into service until fan failure or until the end of the study (whichever came first) was recorded. Dataset consists of two variables: hours and status. Hours show the time of each fan working and status shows the event: 1- failed, 0- censored data. Censored data represent cases when we cannot track the specific case, so it could fail or success. Gaining the result by using R was easy and quick. The program will take into consideration censored data and include this into the results. This is not so easy in hand calculation. For the purpose of the paper results from R program have been compared to hand calculations in two different cases: censored data taken as a failure and censored data taken as a success. In all three cases, results are significantly different. If user decides to use the R for further calculations, it will give more precise results with work on censored data than the hand calculation.Keywords: censored data, R statistical software, reliability analysis, time to failure
Procedia PDF Downloads 4001364 Building up Regional Innovation Systems (RIS) for Development: The Case Study of the State of Mexico, México
Authors: Jose Luis Solleiro, Rosario Castanon, Laura Elena Martinez
Abstract:
The State of Mexico is an administrative entity of Mexico, and it is one of the most important territories due to its great economic and social impact for the whole country, especially since it contributes with more than eight of the national Gross Domestic Product (GDP). The State of Mexico has a population of over seventeen million people and host very important business and productive industries such as Automotive, Chemicals, Pharmaceutical, and Agri-food. In 2017, the State Development Plan (Plan Estatal de Desarrollo in Spanish) which is a policy document that rules State's economic actions and integrates the bases for sectoral and regional programs to achieve regional development), raised innovation as a key aspect to boost competitiveness and productivity of the State of Mexico. Therefore, in line with this proposal, in 2018 the Mexican Council for Science and Technology (COMECYT for its acronym in Spanish), an institution in charge of promoting public science and technology policies in the State of Mexico, took actions towards building up the State´s Innovation System. Hence, the main objective of this paper is to review and analyze the process to create RIS in the State of Mexico. We focus on the key elements of the process, the diverse actors that were involved in it, the activities that were carried out and the identification of the challenges, findings, successes, and failures of the intended exercise. The methodology used to analyze the structure of the Innovation System of the State of Mexico is based on two elements: the case study and the research-action approach. The main objective of the paper, the case study was based on semi-structured interviews with key actors who have participated in the process of launching the RIS of the State of Mexico. Additionally, we analyzed the information reports and other documents that were elaborated during the process of shaping the State's innovation system. Finally, the results obtained in the process were also examined. The relevance of this investigation fundamentally rests in two elements: 1) keeping documental record of the process of building a RIS in Mexico; and 2) carrying out the analysis of this case study recognizing the importance of knowledge extraction and dissemination, so that lessons on this matter may be useful for similar experiences in the future. We conclude that in Mexico, documentation and analysis efforts related to the formation of RIS and interaction processes between innovation ecosystem actors are scarce, so documents like are of great importance, especially since it generates a series of findings and recommendations for the building of RIS.Keywords: regional innovation systems, innovation, development, competitiveness
Procedia PDF Downloads 1161363 Index t-SNE: Tracking Dynamics of High-Dimensional Datasets with Coherent Embeddings
Authors: Gaelle Candel, David Naccache
Abstract:
t-SNE is an embedding method that the data science community has widely used. It helps two main tasks: to display results by coloring items according to the item class or feature value; and for forensic, giving a first overview of the dataset distribution. Two interesting characteristics of t-SNE are the structure preservation property and the answer to the crowding problem, where all neighbors in high dimensional space cannot be represented correctly in low dimensional space. t-SNE preserves the local neighborhood, and similar items are nicely spaced by adjusting to the local density. These two characteristics produce a meaningful representation, where the cluster area is proportional to its size in number, and relationships between clusters are materialized by closeness on the embedding. This algorithm is non-parametric. The transformation from a high to low dimensional space is described but not learned. Two initializations of the algorithm would lead to two different embeddings. In a forensic approach, analysts would like to compare two or more datasets using their embedding. A naive approach would be to embed all datasets together. However, this process is costly as the complexity of t-SNE is quadratic and would be infeasible for too many datasets. Another approach would be to learn a parametric model over an embedding built with a subset of data. While this approach