Search results for: open drip proof
2612 Heavy Metal Adsorption from Synthetic Wastewater Using Agro Waste-Based Nanoparticles: A Comparative Study
Authors: Nomthandazo Precious Sibiya, Thembisile Patience Mahlangu, Sudesh Rathilal
Abstract:
Heavy metal removal is critical in the wastewater treatment process due to its numerous harmful effects on human and aquatic life. There are several chemical and physical techniques for removing heavy metals from wastewater, including ion exchange, reverse osmosis, adsorption, electrodialysis, and ultrafiltration. However, adsorption technology has captivated researchers for years due to its low cost, high efficiency, and compatible with the environment. In this study, the adsorption effectiveness of three modified agro-waste materials was explored for the removal of lead from synthetic wastewater: banana peels (BP), orange peels (OP), and sugarcane bagasse (SB). The magnetite (Fe₃O₄) is incorporated with BP, OP, and SB at a ratio of 1:1 to create magnetic biosorbents. Characterization of biosorbents was carried out using and scanning electron microscopy (SEM) combined with energy-dispersive X-ray (EDX) to investigate surface morphology and elemental compositions, respectively. A series of batch experiments were carried out to investigate the effects of adsorbent mass, agitation time, and initial pH concentration on adsorption behaviour, as well as adsorption isotherms and kinetics. The removal efficiency of lead by the modified agro-waste materials proved to be superior to that of non-modified agro-waste materials. The proof of concept was achieved, and agro-waste materials can be paired with adsorption technology to effectively remove lead from aqueous media. The use of agricultural waste as biosorbents will aid in waste reduction and management.Keywords: adsorption, isotherms, kinetics, agro waste, nanoparticles, batch
Procedia PDF Downloads 672611 Approaches to Estimating the Radiation and Socio-Economic Consequences of the Fukushima Daiichi Nuclear Power Plant Accident Using the Data Available in the Public Domain
Authors: Dmitry Aron
Abstract:
Major radiation accidents carry not only the potential risks of negative consequences for public health due to exposure but also because of large-scale emergency measures were taken by authorities to protect the population, which can lead to unreasonable social and economic damage. It is technically difficult, as a rule, to assess the possible costs and damages from decisions on evacuation or resettlement of residents in the shortest possible time, since it requires specially prepared information systems containing relevant information on demographic, economic parameters and incoming data on radiation conditions. Foreign observers also face the difficulties in assessing the consequences of an accident in a foreign territory, since they usually do not have official and detailed statistical data on the territory of foreign state beforehand. Also, they can suppose the application of unofficial data from open Internet sources is an unreliable and overly labor-consuming procedure. This paper describes an approach to prompt creation of relational database that contains detailed actual data on economics, demographics and radiation situation at the Fukushima Prefecture during the Fukushima Daiichi NPP accident, received by the author from open Internet sources. This database was developed and used to assess the number of evacuated population, radiation doses, expected financial losses and other parameters of the affected areas. The costs for the areas with temporarily evacuated and long-term resettled population were investigated, and the radiological and economic effectiveness of the measures taken to protect the population was estimated. Some of the results are presented in the article. The study showed that such a tool for analyzing the consequences of radiation accidents can be prepared in a short space of time for the entire territory of Japan, and it can serve for the modeling of social and economic consequences for hypothetical accidents for any nuclear power plant in its territory.Keywords: Fukushima, radiation accident, emergency measures, database
Procedia PDF Downloads 1912610 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security
Authors: Magdalena Musiał-Karg
Abstract:
The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)
Procedia PDF Downloads 2402609 Energy Trading for Cooperative Microgrids with Renewable Energy Resources
Authors: Ziaullah, Shah Wahab Ali
Abstract:
Micro-grid equipped with heterogeneous energy resources present the idea of small scale distributed energy management (DEM). DEM helps in minimizing the transmission and operation costs, power management and peak load demands. Micro-grids are collections of small, independent controllable power-generating units and renewable energy resources. Micro-grids also motivate to enable active customer participation by giving accessibility of real-time information and control to the customer. The capability of fast restoration against faulty situation, integration of renewable energy resources and Information and Communication Technologies (ICT) make micro-grid as an ideal system for distributed power systems. Micro-grids can have a bank of energy storage devices. The energy management system of micro-grid can perform real-time energy forecasting of renewable resources, energy storage elements and controllable loads in making proper short-term scheduling to minimize total operating costs. We present a review of existing micro-grids optimization objectives/goals, constraints, solution approaches and tools used in micro-grids for energy management. Cost-benefit analysis of micro-grid reveals that cooperation among different micro-grids can play a vital role in the reduction of import energy cost and system stability. Cooperative micro-grids energy trading is an approach to electrical distribution energy resources that allows local energy demands more control over the optimization of power resources and uses. Cooperation among different micro-grids brings the interconnectivity and power trading issues. According to the literature, it shows that open area of research is available for cooperative micro-grids energy trading. In this paper, we proposed and formulated the efficient energy management/trading module for interconnected micro-grids. It is believed that this research will open new directions in future for energy trading in cooperative micro-grids/interconnected micro-grids.Keywords: distributed energy management, information and communication technologies, microgrid, energy management
Procedia PDF Downloads 3752608 Assessment of Commercial Antimicrobials Incorporated into Gelatin Coatings and Applied to Conventional Heat-Shrinking Material for the Prevention of Blown Pack Spoilage in Vacuum Packaged Beef Cuts
Authors: Andrey A. Tyuftin, Rachael Reid, Paula Bourke, Patrick J. Cullen, Seamus Fanning, Paul Whyte, Declan Bolton , Joe P. Kerry
Abstract:
One of the primary spoilage issues associated with vacuum-packed beef products is blown pack spoilage (BPS) caused by the psychrophilic spore-forming strain of Clostridium spp. Spores derived from this organism can be activated after heat-shrinking (eg. 90°C for 3 seconds). To date, research into the control of Clostridium spp in beef packaging is limited. Active packaging in the form of antimicrobially-active coatings may be one approach to its control. Antimicrobial compounds may be incorporated into packaging films or coated onto the internal surfaces of packaging films using a carrier matrix. Three naturally-sourced, commercially-available antimicrobials, namely; Auranta FV (AFV) (bitter oranges extract) from Envirotech Innovative Products Ltd, Ireland; Inbac-MDA (IMDA) from Chemital LLC, Spain, mixture of different organic acids and sodium octanoate (SO) from Sigma-Aldrich, UK, were added into gelatin solutions at 2 concentrations: 2.5 and 3.5 times their minimum inhibition concentration (MIC) against Clostridium estertheticum (DSMZ 8809). These gelatin solutions were coated onto the internal polyethylene layer of cold plasma treated, heat-shrinkable laminates conventionally used for meat packaging applications. Atmospheric plasma was used in order to enhance adhesion between packaging films and gelatin coatings. Pouches were formed from these coated packaging materials, and beef cuts which had been inoculated with C. estertheticum were vacuum packaged. Inoculated beef was vacuum packaged without employing active films and this treatment served as the control. All pouches were heat-sealed and then heat-shrunk at 90°C for 3 seconds and incubated at 2°C for 100 days. During this storage period, packs were monitored for the indicators of blown pack spoilage as follows; gas bubbles in drip, loss of vacuum (onset of BPS), blown, the presence of sufficient gas inside the packs to produce pack distension and tightly stretched, “overblown” packs/ packs leaking. Following storage and assessment of indicator date, it was concluded that AFV- and SO-containing packaging inhibited the growth of C. estertheticum, significantly delaying the blown pack spoilage of beef primals. IMDA did not inhibit the growth of C. estertheticum. This may be attributed to differences in release rates and possible reactions with gelatin. Overall, active films were successfully produced following plasma surface treatment, and experimental data demonstrated clearly that the use of antimicrobially-active films could significantly prolong the storage stability of beef primals through the effective control of BPS.Keywords: active packaging, blown pack spoilage, Clostridium, antimicrobials, edible coatings, food packaging, gelatin films, meat science
Procedia PDF Downloads 2652607 Heterogeneous-Resolution and Multi-Source Terrain Builder for CesiumJS WebGL Virtual Globe
Authors: Umberto Di Staso, Marco Soave, Alessio Giori, Federico Prandi, Raffaele De Amicis
Abstract:
The increasing availability of information about earth surface elevation (Digital Elevation Models DEM) generated from different sources (remote sensing, Aerial Images, Lidar) poses the question about how to integrate and make available to the most than possible audience this huge amount of data. In order to exploit the potential of 3D elevation representation the quality of data management plays a fundamental role. Due to the high acquisition costs and the huge amount of generated data, highresolution terrain surveys tend to be small or medium sized and available on limited portion of earth. Here comes the need to merge large-scale height maps that typically are made available for free at worldwide level, with very specific high resolute datasets. One the other hand, the third dimension increases the user experience and the data representation quality, unlocking new possibilities in data analysis for civil protection, real estate, urban planning, environment monitoring, etc. The open-source 3D virtual globes, which are trending topics in Geovisual Analytics, aim at improving the visualization of geographical data provided by standard web services or with proprietary formats. Typically, 3D Virtual globes like do not offer an open-source tool that allows the generation of a terrain elevation data structure starting from heterogeneous-resolution terrain datasets. This paper describes a technological solution aimed to set up a so-called “Terrain Builder”. This tool is able to merge heterogeneous-resolution datasets, and to provide a multi-resolution worldwide terrain services fully compatible with CesiumJS and therefore accessible via web using traditional browser without any additional plug-in.Keywords: Terrain Builder, WebGL, Virtual Globe, CesiumJS, Tiled Map Service, TMS, Height-Map, Regular Grid, Geovisual Analytics, DTM
Procedia PDF Downloads 4262606 A Framework for Secure Information Flow Analysis in Web Applications
Authors: Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem Hajj, Haidar Safa
Abstract:
Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose a framework that enforces security-by-construction in web applications. Minimal developer effort is required, in a sense that the developer only needs to annotate database attributes by a security class. The web application code is then converted into an intermediary representation, called Extended Program Dependence Graph (EPDG). Using the EPDG, the provided annotations are propagated to the application code and run against generic security enforcement rules that were carefully designed to detect insecure information flows as early as they occur. As a result, any violation in the data’s confidentiality or integrity policies is reported. As a proof of concept, two PHP web applications, Hotel Reservation and Auction, were used for testing and validation. The proposed system was able to catch all the existing insecure information flows at their source. Moreover and to highlight the simplicity of the suggested approaches vs. existing approaches, two professional web developers assessed the annotation tasks needed in the presented case studies and provided a very positive feedback on the simplicity of the annotation task.Keywords: web applications security, secure information flow, program dependence graph, database annotation
Procedia PDF Downloads 4712605 Thulium Laser Vaporisation and Enucleation of Prostate in Patients on Anticoagulants and Antiplatelet Agents
Authors: Abdul Fatah, Naveenchandra Acharya, Vamshi Krishna, T. Shivaprasad, Ramesh Ramayya
Abstract:
Background: Significant number of patients with bladder outlet obstruction due to BPH are on anti-platelets and anticoagulants. Prostate surgery in this group of patients either in the form of TURP or Open prostatectomy is associated with increased risk of bleeding complications requiring transfusions, packing of the prostatic fossa or ligation or embolization of internal iliac arteries. Withholding of antiplatelets and anticoagulants may be associated with cardiac and other complications. Efficacy of Thulium Laser in the above group of patients was evaluated in terms of peri-operative, postoperative and delayed bleeding complications as well as cardiac events in peri-operative and immediate postoperative period. Methods: 217 patients with a mean age of 68.8 years were enrolled between March 2009 and March 2013 (36 months), and treated for BPH with ThuLEP. Every patient was evaluated at base line according to: Digital Rectal Examination (DRE), prostate volume, Post-Voided volume (PVR), International Prostate Symptoms Score (I-PSS), PSA values, urine analysis and urine culture, uroflowmetry. The post operative complications in the form of drop in hemoglobin level, transfusion rates, post –operative cardiac events within a period of 30 days, delayed hematuria and events like deep vein thrombosis and pulmonary embolism were noted. Results: Our data showed a better post-operative outcome in terms of, postoperative bleeding requiring intervention 7 (3.2%), transfusion rate 4 (1.8%) and cardiac events within a period of 30 days 4(1.8%), delayed hematuria within 6 months 2(0.9 %) compared other series of prostatectomies. Conclusion: The thulium LASER prostatectomy is a safe and effective option for patients with cardiac comorbidties and those patients who are on antiplatelet agents and anticoagulants. The complication rate is less as compared to larger series reported with open and transurethral prostatectomies.Keywords: thulium laser, prostatectomy, antiplatelet agents, bleeding
Procedia PDF Downloads 3932604 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method
Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption
Procedia PDF Downloads 5182603 An Efficient Aptamer-Based Biosensor Developed via Irreversible Pi-Pi Functionalisation of Graphene/Zinc Oxide Nanocomposite
Authors: Sze Shin Low, Michelle T. T. Tan, Poi Sim Khiew, Hwei-San Loh
Abstract:
An efficient graphene/zinc oxide (PSE-G/ZnO) platform based on pi-pi stacking, non-covalent interactions for the development of aptamer-based biosensor was presented in this study. As a proof of concept, the DNA recognition capability of the as-developed PSE-G/ZnO enhanced aptamer-based biosensor was evaluated using Coconut Cadang-cadang viroid disease (CCCVd). The G/ZnO nanocomposite was synthesised via a simple, green and efficient approach. The pristine graphene was produced through a single step exfoliation of graphite in sonochemical alcohol-water treatment while the zinc nitrate hexahydrate was mixed with the graphene and subjected to low temperature hydrothermal growth. The developed facile, environmental friendly method provided safer synthesis procedure by eliminating the need of harsh reducing chemicals and high temperature. The as-prepared nanocomposite was characterised by X-ray diffractometry (XRD), scanning electron microscopy (SEM) and energy dispersive spectroscopy (EDS) to evaluate its crystallinity, morphology and purity. Electrochemical impedance spectroscopy (EIS) was employed for the detection of CCCVd sequence with the use of potassium ferricyanide (K3[Fe(CN)6]). Recognition of the RNA analytes was achieved via the significant increase in resistivity for the double stranded DNA, as compared to single-stranded DNA. The PSE-G/ZnO enhanced aptamer-based biosensor exhibited higher sensitivity than the bare biosensor, attributing to the synergistic effect of high electrical conductivity of graphene and good electroactive property of ZnO.Keywords: aptamer-based biosensor, graphene/zinc oxide nanocomposite, green synthesis, screen printed carbon electrode
Procedia PDF Downloads 3702602 Building Up a Sustainable, Future-Proof, Export-Orientated Chili Value Chain in Bugesera District, Rwanda
Authors: Akingeneye Liliane
Abstract:
The value chain concept in recent times is being used by businesses and organizations to develop and implement their businesses. Chili farming has been identified as a significant contributor to the economic growth of Bugesera district. However, numerous challenges have led to a decrease in production. The primary objective of this research was to assess the current Bugesera chili value chain, identify the bottlenecks in the value chain, and come up with interventions that can help increase the output of the Bugesera chili value chain, in a climate-smart way and enhance Long-term sustainability of the value chain. The research used a case study approach to fulfill its objectives, utilizing primary and secondary data sources. Data, both qualitative and quantitative, were gathered through semi-structured interviews conducted with 22 individual farmers, five exporters, and five supporters within the Bugesera district. A focus group discussion (FGD) with seven stakeholders was also conducted to validate the research findings. The study's results underscore the challenges faced by chili farmers and other actors in the chain, the perceptions of different stakeholders to contribute to chili production, and the importance of promoting strong collaboration among stakeholders in the chili value chain to establish a sustainable framework. Based on these findings, the study puts forward recommendations that aim to address the identified challenges and improve the chili farming sector in Bugesera. The business canvas model, as a proposed recommendation, once implemented, is believed to represent the most effective approach to enhancing chili productivity in Bugesera and securing the long-term sustainability of an export-oriented chili value chain in the district.Keywords: building, sustainable, chili, value chain
Procedia PDF Downloads 572601 Legislator’s Liability – Sovereign Immunity and Rule of Law
Authors: Isabel Mousinho de Figueiredo
Abstract:
Traditionally it was held that the king can do no wrong. History has proved otherwise, and both the rule of law and the open society call for a diversification of checks and balances, including civil liability in tort. Most jurisdictions are right to fear the excessive cost of such liability for the innocent taxpayer. There are notwithstanding extreme instances where refusing compensation is perceived to be outrageous. Many public bodies end up handing out on a voluntary basis, which leaves room to question its legality and merit. Instead, some criteria can shed light on the fairness of an underlying rationale of such compensation and cordon it off within reasonable limits.Keywords: comparative law, liability of legislators, public bodies, tort law
Procedia PDF Downloads 1112600 Building Collapse: Factors and Resisting Mechanisms: A Review of Case Studies
Authors: Genevieve D. Fernandes, Nisha P. Naik
Abstract:
All through the ages in all human civilizations, men have been engaged in construction activity, not only to build their dwellings and house their activities, but also roads, bridges to facilitate means of transport, and communication etc. The main concern in this activity was to ensure safety and reduce the collapse of the buildings and other structures. But even after taking all precautions, it is impossible to guarantee safety and collapse because of several unforeseen reasons like faulty constructions, design errors, overloading, soil liquefaction, gas explosion, material degradation, terrorist attacks and economic factors also contributing to the collapse. It is also uneconomical to design the structure for unforeseen events unless they have a reasonable chance of occurrence. In order to ensure safety and prevent collapse, many guidelines have been framed by local bodies and government authorities in many countries like the United States Department of Defence (DOD), United States General Service Administration (GSA) and Euro-Codes in European Nations. Some other practices are followed to incorporate redundancies in the structure like detailing, ductile designs, tying of elements at particular locations, and provision of hinges and interconnections. It is also to be admitted that a full-proof safe design structure for accidental events cannot be prepared and implemented as it is uneconomical and the chances of such occurrences are less. This paper reviews past case studies of the collapse of structures with the aim of developing an understanding of the collapse mechanism. This study will definitely help to bring about a detailed improvement in the design to maximise the quality of the construction at a minimal cost.Keywords: unforeseen factors, progressive collapse, collapse resisting mechanisms, column removal scenario
Procedia PDF Downloads 1372599 Physicochemical-Mechanical, Thermal and Rheological Properties Analysis of Pili Tree (Canarium Ovatum) Resin as Aircraft Integral Fuel Tank Sealant
Authors: Mark Kennedy, E. Bantugon, Noruane A. Daileg
Abstract:
Leaks arising from aircraft fuel tanks is a protracted problem for the aircraft manufacturers, operators, and maintenance crews. It principally arises from stress, structural defects, or degraded sealants as the aircraft age. It can be ignited by different sources, which can result in catastrophic flight and consequences, exhibiting a major drain both on time and budget. In order to mitigate and eliminate this kind of problem, the researcher produced an experimental sealant having a base material of natural tree resin, the Pili Tree Resin. Aside from producing an experimental sealant, the main objective of this research is to analyze its physical, chemical, mechanical, thermal, and rheological properties, which is beneficial and effective for specific aircraft parts, particularly the integral fuel tank. The experimental method of research was utilized in this study since it is a product invention. This study comprises two parts, specifically the Optimization Process and the Characterization Process. In the Optimization Process, the experimental sealant was subjected to the Flammability Test, an important test and consideration according to 14 Code of Federal Regulation Appendix N, Part 25 - Fuel Tank Flammability Exposure and Reliability Analysis, to get the most suitable formulation. Followed by the Characterization Process, where the formulated experimental sealant has undergone thirty-eight (38) different standard testing including Organoleptic, Instrumental Color Measurement Test, Smoothness of Appearance Test, Miscibility Test, Boiling Point Test, Flash Point Test, Curing Time, Adhesive Test, Toxicity Test, Shore A Hardness Test, Compressive Strength, Shear Strength, Static Bending Strength, Tensile Strength, Peel Strength Test, Knife Test, Adhesion by Tape Test, Leakage Test), Drip Test, Thermogravimetry-Differential Thermal Analysis (TG-DTA), Differential Scanning Calorimetry, Calorific Value, Viscosity Test, Creep Test, and Anti-Sag Resistance Test to determine and analyze the five (5) material properties of the sealant. The numerical values of the mentioned tests are determined using product application, testing, and calculation. These values are then used to calculate the efficiency of the experimental sealant. Accordingly, this efficiency is the means of comparison between the experimental and commercial sealant. Based on the results of the different standard testing conducted, the experimental sealant exceeded all the data results of the commercial sealant. This result shows that the physicochemical-mechanical, thermal, and rheological properties of the experimental sealant are far more effective as an aircraft integral fuel tank sealant alternative in comparison to the commercial sealant. Therefore, Pili Tree possesses a new role and function: a source of ingredients in sealant production.Keywords: Aircraft Integral Fuel Tank, Physicochemi-mechanical, Pili Tree Resin, Properties, Rheological, Sealant, Thermal
