Search results for: HIV transmission risks
2794 Internet of Things (IoT): An Analysis of Cost, Benefits, Risks and Enablers
Authors: Shwadhin Sharma, Monica Perez, Vinita Patel, Tyler Kuwatani, Siobhan Scott
Abstract:
The purpose of this research is to explain and analyze why the Internet of Things (IoT) is an emerging technology trend. The aspects of this research paper include an overview of IoT, what research has already been done, the benefits, implications, and our own perspectives on the trend in order to thoroughly analyze how the trend of IoT will make an impact on society. Through the identification of what makes IoT important, it is concluded that IoT will have a tremendous impact for the whole world. Technology is never going to go away, it is going to get smarter and have the potential to change the world.Keywords: internet of things, enablers of IoT, cost of IoT, benefits of IoT
Procedia PDF Downloads 3572793 Common Misconceptions around Human Immunodeficiency Virus in Rural Uganda: Establishing the Role for Patient Education Leaflets Using Patient and Staff Surveys
Authors: Sara Qandil, Harriet Bothwell, Lowri Evans, Kevin Jones, Simon Collin
Abstract:
Background: Uganda suffers from high rates of HIV. Misconceptions around HIV are known to be prevalent in Sub-Saharan Africa (SSA). Two of the most common misconceptions in Uganda are that HIV can be transmitted by mosquito bites or from sharing food. The aim of this project was to establish the local misconceptions around HIV in a Central Ugandan population, and identify if there is a role for patient education leaflets. This project was undertaken as a student selected component (SSC) offered by Swindon Academy, based at the Great Western Hospital, to medical students in their fourth year of the undergraduate programme. Methods: The study was conducted at Villa Maria Hospital; a private, rural hospital in Kalungu District, Central Uganda. 36 patients, 23 from the hospital clinic and 13 from the community were interviewed regarding their understanding of HIV and by what channels they had obtained this understanding. Interviews were conducted using local student nurses as translators. Verbal responses were translated and then transcribed by the researcher. The same 36 patients then undertook a 'misconception' test consisting of 35 questions. Quantitative data was analysed using descriptive statistics and results were scored based on three components of 'transmission knowledge', 'prevention knowledge' and 'misconception rejection'. Each correct response to a question was scored one point, otherwise zero e.g. correctly rejecting a misconception scored one point, but answering ‘yes’ or ‘don’t know’ scored zero. Scores ≤ 27 (the average score) were classified as having ‘poor understanding’. Mean scores were compared between participants seen at the HIV clinic and in the community, and p-values (including Fisher’s exact test) were calculated using Stata 2015. Level of significance was set at 0.05. Interviews with 7 members of staff working in the HIV clinic were undertaken to establish what methods of communication are used to educate patients. Interviews were transcribed and thematic analysis undertaken. Results: The commonest misconceptions which failed to be rejected included transmission of HIV by kissing (78%), mosquitoes (69%) and touching (36%). 33% believed HIV may be prevented by praying. The overall mean scores for transmission knowledge (87.5%) and prevention knowledge (81.1%) were better than misconception rejection scores (69.3%). HIV clinic respondents did tend to have higher scores, i.e. fewer misconceptions, although there was statistical evidence of a significant difference only for prevention knowledge (p=0.03). Analysis of the qualitative data is ongoing but several patients expressed concerns about not being able to read and therefore leaflets not having a helpful role. Conclusions: Results from this paper identified that a high proportion of the population studied held misconceptions about HIV. Qualitative data suggests that there may be a role for patient education leaflets, if pictorial-based and suitable for those with low literacy skill.Keywords: HIV, human immunodeficiency virus, misconceptions, patient education, Sub-Saharan Africa, Uganda
Procedia PDF Downloads 2592792 A New Criterion Using Pose and Shape of Objects for Collision Risk Estimation
Authors: DoHyeung Kim, DaeHee Seo, ByungDoo Kim, ByungGil Lee
Abstract:
As many recent researches being implemented in aviation and maritime aspects, strong doubts have been raised concerning the reliability of the estimation of collision risk. It is shown that using position and velocity of objects can lead to imprecise results. In this paper, therefore, a new approach to the estimation of collision risks using pose and shape of objects is proposed. Simulation results are presented validating the accuracy of the new criterion to adapt to collision risk algorithm based on fuzzy logic.Keywords: collision risk, pose, shape, fuzzy logic
Procedia PDF Downloads 5292791 Reliable and Error-Free Transmission through Multimode Polymer Optical Fibers in House Networks
Authors: Tariq Ahamad, Mohammed S. Al-Kahtani, Taisir Eldos
Abstract:
Optical communications technology has made enormous and steady progress for several decades, providing the key resource in our increasingly information-driven society and economy. Much of this progress has been in finding innovative ways to increase the data carrying capacity of a single optical fiber. In this research article we have explored basic issues in terms of security and reliability for secure and reliable information transfer through the fiber infrastructure. Conspicuously, one potentially enormous source of improvement has however been left untapped in these systems: fibers can easily support hundreds of spatial modes, but today’s commercial systems (single-mode or multi-mode) make no attempt to use these as parallel channels for independent signals. Bandwidth, performance, reliability, cost efficiency, resiliency, redundancy, and security are some of the demands placed on telecommunications today. Since its initial development, fiber optic systems have had the advantage of most of these requirements over copper-based and wireless telecommunications solutions. The largest obstacle preventing most businesses from implementing fiber optic systems was cost. With the recent advancements in fiber optic technology and the ever-growing demand for more bandwidth, the cost of installing and maintaining fiber optic systems has been reduced dramatically. With so many advantages, including cost efficiency, there will continue to be an increase of fiber optic systems replacing copper-based communications. This will also lead to an increase in the expertise and the technology needed to tap into fiber optic networks by intruders. As ever before, all technologies have been subject to hacking and criminal manipulation, fiber optics is no exception. Researching fiber optic security vulnerabilities suggests that not everyone who is responsible for their networks security is aware of the different methods that intruders use to hack virtually undetected into fiber optic cables. With millions of miles of fiber optic cables stretching across the globe and carrying information including but certainly not limited to government, military, and personal information, such as, medical records, banking information, driving records, and credit card information; being aware of fiber optic security vulnerabilities is essential and critical. Many articles and research still suggest that fiber optics is expensive, impractical and hard to tap. Others argue that it is not only easily done, but also inexpensive. This paper will briefly discuss the history of fiber optics, explain the basics of fiber optic technologies and then discuss the vulnerabilities in fiber optic systems and how they can be better protected. Knowing the security risks and knowing the options available may save a company a lot embarrassment, time, and most importantly money.Keywords: in-house networks, fiber optics, security risk, money
Procedia PDF Downloads 4202790 Applying Risk Taking in Islamic Finance: A Fiqhī Viewpoint
Authors: Mohamed Fairooz Abdul Khir
Abstract:
The linkage between liability for risk and legitimacy of reward is a governing principle that must be fully observed in financial transactions. It is the cornerstone of any Islamic business or financial deal. The absence of risk taking principle may give rise to numerous prohibited elements such as ribā, gharar and gambling that violate the objectives of financial transactions. However, fiqhī domains from which it emanates have not been clearly spelled out by the scholars. In addition, the concept of risk taking in relation to contemporary risks associated with financial contracts, such as credit risk, liquidity risk, reputational risk and market risk, needs further scrutiny as regard their Sharīʿah bases. Hence, this study is imperatively significant to prove that absence of risk taking concept in Islamic financial instruments give rise to prohibited elements particularly ribā. This study is primarily intended to clarify the concept of risk in Islamic financial transactions from the fiqhī perspective and evaluate analytically the selected issues involving risk taking based on the established concept of risk taking from fiqhī viewpoint. The selected issues are amongst others charging cost of fund on defaulting customers, holding the lessee liable for total loss of leased asset under ijārah thumma al-bayʿ and capital guarantee under mushārakah based instruments. This is a library research in which data has been collected from various materials such as classical fiqh books, regulators’ policy guidelines and journal articles. This study employed deductive and inductive methods to analyze the data critically in search for conclusive findings. It suggests that business risks have to be evaluated based on their subjects namely (i) property (māl) and (ii) work (ʿamal) to ensure that Islamic financial instruments structured based on certain Sharīʿah principles are not diverted from the risk taking concept embedded in them. Analysis of the above selected cases substantiates that when risk taking principle is breached, the prohibited elements such as ribā, gharar and maysir do arise and that they impede the realization of the maqāṣid al-Sharīʿah intended from Islamic financial contracts.Keywords: Islamic finance, ownership risk, ribā, risk taking
Procedia PDF Downloads 3262789 Light Harvesting Titanium Nanocatalyst for Remediation of Methyl Orange
Authors: Brajesh Kumar, Luis Cumbal
Abstract:
An eco-friendly Citrus paradisi peel extract mediated synthesis of TiO2 nanoparticles is reported under sonication. U.V.-vis, Transmission Electron Microscopy, Dynamic Light Scattering and X-ray analyses are performed to characterize the formation of TiO2 nanoparticles. It is almost spherical in shape, having a size of 60–140 nm and the XRD peaks at 2θ = 25.363° confirm the characteristic facets for anatase form. The synthesized nano catalyst is highly active in the decomposition of methyl orange (64 mg/L) in sunlight (~73%) for 2.5 hours.Keywords: eco-friendly, TiO2 nanoparticles, citrus paradisi, TEM
Procedia PDF Downloads 5252788 Health Risk Assessment of Trihalogenmethanes in Drinking Water
Authors: Lenka Jesonkova, Frantisek Bozek
Abstract:
Trihalogenmethanes (THMs) are disinfection byproducts with non-carcinogenic and genotoxic effects. The contamination of 6 sites close to the water treatment plant has been monitored in second largest city of the Czech Republic. Health risk assessment including both non-carcinogenic and genotoxic risk for long term exposition was realized using the critical concentrations. Concentrations of trihalogenmethanes met national standards in all samples. Risk assessment proved that health risks from trihalogenmethanes are acceptable on each site.Keywords: drinking water, health risk assessment, trihalogenmethanes, water pollution
Procedia PDF Downloads 5202787 4-Channel CWDM Optical Transceiver Applying Silicon Photonics Ge-Photodiode and MZ-Modulator
Authors: Do-Won Kim, Andy Eu Jin Lim, Raja Muthusamy Kumarasamy, Vishal Vinayak, Jacky Wang Yu-Shun, Jason Liow Tsung Yang, Patrick Lo Guo Qiang
Abstract:
In this study, we demonstrate 4-channel coarse wavelength division multiplexing (CWDM) optical transceiver based on silicon photonics integrated circuits (PIC) of waveguide Ge-photodiode (Ge-PD) and Mach Zehnder (MZ)-modulator. 4-channel arrayed PICs of Ge-PD and MZ-modulator are verified to operate at 25 Gbps/ch achieving 4x25 Gbps of total data rate. 4 bare dies of single-channel commercial electronics ICs (EICs) of trans-impedance amplifier (TIA) for Ge-PD and driver IC for MZ-modulator are packaged with PIC on printed circuit board (PCB) in a chip-on-board (COB) manner. Each single-channel EIC is electrically connected to the one channel of 4-channel PICs by wire bonds to trace. The PICs have 4-channel multiplexer for MZ-modulator and 4-channel demultiplexer for Ge-PD. The 4-channel multiplexer/demultiplexer have echelle gratings for4 CWDM optic signals of which center wavelengths are 1511, 1531, 1553, and 1573 nm. Its insertion loss is around 4dB with over 15dB of extinction ratio.The dimension of 4-channel Ge-PD is 3.6x1.4x0.3mm, and its responsivity is 1A/W with dark current of less than 20 nA.Its measured 3dB bandwidth is around 20GHz. The dimension of the 4-channel MZ-modulator is 3.6x4.8x0.3mm, and its 3dB bandwidth is around 11Ghz at -2V of reverse biasing voltage. It has 2.4V•cmbyVπVL of 6V for π shift to 4 mm length modulator.5x5um of Inversed tapered mode size converter with less than 2dB of coupling loss is used for the coupling of the lensed fiber which has 5um of mode field diameter.The PCB for COB packaging and signal transmission is designed to have 6 layers in the hybrid layer structure. 0.25 mm-thick Rogers Duroid RT5880 is used as the first core dielectric layer for high-speed performance over 25 Gbps. It has 0.017 mm-thick of copper layers and its dielectric constant is 2.2and dissipation factor is 0.0009 at 10 GHz. The dimension of both single ended and differential microstrip transmission lines are calculated using full-wave electromagnetic (EM) field simulator HFSS which RF industry is using most. It showed 3dB bandwidth at around 15GHz in S-parameter measurement using network analyzer. The wire bond length for transmission line and ground connection from EIC is done to have less than 300 µm to minimize the parasitic effect to the system.Single layered capacitors (SLC) of 100pF and 1000pF are connected as close as possible to the EICs for stabilizing the DC biasing voltage by decoupling. Its signal transmission performance is under measurement at 25Gbps achieving 100Gbps by 4chx25Gbps. This work can be applied for the active optical cable (AOC) and quad small form-factor pluggable (QSFP) for high-speed optical interconnections. Its demands are quite large in data centers targeting 100 Gbps, 400 Gbps, and 1 Tbps. As the demands of high-speed AOC and QSFP for the application to intra/inter data centers increase, this silicon photonics based high-speed 4 channel CWDM scheme can have advantages not only in data throughput but also cost effectiveness since it reduces fiber cost dramatically through WDM.Keywords: active optical cable(AOC), 4-channel coarse wavelength division multiplexing (CWDM), communication system, data center, ge-photodiode, Mach Zehnder (MZ) modulator, optical interconnections, optical transceiver, photonics integrated circuits (PIC), quad small form-factor pluggable (QSFP), silicon photonics
Procedia PDF Downloads 4182786 Antimicrobial Efficacy of Some Antibiotics Combinations Tested against Some Molecular Characterized Multiresistant Staphylococcus Clinical Isolates, in Egypt
Authors: Nourhan Hussein Fanaki, Hoda Mohamed Gamal El-Din Omar, Nihal Kadry Moussa, Eva Adel Edward Farid
Abstract:
The resistance of staphylococci to various antibiotics has become a major concern for health care professionals. The efficacy of the combinations of selected glycopeptides (vancomycin and teicoplanin) with gentamicin or rifampicin, as well as that of gentamicin/rifampicin combination, was studied against selected pathogenic staphylococcus isolated from Egypt. The molecular distribution of genes conferring resistance to these four antibiotics was detected among tested clinical isolates. Antibiotic combinations were studied using the checkerboard technique and the time-kill assay (in both the stationary and log phases). Induction of resistance to glycopeptides in staphylococci was tried in the absence and presence of diclofenac sodium as inducer. Transmission electron microscopy was used to study the effect of glycopeptides on the ultrastructure of the cell wall of staphylococci. Attempts were made to cure gentamicin resistance plasmids and to study the transfer of these plasmids by conjugation. Trials for the transformation of the successfully isolated gentamicin resistance plasmid to competent cells were carried out. The detection of genes conferring resistance to the tested antibiotics was performed using the polymerase chain reaction. The studied antibiotic combinations proved their efficacy, especially when tested during the log phase. Induction of resistance to glycopeptides in staphylococci was more promising in presence of diclofenac sodium, compared to its absence. Transmission electron microscopy revealed the thickening of bacterial cell wall in staphylococcus clinical isolates due to the presence of tested glycopeptides. Curing of gentamicin resistance plasmids was only successful in 2 out of 9 tested isolates, with a curing rate of 1 percent for each. Both isolates, when used as donors in conjugation experiments, yielded promising conjugation frequencies ranging between 5.4 X 10-2 and 7.48 X 10-2 colony forming unit/donor cells. Plasmid isolation was only successful in one out of the two tested isolates. However, low transformation efficiency (59.7 transformants/microgram plasmid DNA) of such plasmids was obtained. Negative regulators of autolysis, such as arlR, lytR and lrgB, as well as cell-wall associated genes, such as pbp4 and/or pbp2, were detected in staphylococcus isolates with reduced susceptibility to the tested glycopeptides. Concerning rifampicin resistance genes, rpoBstaph was detected in 75 percent of the tested staphylococcus isolates. It could be concluded that in vitro studies emphasized the usefulness of the combination of vancomycin or teicoplanin with gentamicin or rifampicin, as well as that of gentamicin with rifampicin, against staphylococci showing varying resistance patterns. However, further in vivo studies are required to ensure the safety and efficacy of such combinations. Diclofenac sodium can act as an inducer of resistance to glycopeptides in staphylococci. Cell-wall thickness is a major contributor to such resistance among them. Gentamicin resistance in these strains could be chromosomally or plasmid mediated. Multiple mutations in the rpoB gene could mediate staphylococcus resistance to rifampicin.Keywords: glycopeptides, combinations, induction, diclofenac, transmission electron microscopy, polymerase chain reaction
Procedia PDF Downloads 2932785 Wastewater Treatment from Heavy Metals by Nanofiltration and Ion Exchange
Authors: G. G. Kagramanov, E. N. Farnosova, Linn Maung Maung
Abstract:
The technologies of ion exchange and nanofiltration can be used for treatment of wastewater containing copper and other heavy metal ions to decrease the environmental risks. Nanofiltration characteristics under water treatment of heavy metals have been studied. The influence of main technical process parameters - pressure, temperature, concentration and pH value of the initial solution on flux and rejection of nanofiltration membranes has been considered. And ion exchange capacities of resins in removal of heavy metal ions from wastewater have been determined.Keywords: exchange capacity, heavy metals, ion exchange, membrane separation, nanofiltration
Procedia PDF Downloads 2882784 Magnetic Properties of Nickel Oxide Nanoparticles in Superparamagnetic State
Authors: Navneet Kaur, S. D. Tiwari
Abstract:
Superparamagnetism is an interesting phenomenon and observed in small particles of magnetic materials. It arises due to a reduction in particle size. In the superparamagnetic state, as the thermal energy overcomes magnetic anisotropy energy, the magnetic moment vector of particles flip their magnetization direction between states of minimum energy. Superparamagnetic nanoparticles have been attracting the researchers due to many applications such as information storage, magnetic resonance imaging, biomedical applications, and sensors. For information storage, thermal fluctuations lead to loss of data. So that nanoparticles should have high blocking temperature. And to achieve this, nanoparticles should have a higher magnetic moment and magnetic anisotropy constant. In this work, the magnetic anisotropy constant of the antiferromagnetic nanoparticles system is determined. Magnetic studies on nanoparticles of NiO (nickel oxide) are reported well. This antiferromagnetic nanoparticle system has high blocking temperature and magnetic anisotropy constant of order 105 J/m3. The magnetic study of NiO nanoparticles in the superparamagnetic region is presented. NiO particles of two different sizes, i.e., 6 and 8 nm, are synthesized using the chemical route. These particles are characterized by an x-ray diffractometer, transmission electron microscope, and superconducting quantum interference device magnetometry. The magnetization vs. applied magnetic field and temperature data for both samples confirm their superparamagnetic nature. The blocking temperature for 6 and 8 nm particles is found to be 200 and 172 K, respectively. Magnetization vs. applied magnetic