is highly scalable, points could be mapped at the same exact position, making them indistinguishable. This type of model would be unable to adapt to new outliers nor concept drift. This paper presents a methodology to reuse an embedding to create a new one, where cluster positions are preserved. The optimization process minimizes two costs, one relative to the embedding shape and the second relative to the support embedding’ match. The embedding with the support process can be repeated more than once, with the newly obtained embedding. The successive embedding can be used to study the impact of one variable over the dataset distribution or monitor changes over time. This method has the same complexity as t-SNE per embedding, and memory requirements are only doubled. For a dataset of n elements sorted and split into k subsets, the total embedding complexity would be reduced from O(n²) to O(n²=k), and the memory requirement from n² to 2(n=k)², which enables computation on recent laptops. The method showed promising results on a real-world dataset, allowing to observe the birth, evolution, and death of clusters. The proposed approach facilitates identifying significant trends and changes, which empowers the monitoring high dimensional datasets’ dynamics.Keywords: concept drift, data visualization, dimension reduction, embedding, monitoring, reusability, t-SNE, unsupervised learning
Procedia PDF Downloads 1411362 Bidirectional Pendulum Vibration Absorbers with Homogeneous Variable Tangential Friction: Modelling and Design
Authors: Emiliano Matta
Abstract:
Passive resonant vibration absorbers are among the most widely used dynamic control systems in civil engineering. They typically consist in a single-degree-of-freedom mechanical appendage of the main structure, tuned to one structural target mode through frequency and damping optimization. One classical scheme is the pendulum absorber, whose mass is constrained to move along a curved trajectory and is damped by viscous dashpots. Even though the principle is well known, the search for improved arrangements is still under way. In recent years this investigation inspired a type of bidirectional pendulum absorber (BPA), consisting of a mass constrained to move along an optimal three-dimensional (3D) concave surface. For such a BPA, the surface principal curvatures are designed to ensure a bidirectional tuning of the absorber to both principal modes of the main structure, while damping is produced either by horizontal viscous dashpots or by vertical friction dashpots, connecting the BPA to the main structure. In this paper, a variant of BPA is proposed, where damping originates from the variable tangential friction force which develops between the pendulum mass and the 3D surface as a result of a spatially-varying friction coefficient pattern. Namely, a friction coefficient is proposed that varies along the pendulum surface in proportion to the modulus of the 3D surface gradient. With such an assumption, the dissipative model of the absorber can be proven to be nonlinear homogeneous in the small displacement domain. The resulting homogeneous BPA (HBPA) has a fundamental advantage over conventional friction-type absorbers, because its equivalent damping ratio results independent on the amplitude of oscillations, and therefore its optimal performance does not depend on the excitation level. On the other hand, the HBPA is more compact than viscously damped BPAs because it does not need the installation of dampers. This paper presents the analytical model of the HBPA and an optimal methodology for its design. Numerical simulations of single- and multi-story building structures under wind and earthquake loads are presented to compare the HBPA with classical viscously damped BPAs. It is shown that the HBPA is a promising alternative to existing BPA types and that homogeneous tangential friction is an effective means to realize systems provided with amplitude-independent damping.Keywords: amplitude-independent damping, homogeneous friction, pendulum nonlinear dynamics, structural control, vibration resonant absorbers
Procedia PDF Downloads 1461361 Data-Driven Strategies for Enhancing Food Security in Vulnerable Regions: A Multi-Dimensional Analysis of Crop Yield Predictions, Supply Chain Optimization, and Food Distribution Networks
Authors: Sulemana Ibrahim
Abstract:
Food security remains a paramount global challenge, with vulnerable regions grappling with issues of hunger and malnutrition. This study embarks on a comprehensive exploration of data-driven strategies aimed at ameliorating food security in such regions. Our research employs a multifaceted approach, integrating data analytics to predict crop yields, optimizing supply chains, and enhancing food distribution networks. The study unfolds as a multi-dimensional analysis, commencing with the development of robust machine learning models harnessing remote sensing data, historical crop yield records, and meteorological data to foresee crop yields. These predictive models, underpinned by convolutional and recurrent neural networks, furnish critical insights into anticipated harvests, empowering proactive measures to confront food insecurity. Subsequently, the research scrutinizes supply chain optimization to address food security challenges, capitalizing on linear programming and network optimization techniques. These strategies intend to mitigate loss and wastage while streamlining the distribution of agricultural produce from field