Procedia PDF Downloads 2952598 Effect of Organizational Competitive Climate on Organizational Prosocial Behavior: Workplace Envy as a Mediator
Authors: Armaghan Eslami, Nasrin Arshadi
Abstract:
Scarce resources are the inseparable part of organization life. This fact that only small number of the employees can have these resources such as promotion, raise, and recognition can cause competition among employees, which create competitive climate. As well as any other competition, small number wins the reward, and a great number loses, one of the possible emotional reactions to this loss is negative emotions like malicious envy. In this case, the envious person may try to harm the envied person by reducing the prosocial behavior. Prosocial behavior is a behavior that aimed to benefit others. The main propose of this action is to maintain and increase well-being and well-fare of others. Therefore, one of the easiest ways for harming envied one is to suppress prosocial behavior. Prosocial behavior has positive and important implication for organizational efficiency. Our results supported our model and suggested that competitive climate has a significant effect on increasing workplace envy and on the other hand envy has significant negative impact on prosocial behavior. Our result also indicated that envy is the mediator in the relation between competitive climate and prosocial behavior. Organizational competitive climate can cause employees respond envy with negative emotion and hostile and damaging behavior toward envied person. Competition can lead employees to look out for proof of their self-worthiness; and, furthermore, they measure their self-worth, value and respect by the superiority that they gain in competitions. As a result, loss in competitions can harm employee’s self-definition and they try to protect themselves by devaluating envied other and being ‘less friendly’ to them. Some employees may find it inappropriate to engage in the harming behavior, but they may believe there is nothing against withholding the prosocial behavior.Keywords: competitive climate, mediator, prosocial behavior, workplace envy
Procedia PDF Downloads 3622597 Building Up a Sustainable, Future-Proof, Export-Orientated Chili Value Chain in Bugesera District, Rwanda
Authors: Akingeneye Liliane
Abstract:
The value chain concept in recent times is being used by businesses and organizations to develop and implement their businesses. Chili farming has been identified as a significant contributor to the economic growth of Bugesera district. However, numerous challenges have led to a decrease in production. The primary objective of this research was to assess the current Bugesera chili value chain, identify the bottlenecks in the value chain, and come up with interventions that can help increase the output of the Bugesera chili value chain, in a climate-smart way and enhance Long-term sustainability of the value chain. The research used a case study approach to fulfill its objectives, utilizing primary and secondary data sources. Qualitative and quantitative data were gathered through semi-structured interviews with 22 individual farmers, five exporters, and five supporters within the Bugesera district. A focus group discussion (FGD) with seven stakeholders was also conducted to validate the research findings. The study's results underscore the challenges faced by chili farmers and other actors in the chain, the perceptions of different stakeholders to contribute to chili production, and the importance of promoting strong collaboration among stakeholders in the chili value chain to establish a sustainable framework. Based on these findings, the study puts forward recommendations to address the identified challenges and improve the chili farming sector in Bugesera. The business canvas model, as a proposed recommendation, once implemented, is believed to represent the most effective approach to enhancing chili productivity in Bugesera and securing the long-term sustainability of an export-oriented chili value chain in the district.Keywords: build, sustainability, chili value chain, export-oriented
Procedia PDF Downloads 432596 Directivity in the Dramatherapeutic Process for People with Addictive Behaviour
Authors: Jakub Vávra, Milan Valenta, Petr Kosek
Abstract:
This article presents a perspective on the conduct of the dramatherapy process with persons with addictive behaviours with regard to the directiveness of the process. Although drama therapy as one of the creative arts approaches is rather non-directive in nature, depending on the clientele, there may be a need to structure the process more and, depending on the needs of the clients, to guide the process more directive. The specificity for people with addictive behaviours is discussed through the prism of the dramatherapeutic perspective, where we can find both a psychotherapeutic component as well as a component touching on expression and art, which is rather non-directive in nature. Within the context of practice with clients, this theme has repeatedly emerged and dramatherapists themselves have sought to find ways of coping with clients' demands and needs for structure and guidance within the dramatherapy process. Some of the outcomes from the supervision work also guided the research. Based on this insight, the research questions were approached. The first research question asks: in what ways is directive in dramatherapy manifested and manifested in the process? The second research question then complements the first and asks: to which phenomena are directivity in dramatherapy linked? In relation to the research questions, data were collected using focus groups and field notes. The qualitative approach of Content analysis and Relational analysis was chosen as the methodology. For analyzing qualitative research, we chose an Inductive coding scheme: Open coding, Axial coding, Pattern matching, Member checking, and Creating a coding scheme. In the presented partial research results, we find recurrent schemes related to directive coding in drama therapy. As an important element, directive leadership emerges in connection with safety for the client group, then in connection with the clients' order and also the department of the facility, and last but not least, to the personality of the drama therapist. By careful analysis and looking for patterns in the research results, we can see connections that are impossible to interpret at this stage but already provide clues to our understanding of the topic and open up further avenues for research in this area.Keywords: dramatherapy, directivity, personal approach, aims of dramatherapy process, safetyness
Procedia PDF Downloads 692595 Influence of Emotional Intelligence on Educational Supervision and Leadership Style in Saudi Arabia
Authors: Jawaher Bakheet Almudarra
Abstract:
An Educational Supervisor assists teachers to develop their competence and skills in teaching, solving educational problems, and to improve the teaching methods to suit the educational process. They evaluate their teachers and write reports based on their assessments. In 1957, the Saudi Ministry of Education instituted Educational Supervision to facilitate effective management of schools, however, there have been concerns that the Educational Supervision has not been effective in executing its mandate. Studies depicted that Educational supervision has not been effective because it has been marred by poor and autocratic leadership practices such as stringent inspection, commanding and judging. Therefore, there is need to consider some of the ways in which school outcomes can be enhanced through the improvement of Educational supervision practices. Emotional intelligence is a relatively new concept that can be integrated into the Saudi education system that is yet to be examined in-depth and embraced particularly in the realm of educational leadership. Its recognition and adoption may improve leadership practices among Educational supervisors. This study employed a qualitative interpretive approach that will focus on decoding, describing and interpreting the connection between emotional intelligence and leadership. The study also took into account the social constructions that include consciousness, language and shared meanings. The data collection took place in the Office of Educational Supervisors in Riyadh and involved 4 Educational supervisors and 20 teachers from both genders- male and female. The data collection process encompasses three methods namely; qualitative emotional intelligence self-assessment questionnaires, reflective semi-structured interviews, and open workshops. The questionnaires would explore whether the Educational supervisors understand the meaning of emotional intelligence and its significance in enhancing the quality of education system in Saudi Arabia. Subsequently, reflective semi-structured interviews were carried out with the Educational supervisors to explore the connection between their leadership styles and the way they conceptualise their emotionality. The open workshops will include discussions on emotional aspects of Educational supervisors’ practices and how Educational supervisors make use of the emotional intelligence discourse in their leadership and supervisory relationships.Keywords: directors of educational supervision, emotional intelligence, educational leadership, education management
Procedia PDF Downloads 4292594 Reasons for Choosing Medicine and the Personality Traits of Pre-Clinical Medical Students
Authors: Zarini Ismail, Nurul Azmawati Mohamed, Shalinawati Ramli, Nurul Hayati Chamhuri, Nur Syahrina Rahim, Khairani Omar
Abstract:
Choosing a career is one of the most important decisions that people have to make in life. While choosing a suitable career, a person cannot ignore their intrinsic traits such as the type of personality, interests, values, and aptitude. The objective of this study is to ascertain the personality of the pre-clinical medical students and their reasons or intentions for choosing medicine as a career. This study is a cross-sectional study involving Year 3 pre-clinical medical students at Universiti Sains Islam Malaysia. Participants were given a set of validated questionnaires on demographic data and open-ended questions for reasons of choosing medicine. Thematic analysis were used to analyse the open-ended question. The Participants were also required to answer a Career Interest Questionnaire (based on Holland’s Theory). A total of 81 Year 3 medical students were involved in this study. About two third (69%) of them were female and their age ranged from 20 to 21 years old. The majority of them were from middle-income families. From the thematic analysis, there were several reasons given for choosing medicine by the students. The majority of the students stated that it was their passion and interest in the medical field (45.7%). Approximately 24.7% decided to take the medical course because of parents/family influenced and 19.8% mentioned that they wanted to help the society. Other themes emerged were jobs opportunity in future (1.2%) and influenced by friends (3.7%). Based on Holland’s theory, ideally to become a good medical doctor one should score high in investigative and social personality trait. However, 26.3% of the students had low scores in these personality traits. We then looked into the reasons given by these students for choosing medicine. Approximately 28% were due to parents/family decision while 52% admitted that it was due to their interest. When compared with the group of students with high personality scores (investigative and social), there was not much difference in the reasons given for choosing medicine. The main reasons given by the students for choosing medicine were own interest, family’s influence and to help others. However, a proportion of them had low scores in the personality traits which are relevant for medicine. Although some of these students admitted that they choose medicine based on their interest, their strength might not be suitable for their chosen carrier.Keywords: career, medical students, medicine, personality
Procedia PDF Downloads 3482593 A Proposal to Tackle Security Challenges of Distributed Systems in the Healthcare Sector
Authors: Ang Chia Hong, Julian Khoo Xubin, Burra Venkata Durga Kumar
Abstract:
Distributed systems offer many benefits to the healthcare industry. From big data analysis to business intelligence, the increased computational power and efficiency from distributed systems serve as an invaluable resource in the healthcare sector to utilize. However, as the usage of these distributed systems increases, many issues arise. The main focus of this paper will be on security issues. Many security issues stem from distributed systems in the healthcare industry, particularly information security. The data of people is especially sensitive in the healthcare industry. If important information gets leaked (Eg. IC, credit card number, address, etc.), a person’s identity, financial status, and safety might get compromised. This results in the responsible organization losing a lot of money in compensating these people and even more resources expended trying to fix the fault. Therefore, a framework for a blockchain-based healthcare data management system for healthcare was proposed. In this framework, the usage of a blockchain network is explored to store the encryption key of the patient’s data. As for the actual data, it is encrypted and its encrypted data, called ciphertext, is stored in a cloud storage platform. Furthermore, there are some issues that have to be emphasized and tackled for future improvements, such as a multi-user scheme that could be proposed, authentication issues that have to be tackled or migrating the backend processes into the blockchain network. Due to the nature of blockchain technology, the data will be tamper-proof, and its read-only function can only be accessed by authorized users such as doctors and nurses. This guarantees the confidentiality and immutability of the patient’s data.Keywords: distributed, healthcare, efficiency, security, blockchain, confidentiality and immutability
Procedia PDF Downloads 1842592 Factors Affecting Expectations and Intentions of University Students’ Mobile Phone Use in Educational Contexts
Authors: Davut Disci
Abstract:
Objective: to measure the factors affecting expectations and intentions of using mobile phone in educational contexts by university students, using advanced equations and modeling techniques. Design and Methodology: According to the literature, Mobile Addiction, Parental Surveillance- Safety/Security, Social Relations, and Mobile Behavior are most used terms of defining mobile use of people. Therefore these variables are tried to be measured to find and estimate their effects on expectations and intentions of using mobile phone in educational context. 421 university students participated in this study and there are 229 Female and 192 Male students. For the purpose of examining the mobile behavior and educational expectations and intentions, a questionnaire is prepared and applied to the participants who had to answer all the questions online. Furthermore, responses to close-ended questions are analyzed by using The Statistical Package for Social Sciences(SPSS) software, reliabilities are measured by Cronbach’s Alpha analysis and hypothesis are examined via using Multiple Regression and Linear Regression analysis and the model is tested with Structural Equation Modeling(SEM) technique which is important for testing the model scientifically. Besides these responses, open-ended questions are taken into consideration. Results: When analyzing data gathered from close-ended questions, it is found that Mobile Addiction, Parental Surveillance, Social Relations and Frequency of Using Mobile Phone Applications are affecting the mobile behavior of the participants in different levels, helping them to use mobile phone in educational context. Moreover, as for open-ended questions, participants stated that they use many mobile applications in their learning environment in terms of contacting with friends, watching educational videos, finding course material via internet. They also agree in that mobile phone brings greater flexibility to their lives. According to the SEM results the model is not evaluated and it can be said that it may be improved to show in SEM besides in multiple regression. Conclusion: This study shows that the specified model can be used by educationalist, school authorities to improve their learning environment.Keywords: education, mobile behavior, mobile learning, technology, Turkey
Procedia PDF Downloads 4212591 Factors Affecting Expectations and Intentions of University Students in Educational Context
Authors: Davut Disci
Abstract:
Objective: to measure the factors affecting expectations and intentions of using mobile phone in educational contexts by university students, using advanced equations and modeling techniques. Design and Methodology: According to the literature, Mobile Addiction, Parental Surveillance-Safety/Security, Social Relations, and Mobile Behavior are most used terms of defining mobile use of people. Therefore, these variables are tried to be measured to find and estimate their effects on expectations and intentions of using mobile phone in educational context. 421 university students participated in this study and there are 229 Female and 192 Male students. For the purpose of examining the mobile behavior and educational expectations and intentions, a questionnaire is prepared and applied to the participants who had to answer all the questions online. Furthermore, responses to close-ended questions are analyzed by using The Statistical Package for Social Sciences(SPSS) software, reliabilities are measured by Cronbach’s Alpha analysis and hypothesis are examined via using Multiple Regression and Linear Regression analysis and the model is tested with Structural Equation Modeling (SEM) technique which is important for testing the model scientifically. Besides these responses, open-ended questions are taken into consideration. Results: When analyzing data gathered from close-ended questions, it is found that Mobile Addiction, Parental Surveillance, Social Relations and Frequency of Using Mobile Phone Applications are affecting the mobile behavior of the participants in different levels, helping them to use mobile phone in educational context. Moreover, as for open-ended questions, participants stated that they use many mobile applications in their learning environment in terms of contacting with friends, watching educational videos, finding course material via internet. They also agree in that mobile phone brings greater flexibility to their lives. According to the SEM results the model is not evaluated and it can be said that it may be improved to show in SEM besides in multiple regression. Conclusion: This study shows that the specified model can be used by educationalist, school authorities to improve their learning environment.Keywords: learning technology, instructional technology, mobile learning, technology
Procedia PDF Downloads 4522590 Effect of Toxic Metals Exposure on Rat Behavior and Brain Morphology: Arsenic, Manganese
Authors: Tamar Bikashvili, Tamar Lordkipanidze, Ilia Lazrishvili
Abstract:
Heavy metals remain one of serious environmental problems due to their toxic effects. The effect of arsenic and manganese compounds on rat behavior and neuromorphology was studied. Wistar rats were assigned to four groups: rats in control group were given regular water, while rats in other groups drank water with final manganese concentration of 10 mg/L (group A), 20 mg/L (group B) and final arsenic concentration 68 mg/L (group C), respectively, for a month. To study exploratory and anxiety behavior and also to evaluate aggressive performance in “home cage” rats were tested in “Open Field” and to estimate learning and memory status multi-branched maze was used. Statistically significant increase of motor and oriental-searching activity in experimental groups was revealed by an open field test, which was expressed in increase of number of lines crossed, rearing and hole reflexes. Obtained results indicated the suppression of fear in rats exposed to manganese. Specifically, this was estimated by the frequency of getting to the central part of the open field. Experiments revealed that 30-day exposure to 10 mg/ml manganese did not stimulate aggressive behavior in rats, while exposure to the higher dose (20 mg/ml), 37% of initially non-aggressive animals manifested aggressive behavior. Furthermore, 25% of rats were extremely aggressive. Obtained data support the hypothesis that excess manganese in the body is one of the immediate causes of enhancement of interspecific predatory aggressive and violent behavior in rats. It was also discovered that manganese intoxication produces non-reversible severe learning disability and insignificant, reversible memory disturbances. Studies of rodents exposed to arsenic also revealed changes in the learning process. As it is known, the distribution of metal ions differs in various brain regions. The principle manganese accumulation was observed in the hippocampus and in the neocortex, while arsenic was predominantly accumulated in nucleus accumbens, striatum, and cortex. These brain regions play an important role in the regulation of emotional state and motor activity. Histopathological analyzes of brain sections illustrated two morphologically distinct altered phenotypes of neurons: (1) shrunk cells with indications of apoptosis - nucleus and cytoplasm were very difficult to be distinguished, the integrity of neuronal cytoplasm was not disturbed; and (2) swollen cells - with indications of necrosis. Pyknotic nucleus, plasma membrane disruption and cytoplasmic vacuoles were observed in swollen neurons and they were surrounded by activated gliocytes. It’s worth to mention that in the cortex the majority of damaged neurons were apoptotic while in subcortical nuclei –neurons were mainly necrotic. Ultrastructural analyses demonstrated that all cell types in the cortex and the nucleus caudatus represent destructed mitochondria, widened neurons’ vacuolar system profiles, increased number of lysosomes and degeneration of axonal endings.Keywords: arsenic, manganese, behavior, learning, neuron
Procedia PDF Downloads 3592589 Examining Litter Distributions in Lethbridge, Alberta, Canada, Using Citizen Science and GIS Methods: OpenLitterMap App and Story Maps
Authors: Tali Neta
Abstract:
Humans’ impact on the environment has been incredibly brutal, with enormous plastic- and other pollutants (e.g., cigarette buds, paper cups, tires) worldwide. On land, litter costs taxpayers a fortune. Most of the litter pollution comes from the land, yet it is one of the greatest hazards to marine environments. Due to spatial and temporal limitations, previous litter data covered very small areas. Currently, smartphones can be used to obtain information on various pollutants (through citizen science), and they can greatly assist in acknowledging and mitigating the environmental impact of litter. Litter app data, such as the Litterati, are available for study through a global map only; these data are not available for download, and it is not clear whether irrelevant hashtags have been eliminated. Instagram and Twitter open-source geospatial data are available for download; however, these are considered inaccurate, computationally challenging, and impossible to quantify. Therefore, the resulting data are of poor quality. Other downloadable geospatial data (e.g., Marine Debris Tracker8 and Clean Swell10) are focused on marine- rather than terrestrial litter. Therefore, accurate terrestrial geospatial documentation of litter distribution is needed to improve environmental awareness. The current research employed citizen science to examine litter distribution in Lethbridge, Alberta, Canada, using the OpenLitterMap (OLM) app. The OLM app is an application used to track litter worldwide, and it can mark litter locations through photo georeferencing, which can be presented through GIS-designed maps. The OLM app provides open-source data that can be downloaded. It also offers information on various litter types and “hot-spots” areas where litter accumulates. In this study, Lethbridge College students collected litter data with the OLM app. The students produced GIS Story Maps (interactive web GIS illustrations) and presented these to school children to improve awareness of litter's impact on environmental health. Preliminary results indicate that towards the Lethbridge Coulees’ (valleys) East edges, the amount of litter significantly increased due to shrubs’ presence, that acted as litter catches. As wind generally travels from west to east in Lethbridge, litter in West-Lethbridge often finds its way down in the east part of the coulees. The students’ documented various litter types, while the majority (75%) included plastic and paper food packaging. The students also found metal wires, broken glass, plastic bottles, golf balls, and tires. Presentations of the Story Maps to school children had a significant impact, as the children voluntarily collected litter during school recess, and they were looking into solutions to reduce litter. Further litter distribution documentation through Citizen Science is needed to improve public awareness. Additionally, future research will be focused on Drone imagery of highly concentrated litter areas. Finally, a time series analysis of litter distribution will help us determine whether public education through Citizen Science and Story Maps can assist in reducing litter and reaching a cleaner and healthier environment.Keywords: citizen science, litter pollution, Open Litter Map, GIS Story Map
Procedia PDF Downloads 792588 Chemical Characterization and Prebiotic Effect of Water-Soluble Polysaccharides from Zizyphus lotus Leaves
Authors: Zakaria Boual, Abdellah Kemassi, Toufik Chouana, Philippe Michaud, Mohammed Didi Ould El Hadj
Abstract:
In order to investigate the prebiotic potential of oligosaccharides prepared by chemical hydrolysis of water-soluble polysaccharides (WSP) from Zizyphus lotus leaves, the effect of oligosaccharides on bacterial growth was studied. The chemical composition of WSP was evaluated by colorimetric assays revealed the average values: 7.05±0.73% proteins and 86.21±0.74% carbohydrates, among them 64.81±0.42% are neutral sugar and the rest 16.25±1.62% are uronic acids. The characterization of monosaccharides was determined by high performance anion exchange chromatography with pulsed amperometric detection (HPAEC-PAD) was found to be composed of galactose (23.95%), glucose (21.30%), rhamnose (20.28%), arabinose (9.55%), and glucuronic acid (22.95%). The effects of oligosaccharides on the growth of lactic acid bacteria were compared with those of fructo-oligosaccharide (RP95). The oligosaccharides concentration was 1g/L of man rogosa sharpe broth. Bacterial growth was assessed during 2, 4.5, 6.5, 9, 12, 16 and 24 h by measuring the optical density of the cultures at 600 nm (OD600) and pH values. During fermentation, pH in broth cultures decreased from 6.7 to 5.87±0.15. The enumeration of lactic acid bacteria indicated that oligosaccharides led to a significant increase in bacteria (P≤0.05) compared to the control. The fermentative metabolism appeared to be faster on RP95 than on oligosaccharides from Zizyphus lotus leaves. Both RP95 and oligosaccharides showed clear prebiotic effects, but had differences in fermentation kinetics because of to the different degree of polymerization. This study shows the prebiotic effectiveness of oligosaccharides, and provides proof for the selection of leaves of Zizyphus lotus for use as functional food ingredients.Keywords: Zizyphus lotus, polysaccharides, characterization, prebiotic effects
Procedia PDF Downloads 4102587 Symmetric Key Encryption Algorithm Using Indian Traditional Musical Scale for Information Security
Authors: Aishwarya Talapuru, Sri Silpa Padmanabhuni, B. Jyoshna
Abstract:
Cryptography helps in preventing threats to information security by providing various algorithms. This study introduces a new symmetric key encryption algorithm for information security which is linked with the "raagas" which means Indian traditional scale and pattern of music notes. This algorithm takes the plain text as input and starts its encryption process. The algorithm then randomly selects a raaga from the list of raagas that is assumed to be present with both sender and the receiver. The plain text is associated with the thus selected raaga and an intermediate cipher-text is formed as the algorithm converts the plain text characters into other characters, depending upon the rules of the algorithm. This intermediate code or cipher text is arranged in various patterns in three different rounds of encryption performed. The total number of rounds in the algorithm is equal to the multiples of 3. To be more specific, the outcome or output of the sequence of first three rounds is again passed as the input to this sequence of rounds recursively, till the total number of rounds of encryption is performed. The raaga selected by the algorithm and the number of rounds performed will be specified at an arbitrary location in the key, in addition to important information regarding the rounds of encryption, embedded in the key which is known by the sender and interpreted only by the receiver, thereby making the algorithm hack proof. The key can be constructed of any number of bits without any restriction to the size. A software application is also developed to demonstrate this process of encryption, which dynamically takes the plain text as input and readily generates the cipher text as output. Therefore, this algorithm stands as one of the strongest tools for information security.Keywords: cipher text, cryptography, plaintext, raaga
Procedia PDF Downloads 2892586 China's Role in Promoting Regionalism in East Asia in Post-Maoist Era: An Analysis through Uneven and Combined Development
Authors: Ali Jibran
Abstract:
China was considered as a revisionist state by the countries of East Asia during Maoist era; but China’s role changed from a revisionist state to a constructive member of East Asian Community in post-Maoist era. This research will mainly investigate the two phenomena: what were reasons of behavioral change of China in East Asia and what role has China played to promote regionalism in East Asia since Open Door Policy of Deng Xiaoping. To understand these two phenomena, this study applies the international relations theory of Uneven and Combined Development (U&CD). The central finding of this study is that ‘whip of external necessity’ posed by the Western dominance during the Chinese ‘century of ignominy’ resulted in a Maoist regime in China in 1948 which was hostile to its neighbors due to ideological tensions. Maoist regime in China could not solve the challenges posed by the ‘international’; therefore after Mao’s death, a new economic approach was introduced in China to deal with the challenges postured by the ‘international’. Due to Deng Xiaoping’s 'Open Door Policy' era, China used its ‘privilege of historic backwardness’ and witnessed unprecedented economic growth. As the societies are multiple and exist in real time, therefore interaction among societies is pertinent. Export oriented domestic policy pushed China to concentrate less on class struggle and improve its relations with its neighbors in East Asia. As China soon become a global hub of trade after market oriented reforms, therefore friendly relations with the states of East Asia was pertinent. This study will investigate Chinese role in regionalism in East Asia in three area: Chinese role in promoting regionalism in East Asia, China’s role in economic integration in East Asia and China’s role in combatting terrorism in East Asia. This study will be divided in two section. The first section will deal with the transformation in Chinese behavior in East Asia in post Maoist era, and the second section will analyze China’s role in East Asia by looking at Chinese role in institutional mechanism, economic integration and combatting terrorism in East Asia.Keywords: East Asia, regionalism, institutionlism, economic integration