field data of NiO is fitted to an appropriate magnetic expression using a non-linear least square fit method. The role of particle size distribution and magnetic anisotropy is taken in to account in magnetization expression. The source code is written in Python programming language. This fitting provides us the magnetic anisotropy constant for NiO and other magnetic fit parameters. The particle size distribution estimated matches well with the transmission electron micrograph. The value of magnetic anisotropy constants for 6 and 8 nm particles is found to be 1.42 X 105 and 1.20 X 105 J/m3, respectively. The obtained magnetic fit parameters are verified using the Neel model. It is concluded that the effect of magnetic anisotropy should not be ignored while studying the magnetization process of nanoparticles.Keywords: anisotropy, superparamagnetic, nanoparticle, magnetization
Procedia PDF Downloads 1342783 Security System for Safe Transmission of Medical Image
Authors: Mohammed Jamal Al-Mansor, Kok Beng Gan
Abstract:
This paper develops an optimized embedding of payload in medical image by using genetic optimization. The goal is to preserve region of interest from being distorted because of the watermark. By using this developed system there is no need of manual defining of region of interest through experts as the system will apply the genetic optimization to select the parts of image that can carry the watermark with guaranteeing less distortion. The experimental results assure that genetic based optimization is useful for performing steganography with less mean square error percentage.Keywords: AES, DWT, genetic algorithm, watermarking
Procedia PDF Downloads 4112782 Health Risk Assessment of Exposing to Benzene in Office Building around a Chemical Industry Based on Numerical Simulation
Authors: Majid Bayatian, Mohammadreza Ashouri
Abstract:
Releasing hazardous chemicals is one of the major problems for office buildings in the chemical industry and, therefore, environmental risks are inherent to these environments. The adverse health effects of the airborne concentration of benzene have been a matter of significant concern, especially in oil refineries. The chronic and acute adverse health effects caused by benzene exposure have attracted wide attention. Acute exposure to benzene through inhalation could cause headaches, dizziness, drowsiness, and irritation of the skin. Chronic exposures have reported causing aplastic anemia and leukemia at the occupational settings. Association between chronic occupational exposure to benzene and the development of aplastic anemia and leukemia were documented by several epidemiological studies. Numerous research works have investigated benzene emissions and determined benzene concentration at different locations of the refinery plant and stated considerable health risks. The high cost of industrial control measures requires justification through lifetime health risk assessment of exposed workers and the public. In the present study, a Computational Fluid Dynamics (CFD) model has been proposed to assess the exposure risk of office building around a refinery due to its release of benzene. For simulation, GAMBIT, FLUENT, and CFD Post software were used as pre-processor, processor, and post-processor, and the model was validated based on comparison with experimental results of benzene concentration and wind speed. Model validation results showed that the model is highly validated, and this model can be used for health risk assessment. The simulation and risk assessment results showed that benzene could be dispersion to an office building nearby, and the exposure risk has been unacceptable. According to the results of this study, a validated CFD model, could be very useful for decision-makers for control measures and possibly support them for emergency planning of probable accidents. Also, this model can be used to assess exposure to various types of accidents as well as other pollutants such as toluene, xylene, and ethylbenzene in different atmospheric conditions.Keywords: health risk assessment, office building, Benzene, numerical simulation, CFD
Procedia PDF Downloads 1302781 Identifying the Determinants of the Shariah Non-Compliance Risk via Principal Axis Factoring
Authors: Muhammad Arzim Naim, Saiful Azhar Rosly, Mohamad Sahari Nordin
Abstract:
The objective of this study is to investigate the factors affecting the rise of Shariah non-compliance risk that can bring Islamic banks to succumb to monetary loss. Prior literatures have never analyzed such risk in details despite lots of it arguing on the validity of some Shariah compliance products. The Shariah non-compliance risk in this context is looking to the potentially failure of the facility to stand from the court test say that if the banks bring it to the court for compensation from the defaulted clients. The risk may also arise if the customers refuse to make the financing payments on the grounds of the validity of the contracts, for example, when relinquishing critical requirement of Islamic contract such as ownership, the risk that may lead the banks to suffer loss when the customer invalidate the contract through the court. The impact of Shariah non-compliance risk to Islamic banks is similar to that of legal risks faced by the conventional banks. Both resulted into monetary losses to the banks respectively. In conventional banking environment, losses can be in the forms of summons paid to the customers if they won the