to fork. In conjunction, the study investigates food distribution networks with a particular focus on network efficiency, accessibility, and equitable food resource allocation. Network analysis tools, complemented by data-driven simulation methodologies, unveil opportunities for augmenting the efficacy of these critical lifelines. This study also considers the ethical implications and privacy concerns associated with the extensive use of data in the realm of food security. The proposed methodology outlines guidelines for responsible data acquisition, storage, and usage. The ultimate aspiration of this research is to forge a nexus between data science and food security policy, bestowing actionable insights to mitigate the ordeal of food insecurity. The holistic approach converging data-driven crop yield forecasts, optimized supply chains, and improved distribution networks aspire to revitalize food security in the most vulnerable regions, elevating the quality of life for millions worldwide.Keywords: data-driven strategies, crop yield prediction, supply chain optimization, food distribution networks
Procedia PDF Downloads 621360 Demographic and Socio-Economic Study of the Elderly Population in Kolkata, India
Authors: Ambika Roy Bardhan
Abstract:
Kolkata, the City of Joy, is a greying metropolis not only in respect of its concrete jungle but also because of the largest population of 60-plus residents that it shelters among all other cities in India. Declining birth and death rates and a negative growth of population indicate that the city has reached the last stage of demographic transition. Thus, the obvious consequence has been the ageing of its population. With this background, the present paper attempts to study the demographic and socio-economic status of the elderly population in Kolkata. Analysis and findings have been based on secondary data obtained from Census of India of various years, Sample Registration System Reports and reports by HelpAge India. Findings show that the elderly population is increasing continuously. With respect to gender, the male elderly outnumbers the female elderly population. The percentage of households having one elderly member is more in the city due to the emergence of the nuclear families and erosion of joint family system. With respect to socio-economic status, those elderly who are the heads of the family are lower in percentages than those in the other age groups. Also, male elderly as head of the family are greater in percentage than female elderly. Elderly in the category of currently married records the highest percentage followed by widowed, never married and lastly, separated or divorced. Male elderly outnumber the female elderly as currently married, while female elderly outnumbers the male elderly in the category of widowed. In terms of living status, the percentage of elderly who are living alone is highest in Kolkata and the reason for staying alone as no support from children also happens to be highest in this city. The literacy rate and higher level of education is higher among the male than female elderly. Higher percentages of female elderly have been found to be with disability. Disability in movement and multiple disabilities have been found to be more common among the elderly population in Kolkata. Percentages of male literate pensioners are highest than other categories. Also, in terms of levels of education male elderly who are graduate and above other than technical degree are the highest receivers of pension. Also, in terms of working status, elderly as non-workers are higher in percentages with the population of elderly females outnumbering the males. The old age dependency ratio in the city is increasing continuously and the ratio is higher among females than male. Thus, it can be stated that Kolkata is witnessing continuous and rapid ageing of its population. Increasing dependency ratio is likely to create pressure on the working population, available civic, social and health amenities. This requires intervention in the form of planning, formulation and implementation of laws, policies, programs and measures to safeguard and improve the conditions of the elderly in Kolkata.Keywords: demographic, elderly, population, socio-economic
Procedia PDF Downloads 1351359 Impact of Pandemics on Cities and Societies
Authors: Deepak Jugran
Abstract:
Purpose: The purpose of this study is to identify how past Pandemics shaped social evolution and cities. Methodology: A historical and comparative analysis of major historical pandemics in human history their origin, transmission route, biological response and the aftereffects. A Comprehensive pre & post pandemic scenario and focuses selectively on major issues and pandemics that have deepest & lasting impact on society with available secondary data. Results: Past pandemics shaped the behavior of human societies and their cities and made them more resilient biologically, intellectually & socially endorsing the theory of “Survival of the fittest” by Sir Charles Darwin. Pandemics & Infectious diseases are here to stay and as a human society, we need to strengthen our collective response & preparedness besides evolving mechanisms for strict controls on inter-continental movements of people, & especially animals who become carriers for these viruses. Conclusion: Pandemics always resulted in great mortality, but they also improved the overall individual human immunology & collective social response; at the same time, they also