Procedia PDF Downloads 3762585 A System Architecture for Hand Gesture Control of Robotic Technology: A Case Study Using a Myo™ Arm Band, DJI Spark™ Drone, and a Staubli™ Robotic Manipulator
Authors: Sebastian van Delden, Matthew Anuszkiewicz, Jayse White, Scott Stolarski
Abstract:
Industrial robotic manipulators have been commonplace in the manufacturing world since the early 1960s, and unmanned aerial vehicles (drones) have only begun to realize their full potential in the service industry and the military. The omnipresence of these technologies in their respective fields will only become more potent in coming years. While these technologies have greatly evolved over the years, the typical approach to human interaction with these robots has not. In the industrial robotics realm, a manipulator is typically jogged around using a teach pendant and programmed using a networked computer or the teach pendant itself via a proprietary software development platform. Drones are typically controlled using a two-handed controller equipped with throttles, buttons, and sticks, an app that can be downloaded to one’s mobile device, or a combination of both. This application-oriented work offers a novel approach to human interaction with both unmanned aerial vehicles and industrial robotic manipulators via hand gestures and movements. Two systems have been implemented, both of which use a Myo™ armband to control either a drone (DJI Spark™) or a robotic arm (Stäubli™ TX40). The methodologies developed by this work present a mapping of armband gestures (fist, finger spread, swing hand in, swing hand out, swing arm left/up/down/right, etc.) to either drone or robot arm movements. The findings of this study present the efficacy and limitations (precision and ergonomic) of hand gesture control of two distinct types of robotic technology. All source code associated with this project will be open sourced and placed on GitHub. In conclusion, this study offers a framework that maps hand and arm gestures to drone and robot arm control. The system has been implemented using current ubiquitous technologies, and these software artifacts will be open sourced for future researchers or practitioners to use in their work.Keywords: human robot interaction, drones, gestures, robotics
Procedia PDF Downloads 1572584 Design and Development of Power Sources for Plasma Actuators to Control Flow Separation
Authors: Himanshu J. Bahirat, Apoorva S. Janawlekar
Abstract:
Plasma actuators are essential for aerodynamic flow separation control due to their lack of mechanical parts, lightweight, and high response frequency, which have numerous applications in hypersonic or supersonic aircraft. The working of these actuators is based on the formation of a low-temperature plasma between a pair of parallel electrodes by the application of a high-voltage AC signal across the electrodes, after which air molecules from the air surrounding the electrodes are ionized and accelerated through the electric field. The high-frequency operation is required in dielectric discharge barriers to ensure plasma stability. To carry out flow separation control in a hypersonic flow, the optimal design and construction of a power supply to generate dielectric barrier discharges is carried out in this paper. In this paper, it is aspired to construct a simplified circuit topology to emulate the dielectric barrier discharge and study its various frequency responses. The power supply can generate high voltage pulses up to 20kV at the repetitive frequency range of 20-50kHz with an input power of 500W. The power supply has been designed to be short circuit proof and can endure variable plasma load conditions. Its general outline is to charge a capacitor through a half-bridge converter and then later discharge it through a step-up transformer at a high frequency in order to generate high voltage pulses. After simulating the circuit, the PCB design and, eventually, lab tests are carried out to study its effectiveness in controlling flow separation.Keywords: aircraft propulsion, dielectric barrier discharge, flow separation control, power source
Procedia PDF Downloads 1262583 Intensive Care Experience of Providing Palliative Care for a Terminal Lung Cancer Patient
Authors: Ting-I Lin
Abstract:
Objective: This article explores the nursing care experience of a 51-year-old terminal lung cancer patient admitted to the intensive care unit (ICU) following an upper right lobectomy. The patient initially sought emergency treatment due to worsening cough and dyspnea, which led to the placement of an endotracheal tube following sudden deterioration. Subsequent CT scans and chest X-rays revealed a tumor in the upper right lung with metastases to the lungs, liver, bones, and adrenal glands. The patient underwent a right upper lobectomy and a wedge resection of the right middle lobe. Pathology staging: T4N3M1c and the patient was diagnosed with advanced cancer postoperatively. Method: During the care period, nursing staff continuously monitored the patient’s physiological data through observations, direct care, interviews, physical assessments, and review of the patient’s medical records. The nursing team collaborated with the critical care team and the palliative care team, using Gordon's Eleven Functional Health Patterns to conduct a comprehensive assessment. The key health problems identified included pain related to postoperative cancer resection and invasive devices, fear of death due to rapid disease progression, and altered tissue perfusion associated with hemodynamic instability. Results: Postoperatively, the patient experienced pain from the surgical wound and dyspnea due to extensive metastasis, often leading to confusion. Through the adjustment of pain medication, the patient’s discomfort was alleviated, using Morphine 8 mg in 0.9% normal saline 60 ml IV drip q6h prn, and Ultracet 37.5 mg/325 mg 1# PO q6h. Additionally, lavender essential oil inhalation and limb massage were provided for 15 minutes four times a day. The patient’s FLACC pain score decreased from 7 to below 3. After respiratory training, the endotracheal tube was successfully removed, and the patient was weaned off the ventilator. Triflow exercises were used to promote alveolar expansion, with the goal of achieving 2 balls for 10 seconds, 5 repetitions per session, 6-8 times a day. The patient’s breathing stabilized at 16-18 breaths per minute, body temperature remained between 35.8°C and 36.1°C, and the mean arterial pressure was maintained between 60-80 mmHg. Conclusion: The critical care team and the palliative care team held a family meeting to discuss not only the patient’s care but also the emotional well-being of the family. Visiting hours were increased to two times per day, one hour each time, allowing the patient and family to express love and gratitude, which strengthened their emotional connection and reduced the patient’s anxiety from severe to mild. The family expressed that they had no regrets. After the patient was transferred to the general ward, the nursing team continued to provide end-of-life care with genuine empathy, compassion, and religious support, helping both the patient and family through the final stage of life.Keywords: multiple metastases, lung cancer, palliative care, nursing experience
Procedia PDF Downloads 26