improved the public health system of cities, health delivery systems, water, sewage distribution system, institutionalized various welfare reforms and overall collective social response by the societies. It made human beings more resilient biologically, intellectually, and socially hence endorsing the theory of “AGIL” by Prof Talcott Parsons. Pandemics & infectious diseases are here to stay and as humans, we need to strengthen our city response & preparedness besides evolving mechanisms for strict controls on inter-continental movements of people, especially animals who always acted as carriers for these novel viruses. Pandemics over the years acted like natural storms, mitigated the prevailing social imbalances and laid the foundation for scientific discoveries. We understand that post-Covid-19, institutionalized city, state and national mechanisms will get strengthened and the recommendations issued by the various expert groups which were ignored earlier will now be implemented for reliable anticipation, better preparedness & help to minimize the impact of Pandemics. Our analysis does not intend to present chronological findings of pandemics but rather focuses selectively on major pandemics in history, their causes and how they wiped out an entire city’s population and influenced the societies, their behavior and facilitated social evolution.Keywords: pandemics, Covid-19, social evolution, cities
Procedia PDF Downloads 1121358 Dyadic Effect of Emotional Focused Psycho Educational Intervention on Spousal Emotional Abuse and Marital Satisfaction among Elderly Couples
Authors: Maryam Hazrati, Tengku Aizan Hamid, Rahimah Ibrahim, Siti Aishah Hassan, Farkhondeh Sharif, Zahra Bagheri
Abstract:
Background: Emotional abuse is the most common type of spousal abuse. In a long-term marriage which lasts several decades, the couple will be faced with greater vulnerability due to illness, disability, and dependence. Emotional abuse can have a devastating impact on victims, leading to low self-esteem, depression, anxiety, and post-traumatic stress disorder. Research Aim: The aim of this study was to investigate the effects of an emotional-focused psychoeducational intervention (EFPEI) on emotional abuse and marital satisfaction among older adults couples and also to examine the dyadic effects of each partner’s emotional abuse behaviors (EAB) on his/her marital satisfaction (MS) in Shiraz-Iran. Methodology: The study was a randomized controlled trial (RCT). A total of 57 eligible couples were randomly assigned to either the experimental group or the control group. The experimental group received EFPEI, which consisted of 12 sessions, each lasting 90 minutes. The control group did not receive any intervention. Data were collected using demographic questionnaire, Multidimensional Measure of Emotional Abuse (MMEAQ), and Marital Satisfaction Questionnaire for Older People (MSQFOP). The data was analyzed using a variety of statistical methods, including repeated measures ANOVA, path analysis, and correlational analyses. Findings: The results of the study showed that the EFPEI was effective in reducing emotional abuse and increasing marital satisfaction among older adults couples. Specifically, the mean scores for emotional abuse and marital satisfaction were significantly lower in the experimental group than in the control group at the end of the intervention. These effects were maintained at a 3-month follow-up. Moreover, the dyadic analysis revealed that husbands’ EAB had no significant effects on his own marital satisfaction but a significant negative partner effect, while wives’ EAB had significant negative actor and partner effects. Conclusion: The findings of this study provide support for the use of EFPEI as an effective intervention for decreasing emotional abuse and improving marital dissatisfaction among older adults. EFPEI is a short-term, evidence-based intervention that can be delivered by trained professionals. The intervention focuses on helping couples to improve their communication skills, resolve conflict, and build a stronger emotional connection.Keywords: spouse abuse, emotion, aged, satisfaction, dyadic effect
Procedia PDF Downloads 821357 Prophylactic Effect of Dietary Garlic (Allium sativum) Inclusion in Feed of Commercial Broilers with Coccidiosis Raised at the Experimental Animal Unit of the Department of Veterinary Medicine, University of Ibadan, Oyo State, Nigeria
Authors: Ogunlesi Olufunso, John Ogunsola, Omolade Oladele, Benjamin Emikpe
Abstract:
Context: Coccidiosis is a parasitic disease that affects poultry production, leading to economic losses. Garlic is known for medicinal properties and has been used as a natural remedy for various diseases. This study aims to investigate the prophylactic effect of garlic inclusion in the feed of commercial broilers with coccidiosis. Research Aim: The aim of this study is to determine the possible effect of garlic meal inclusion in poultry feed on the body weight gain of commercial broilers and to investigate it's therapeutic effect on broilers with coccidiosis. Methodology: The study conducted a case-control study for eight weeks with One hundred Arbor acre commercial broilers separated into five (5) groups from day-old, where 6,000 Eimeria oocysts were orally inoculated into each broiler in the different groups. Feed intake, body weight gain, feed conversion ratio, oocyt shedding rate, histopathology and erythrocyte indices were assessed. Findings: The inclusion of garlic meal in the broilers' diet resulted in an improved feed conversion ratio, decreased oocyst counts, reduced diarrhoeic fecal spots, decreased susceptibility to coccidial infection, and increased packed cell volume (PCV). Theoretical Importance: This study contributes to the understanding of the prophylactic effect of garlic supplementation, including its antiparasitic properties on commercial broilers with coccidiosis. It highlights the potential use of non-conventional feed additives or ayurvedic herb and spices in the treatment of poultry diseases. Data Collection and Analysis Procedures: The study collected data on feed intake, body weight gain, oocyst shedding rate, histopathological observations, and erythrocyte indices. Data were analyzed using Analysis of Variance and Duncan's Multiple range Test. Questions Addressed: The study addressed the possible effect of garlic meal inclusion in poultry feed on the body weight gain of broilers and its therapeutic effect on broilers with coccidiosis. Conclusion: The study concludes that garlic inclusion in the feed of broilers has a prophylactic effect, including antiparasitic properties, resulting in improved feed conversion ratio, reduced oocyst counts and increased PCV.Keywords: broilers, eimeria spp, garlic, Ibadan
Procedia PDF Downloads 861356 OBD-Biofertilizer Impact on Crop Yield and Soil Quality in Lowland Rice Production, Badeggi, Niger State, Nigeria
Authors: Ayodele A. Otaiku
Abstract:
Purpose: Nigeria has become the largest importer of rice in Africa and second in the world, 2015. Investigate interactions of organic rice farming on soil quality and health from bio-waste converted to biofertilizer and its environmental impact on rice crop. Methodology: Bio-wastes, poultry waste, organic agriculture wastes, wood ash mixed with microbial inoculant organisms called OBD-Plus microbes (broad spectrum) composted in anaerobic digester to OBD-biofertilizer (2010 - 2012) uses microbes to build humus and other stable carbons. Two field experiments were carried out at Badeggi, Niger state in 2011 and 2012 to evaluate the response of lowland rice production using biofertilizer. The experimental field was laid out in a strip-plot design with five treatments and three replications and at twenty-one day old seedlings of FARO 44 and FARO 52 rice varieties were transplanted. Plots without fertiliser application served as control. Findings: The highest rice grain yield increase of 4.4 t/ha over the control in 2012 against the Nigeria average of lowland rice grain yields of 1.5 t/ha. The utilization of OBD-Biofertilizer can decrease the use of chemical nitrogen fertilizer, prevent the depletion of soil organic matter and reduce environmental pollution. Increasing the floodwater productivity and optimizing the recycling of nutrients cum grazer populations and disease by biocontrols microbes present in the OBD-Biofertilizer. Organic matter in the soil improves by 58% and C/N 15 (2011) and 13.35 (2012). Implications: OBD- Biofertilizer produce plant growth hormones such as indole acetic acid (IAA), glomalin related soil protein and extracellular enzymes as phosphatases that promote soil health and quality. Conclusion: Microorganisms can enhance nutrients use efficiency by increasing root surface area e.g., mycorrhizal, fungi, promoting other beneficial symbioses of the host plant and microbial interactions resulting to increase in soil organic matter. By 2030, climate change is projected to depress cereal production in Africa by 2 to 3 percent. Improved seeds and increased fertilizer use should more than compensate, but this factor will still weigh heavily on efforts to make progress.Keywords: OBD-plus microbial consortia, OBD-biofertilizer, rice production, soil quality, sustainable agriculture
Procedia PDF Downloads 2681355 Floorboards, Whitewalls and Butterflies: Ethnography of a Community Mental Health Cafe
Authors: J. N. Bardi, N. Wright, S. Timmons, P. Crawford
Abstract:
Introduction: In the United Kingdom (UK), the transfer of care from the asylums to the community has meant that some people with mental health problems (MHP) may not have access to suitable or adequate statutory community mental health services (CMHS). However, in addition to statutory CMHS, there are informal CMHS that provide spaces where people with MHP can attend such as faith communities, clubhouses, user-led organisations, day centres including drop-in-centres and community hubs and community mental health cafés (CMHCs). Aim: To qualitatively understand what happens in a community mental health café in relation to the place, people and processes, from the participant's perspective. Methodology: Ethnography Methods: Data collection will be field notes from observations written as thick description and interviews with participants. Data analysis will be thematic and narrative analysis. Relevance: The study seeks to observe what happens in a user-led community mental health café and explore if it provides the services that it claims to offer. Therefore, a literature review was conducted to examine the research evidence related to informal CMHS, focusing on similarities and differences. Results indicated that informal CMHS differ with regards to why, how, who set them up and who funds them, but they are similar because people with MHP who attend them report related psychological, vocational, and social interaction benefits. In addition to the differences listed above, CMHCs differ in their adoption of the commercial café model of social space and some CMHCs claim to address needs of social isolation and loneliness which they assert are not properly addressed by statutory CMHS and some informal CMHS. Therefore, CMHCs explicitly differentiate themselves from statutory CMHS and some informal CMHS such as day centres, hospitals and social services. However, CMHCs were found to be like drop-in-centres and community hubs which are also free for MHP to attend without the need for assessments, membership or appointments. To situate community mental health café within other informal CMHS and provide a rationale for the proposed study a scoping review was conducted to determine the scope of available research evidence on CMHCs. Findings from the scoping review reflected the literature review findings with regards to the benefits of attending informal CMHCs for people with MHP. Of the ten studies included in the scoping review, seven were on CMHCs for people living with dementia and two were on CMHCs for people with a broader range of MHP. The researcher hopes that findings from the proposed PhD study will build on the existing understanding of informal CMHS, extend the research evidence on CMHCs and address any gap in the literature.Keywords: cafe, community, ethnography, mental health
Procedia PDF Downloads 1971354 The Life Skills Project: Client-Centered Approaches to Life Skills Acquisition for Homeless and At-Risk Populations
Authors: Leah Burton, Sara Cumming, Julianne DiSanto
Abstract:
Homelessness is a widespread and complex problem in Canada and around the globe. Many Canadians will face homelessness at least once in their lifetime, with several experiencing subsequent bouts or cyclical patterns of housing precarity. While a Housing First approach to homelessness is a long-standing and widely accepted best practice, it is also recognized that the acquisition of life skills is an effective way to reduce cycles of homelessness. Indeed, when individuals are provided with a range of life skills—such as (but not limited to) financial literacy, household management, interpersonal skills, critical thinking, and resource management—they are given the tools required to maintain long-term Housing for a lifetime; thus reducing a repetitive need for services. However, there is limited research regarding the best ways to teach life skills, a problem that has been further complicated in a post-pandemic world, where services are being delivered online or in a hybrid model of care. More than this, it is difficult to provide life skills on a large scale without losing a client-centered approach to services. This lack of client-centeredness is also seen in the lack of attention to culturally sensitive life skills, which consider the diverse needs of individuals and imbed equity, diversity, and inclusion (EDI) within the skills being taught. This study aims to fill these identified gaps in the literature by employing a community-engaged (CER) approach. Academic, government, funders, front-line staff, and clients at 15 not-for-profits from across the Greater Toronto Area in Ontario, Canada, collaborated to co-create a virtual, client-centric, EDI-informed life skill learning management system. A triangulation methodology was utilized for this research. An environmental scan was conducted for current best practices, and over 100 front-line staff (including workers, managers, and executive directors who work with homeless populations) participated in two separate Creative Problem Solving Sessions. Over 200 individuals with experience in homelessness completed quantitative and open-ended surveys. All sections of this research aimed to discover the areas of skills that individuals need to maintain Housing and to ascertain what a more client-driven EDI approach to life skills training should include. This presentation will showcase the findings on which life skills are deemed essential for homeless and precariously housed individuals.Keywords: homelessness, housing first, life skills, community engaged research, client- centered
Procedia PDF Downloads 1011353 Measuring Systems Interoperability: A Focal Point for Standardized Assessment of Regional Disaster Resilience
Authors: Joel Thomas, Alexa Squirini
Abstract:
The key argument of this research is that every element of systems interoperability is an enabler of regional disaster resilience, and arguably should become a focal point for standardized measurement of communities’ ability to work together. Few resilience research efforts have focused on the development and application of solutions that measurably improve communities’ ability to work together at a regional level, yet a majority of the most devastating and disruptive disasters are those that have had a regional impact. The key findings of the research include a unique theoretical, mathematical, and operational approach to tangibly and defensibly measure and assess systems interoperability required to support crisis information management activities performed by governments, the private sector, and humanitarian organizations. A most effective way for communities to measurably improve regional disaster resilience is through deliberately executed disaster preparedness activities. Developing interoperable crisis information management capabilities is a crosscutting preparedness activity that greatly affects a community’s readiness and ability to work together in times of crisis. Thus, improving communities’ human and technical posture to work together in advance of a crisis, with the ultimate goal of enabling information sharing to support coordination and the careful management of available resources, is a primary means by which communities may improve regional disaster resilience. This model describes how systems interoperability can be qualitatively and quantitatively assessed when characterized as five forms of capital: governance; standard operating procedures; technology; training and exercises; and usage. The unique measurement framework presented defines the relationships between systems interoperability, information sharing and safeguarding, operational coordination, community preparedness and regional disaster resilience, and offers a means by which to implement real-world solutions and measure progress over the course of a multi-year program. The model is being developed and piloted in partnership with the U.S. Department of Homeland Security (DHS) Science and Technology Directorate (S&T) and the North Atlantic Treaty Organization (NATO) Advanced Regional Civil Emergency Coordination Pilot (ARCECP) with twenty-three organizations in Bosnia and Herzegovina, Croatia, Macedonia, and Montenegro. The intended effect of the model implementation is to enable communities to answer two key questions: 'Have we measurably improved crisis information management capabilities as a result of this effort?' and, 'As a result, are we more resilient?'Keywords: disaster, interoperability, measurement, resilience
Procedia PDF Downloads 1421352 Human Coronary Sinus Venous System as a Target for Clinical Procedures
Authors: Wiesława Klimek-Piotrowska, Mateusz K. Hołda, Mateusz Koziej, Katarzyna Piątek, Jakub Hołda
Abstract:
Introduction: The coronary sinus venous system (CSVS), which has always been overshadowed by the coronary arterial tree, has recently begun to attract more attention. Since it is a target for clinicians the knowledge of its anatomy is essential. Cardiac resynchronization therapy, catheter ablation of cardiac arrhythmias, defibrillation, perfusion therapy, mitral valve annuloplasty, targeted drug delivery, and retrograde cardioplegia administration are commonly used therapeutic methods involving the CSVS. The great variability in the course of coronary veins and tributaries makes the diagnostic and therapeutic processes difficult. Our aim was to investigate detailed anatomy of most common clinically used CSVS`s structures: the coronary sinus with its ostium, great cardiac vein, posterior vein of the left ventricle, middle cardiac vein and oblique vein of the left atrium. Methodology: This is a prospective study of 70 randomly selected autopsied hearts dissected from adult humans (Caucasian) aged 50.1±17.6 years old (24.3% females) with BMI=27.6±6.7 kg/m2. The morphology of the CSVS was assessed as well as its precise measurements were performed. Results: The coronary sinus (CS) with its ostium was present in all hearts. The mean CS ostium diameter was 9.9±2.5mm. Considered ostium was covered by its valve in 87.1% with mean valve height amounted 5.1±3.1mm. The mean percentage coverage of the CS ostium by the valve was 56%. The Vieussens valve was present in 71.4% and was unicuspid in 70%, bicuspid in 26% and tricuspid in 4% of hearts. The great cardiac vein was present in all cases. The oblique vein of the left atrium was observed in 84.3% of hearts with mean length amounted 20.2±9.3mm and mean ostium diameter 1.4±0.9mm. The average length of the CS (from the CS ostium to the Vieussens valve) was 31.1±9.5mm or (from the CS ostium to the ostium of the oblique vein of the left atrium) 28.9±10.1mm and both were correlated with the heart weight (r=0.47; p=0.00 and r=0.38; p=0.006 respectively). In 90.5% the ostium of the oblique vein of the left atrium was located proximally to the Vieussens valve, in remaining cases was distally. The middle cardiac vein was present in all hearts and its valve was noticed in more than half of all the cases (52.9%). The posterior vein of the left ventricle was observed in 91.4% of cases. Conclusions: The CSVS is vastly variable and none of basic hearts parameters is a good predictor of its morphology. The Vieussens valve could be a significant obstacle during CS cannulation. Caution should be exercised in this area to avoid coronary sinus perforation. Because of the higher incidence of the presence of the oblique vein of the left atrium than the Vieussens valve, the vein orifice is more useful in determining the CS length.Keywords: cardiac resynchronization therapy, coronary sinus, Thebesian valve, Vieussens valve
Procedia PDF Downloads 3001351 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 281350 Developing Gifted Students’ STEM Career Interest
Authors: Wing Mui Winnie So, Tian Luo, Zeyu Han
Abstract:
To fully explore and develop the potentials of gifted students systematically and strategically by providing them with opportunities to receive education at appropriate levels, schools in Hong Kong are encouraged to adopt the "Three-Tier Implementation Model" to plan and implement the school-based gifted education, with Level Three refers to the provision of learning opportunities for the exceptionally gifted students in the form of specialist training outside the school setting by post-secondary institutions, non-government organisations, professional bodies and technology enterprises. Due to the growing concern worldwide about low interest among students in pursuing STEM (Science, Technology, Engineering, and Mathematics) careers, cultivating and boosting STEM career interest has been an emerging research focus worldwide. Although numerous studies have explored its critical contributors, little research has examined the effectiveness of comprehensive interventions such as “Studying with STEM professional”. This study aims to examine the effect on gifted students’ career interest during their participation in an off-school support programme designed and supervised by a team of STEM educators and STEM professionals from a university. Gifted students were provided opportunities and tasks to experience STEM career topics that are not included in the school syllabus, and to experience how to think and work like a STEM professional in their learning. Participants involved 40 primary school students joining the intervention programme outside the normal school setting. Research methods included adopting the STEM career interest survey and drawing tasks supplemented with writing before and after the programme, as well as interviews before the end of the programme. The semi-structured interviews focused on students’ views regarding STEM professionals; what’s it like to learn with a STEM professional; what’s it like to work and think like a STEM professional; and students’ STEM identity and career interest. The changes in gifted students’ STEM career interest and its well-recognised significant contributors, for example, STEM stereotypes, self-efficacy for STEM activities, and STEM outcome expectation, were collectively examined from the pre- and post-survey using T-test. Thematic analysis was conducted for the interview records to explore how studying with STEM professional intervention can help students understand STEM careers; build STEM identity; as well as how to think and work like a STEM professional. Results indicated a significant difference in STEM career interest before and after the intervention. The influencing mechanism was also identified from the measurement of the related contributors and the analysis of drawings and interviews. The potential of off-school support programme supervised by STEM educators and professionals to develop gifted students’ STEM career interest is argued to be further unleashed in future research and practice.Keywords: gifted students, STEM career, STEM education, STEM professionals
Procedia PDF Downloads 741349 Community Based Psychosocial Intervention Reduces Maternal Depression and Infant Development in Bangladesh
Authors: S. Yesmin, N. F.Rahman, R. Akther, T. Begum, T. Tahmid, T. Chowdury, S. Afrin, J. D. Hamadani
Abstract:
Abstract: Maternal depression is one of the risk factors of developmental delay in young children in low-income countries. Maternal depressions during pregnancy are rarely reported in Bangladesh. Objectives: The purpose of the present study was to examine the efficacy of a community based psychosocial intervention on women with mild to moderate depressive illness during the perinatal period and on their children from birth to 12 months on mothers’ mental status and their infants’ growth and development. Methodology: The study followed a prospective longitudinal approach with a randomized controlled design. Total 250 pregnant women aged between 15 and 40 years were enrolled in their third trimester of pregnancy of which 125 women were in the intervention group and 125 in the control group. Women in the intervention group received the “Thinking Healthy (CBT based) program” at their home setting, from their last month of pregnancy till 10 months after delivery. Their children received psychosocial stimulation from birth till 12 months. The following instruments were applied to get the outcome information- Bangla version of Edinburgh Postnatal Depression Scale (BEPDS), Prenatal Attachment Inventory (PAI), Maternal Attachment Inventory (MAI), Bayley Scale of Infant Development-Third version (Bayley–III) and Family Care Indicator (FCI). In addition, sever morbidity; breastfeeding, immunization, socio-economic and demographic information were collected. Data were collected at three time points viz. baseline, midline (6 months after delivery) and endline (12 months after delivery). Results: There was no significant difference between any of the socioeconomic and demographic variables at baseline. A very preliminary analysis of the data shows an intervention effect on Socioemotional behaviour of children at endline (p<0.001), motor development at midline (p=0.016) and at endline (p=0.065), language development at midline (p=0.004) and at endline (p=0.023), cognitive development at midline (p=0.008) and at endline (p=0.002), and quality of psychosocial stimulation at midline (p=0.023) and at endline (p=0.010). EPDS at baseline was not different between the groups (p=0.419), but there was a significant improvement at midline (p=0.027) and at endline (p=0.024) between the groups following the intervention. Conclusion: Psychosocial intervention is found effective in reducing women’s low and moderate depressive illness to cope with mental health problem and improving development of young children in Bangladesh.Keywords: mental health, maternal depression, infant development, CBT, EPDS
Procedia PDF Downloads 2721348 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis
Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim
Abstract:
As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.Keywords: private information, value, users, perceived risk, online information privacy, attributes
Procedia PDF Downloads 237