case. In banking environment, this normally can be in very huge amount. However, it is right to mention that for Islamic banks, the subsequent impact to them can be rigorously big because it will affect their reputation. If the customers do not perceive them to be Shariah compliant, they will take their money and bank it in other places. This paper provides new insights of risks faced by credit intensive Islamic banks by providing a new extension of knowledge with regards to the Shariah non-compliance risk by identifying its individual components that directly affecting the risk together with empirical evidences. Not limited to the Islamic banking fraternities, the regulators and policy makers should be able to use findings in this paper to evaluate the components of the Shariah non-compliance risk and make the necessary actions. The paper is written based on Malaysia’s Islamic banking practices which may not directly related to other jurisdictions. Even though the focuses of this study is directly towards to the Bay Bithaman Ajil or popularly known as BBA (i.e. sale with deferred payments) financing modality, the result from this study may be applicable to other Islamic financing vehicles.Keywords: Islamic banking, Islamic finance, Shariah Non-compliance risk, Bay Bithaman Ajil (BBA), principal axis factoring
Procedia PDF Downloads 3022780 Companies and Transplant Tourists to China
Authors: Pavel Porubiak, Lukas Kudlacek
Abstract:
Introduction Transplant tourism is a controversial method of obtaining an organ, and that goes all the more for a country such as China, where sources of evidence point out to the possibility of organs being harvested illegally. This research aimed at listing the individual countries these tourists come from, or which medical companies sell transplant related products in there, with China being used as an example. Materials and methods The methodology of scoping study was used for both parts of the research. The countries from which transplant tourists come to China were identified by a search through existing medical studies in the NCBI PubMed database, listed under the keyword ‘transplantation in China’. The search was not limited by any other criteria, but only the studies available for free – directly on PubMed or a linked source – were used. Other research studies on this topic were considered as well. The companies were identified through multiple methods. The first was an online search focused on medical companies and their products. The Bloomberg Service, used by stock brokers worldwide, was then used to identify the revenue of these companies in individual countries – if data were available – as well as their business presence in China. A search through the U.S. Securities and Exchange Commission was done in the same way. Also a search on the Chinese internet was done, and to obtain more results, a second online search was done as well. The results and discussion The extensive search has identified 14 countries with transplant tourists to China. The search for a similar studies or reports resulted in finding additional six countries. The companies identified by our research also amounted to 20. Eight of them are sourcing China with organ preservation products – of which one is just trying to enter the Chinese market, six with immunosuppressive drugs, four with transplant diagnostics, one with medical robots which Chinese doctors use for transplantation as well, and another one trying to enter the Chinese market with a consumable-type product also related to transplantation. The conclusion The question of the ethicality of transplant tourism may be very pressing, since as the research shows, just the sheer amount of participating countries, sourcing transplant tourists to another one, amounts to 20. The identified companies are facing risks due to the nature of transplantation business in China, as officially executed prisoners are used as sources, and widely cited pieces of evidence point out to illegal organ harvesting. Similar risks and ethical questions are also relevant to the countries sourcing the transplant tourists to China.Keywords: China, illegal organ harvesting, transplant tourism, organ harvesting technology
Procedia PDF Downloads 1342779 Risk Based on Computer Auditing and Measures of Prevention
Authors: Mohammad Hadi Khorashadi Zadeh, Amin Karkon, Seyd Mohammad Reza Mashhoori
Abstract:
The technology of computer audit played a major role in the progress and prospects of a proper application to improve the quality and efficiency of audit work. But due to the technical complexity and the specific risks of computer audit, it should be shown effective in audit and preventive action. Mainly through research in this paper, we propose the causes of audit risk in a computer environment and the risk of further proposals for measures to control, to some extent reduce the risk of computer audit and improve the audit quality.Keywords: computer auditing, risk, measures to prevent, information management
Procedia PDF Downloads 5262778 Social Networking Sites and Narcissism among Generation Z
Authors: Christine Mappala
Abstract:
Social Networking Sites has an undeniable contribution but also a downgrading effect in our society when used inappropriately. It has effects on an individual’s physical, academic, social, emotional, and behavioral aspects in life, a reason to take account to the possible risks it can have with the future generations, specifically the Generation Z. Determining if SNS Usage has an effect on an individual’s Narcissistic Tendencies, how common narcissism is among these individuals and to provide additional information about the Generation Z in the Philippines is the purpose of this study. A total of 342 participants were gathered. Results indicated that there is a low significance of SNS as a predictor to Narcissism. Also, results showed that there is a low level of narcissism among Generation Z.Keywords: narcissism, social networking sites, Generation Z, normal narcissism
Procedia PDF Downloads 5012777 A Comparative Analysis of Various Companding Techniques Used to Reduce PAPR in VLC Systems
Authors: Arushi Singh, Anjana Jain, Prakash Vyavahare
Abstract:
Recently, Li-Fi(light-fiedelity) has been launched based on VLC(visible light communication) technique, 100 times faster than WiFi. Now 5G mobile communication system is proposed to use VLC-OFDM as the transmission technique. The VLC system focused on visible rays, is considered for efficient spectrum use and easy intensity modulation through LEDs. The reason of high speed in VLC is LED, as they flicker incredibly fast(order of MHz). Another advantage of employing LED is-it acts as low pass filter results no out-of-band emission. The VLC system falls under the category of ‘green technology’ for utilizing LEDs. In present scenario, OFDM is used for high data-rates, interference immunity and high spectral efficiency. Inspite of the advantages OFDM suffers from large PAPR, ICI among carriers and frequency offset errors. Since, the data transmission technique used in VLC system is OFDM, the system suffers the drawbacks of OFDM as well as VLC, the non-linearity dues to non-linear characteristics of LED and PAPR of OFDM due to which the high power amplifier enters in non-linear region. The proposed paper focuses on reduction of PAPR in VLC-OFDM systems. Many techniques are applied to reduce PAPR such as-clipping-introduces distortion in the carrier; selective mapping technique-suffers wastage of bandwidth; partial transmit sequence-very complex due to exponentially increased number of sub-blocks. The paper discusses three companding techniques namely- µ-law, A-law and advance A-law companding technique. The analysis shows that the advance A-law companding techniques reduces the PAPR of the signal by adjusting the companding parameter within the range. VLC-OFDM systems are the future of the wireless communication but non-linearity in VLC-OFDM is a severe issue. The proposed paper discusses the techniques to reduce PAPR, one of the non-linearities of the system. The companding techniques mentioned in this paper provides better results without increasing the complexity of the system.Keywords: non-linear companding techniques, peak to average power ratio (PAPR), visible light communication (VLC), VLC-OFDM
Procedia PDF Downloads 2852776 Health Risk Assessment and Source Apportionment of Elemental Particulate Contents from a South Asian Future Megacity
Authors: Afifa Aslam, Muhammad Ibrahim, Abid Mahmood, Muhammad Usman Alvi, Fariha Jabeen, Umara Tabassum
Abstract:
Many factors cause air pollution in Pakistan, which poses a significant threat to human health. Diesel fuel and gasoline motor vehicles, as well as industrial companies, pollute the air in Pakistan's cities. The study's goal is to determine the level of air pollution in a Pakistani industrial city and to establish risk levels for the health of the population. We measured the intensity of air pollution by chemical characterization and examination of air samples collected at stationary remark sites. The PM10 levels observed at all sampling sites, including residential, commercial, high-traffic, and industrial areas were well above the limits imposed by Pakistan EPA, the United States EPA, and WHO. We assessed the health risk via chemical factors using a methodology approved for risk assessment. All Igeo index values greater than one were considered moderately contaminated or moderately to severely contaminated. Heavy metals have a substantial risk of acute adverse effects. In Faisalabad, Pakistan, there was an enormously high risk of chronic effects produced by a heavy metal acquaintance. Concerning specified toxic metals, intolerable levels of carcinogenic risks have been determined for the entire population. As a result, in most of the investigated areas of Faisalabad, the indices and hazard quotients for chronic and acute exposure exceeded the permissible level of 1.0. In the current study, re-suspended roadside mineral dust, anthropogenic exhaust emissions from traffic and industry, and industrial dust were identified as major emission sources of elemental particulate contents. Because of the unacceptable levels of risk in the research area, it is strongly suggested that a comprehensive study of the population's health status as a result of air pollution should be conducted for policies to be developed against these risks.Keywords: elemental composition, particulate pollution, Igeo index, health risk assessment, hazard quotient
Procedia PDF Downloads 912775 The Role of the Basel Accords in Mitigating Systemic Risk
Authors: Wassamon Kun-Amornpong
Abstract:
When a financial crisis occurs, there will be a law and regulatory reform in order to manage the turmoil and prevent a future crisis. One of the most important regulatory efforts to help cope with systemic risk and a financial crisis is the third version of the Basel Accord. Basel III has introduced some measures and tools (e.g., systemic risk buffer, countercyclical buffer, capital conservation buffer and liquidity risk) in order to mitigate systemic risk. Nevertheless, the effectiveness of these measures in Basel III in adequately addressing the problem of contagious runs that can quickly spread throughout the financial system is questionable. This paper seeks to contribute to the knowledge regarding the role of the Basel Accords in mitigating systemic risk. The research question is to what extent the Basel Accords can help control systemic risk in the financial markets? The paper tackles this question by analysing the concept of systemic risk. It will then examine the weaknesses of the Basel Accords before and after the Global financial crisis in 2008. Finally, it will suggest some possible solutions in order to improve the Basel Accord. The rationale of the study is the fact that academic works on systemic risk and financial crises are largely studied from economic or financial perspective. There is comparatively little research from the legal and regulatory perspective. The finding of the paper is that there are some problems in all of the three pillars of the Basel Accords. With regards to Pillar I, the risk model is excessively complex while the benefits of its complexity are doubtful. Concerning Pillar II, the effectiveness of the risk-based supervision in preventing systemic risk still depends largely upon its design and implementation. Factors such as organizational culture of the regulator and the political context within which the risk-based supervision operates might be a barrier against the success of Pillar II. Meanwhile, Pillar III could not provide adequate market discipline as market participants do not always act in a rational way. In addition, the too-big-to-fail perception reduced the incentives of the market participants to monitor risks. There has been some development in resolution measure (e.g. TLAC and MREL) which might potentially help strengthen the incentive of the market participants to monitor risks. However, those measures have some weaknesses. The paper argues that if the weaknesses in the three pillars are resolved, it can be expected that the Basel Accord could contribute to the mitigation of systemic risk in a more significant way in the future.Keywords: Basel accords, financial regulation, risk-based supervision, systemic risk
Procedia PDF Downloads 1282774 Mitigation of Risk Management Activities towards Accountability into Microfinance Environment: Malaysian Case Study
Authors: Nor Azlina A. Rahman, Jamaliah Said, Salwana Hassan
Abstract:
Prompt changes in global business environment, such as passionate competition, managerial/operational, changing governmental regulation and innovation in technology have significant impacts on the organizations. At present, global business environment demands for more proactive institutions on microfinance to provide an opportunity for the business success. Microfinance providers in Malaysia still accelerate its activities of funding by cash and cheque. These institutions are at high risk as the paper-based system is deemed to be slow and prone to human error, as well as requiring a major annual reconciliation process. The global transformation of financial services, growing involvement of technology, innovation and new business activities had progressively made risk management profile to be more subjective and diversified. The persistent, complex and dynamic nature of risk management activities in the institutions arise due to highly automated advancements of technology. This may thus manifest in a variety of ways throughout the financial services sector. This study seeks out to examine current operational risks management being experienced by microfinance providers in Malaysia; investigate the process of current practices on facilitator control factor mechanisms, and explore how the adoption of technology, innovation and use of management accounting practices would affect the risk management process of operation system in microfinance providers in Malaysia. A case study method was employed in this study. The case study also need to find that the vital past role of management accounting will be used for mitigation of risk management activities towards accountability as an information or guideline to microfinance provider. An empirical element obtainable with qualitative method is needed in this study, where multipart and in-depth information are essential to understand the issues of these institution phenomena. This study is expected to propose a theoretical model for implementation of technology, innovation and management accounting practices into the system of operation to improve internal control and subsequently lead to mitigation of risk management activities among microfinance providers to be more successful.Keywords: microfinance, accountability, operational risks, management accounting practices
Procedia PDF Downloads 4392773 Advanced Electron Microscopy Study of Fission Products in a TRISO Coated Particle Neutron Irradiated to 3.6 X 1021 N/cm² Fast Fluence at 1040 ⁰C
Authors: Haiming Wen, Isabella J. Van Rooyen
Abstract:
Tristructural isotropic (TRISO)-coated fuel particles are designed as nuclear fuel for high-temperature gas reactors. TRISO coating consists of layers of carbon buffer, inner pyrolytic carbon (IPyC), SiC, and outer pyrolytic carbon. The TRISO coating, especially the SiC layer, acts as a containment system for fission products produced in the kernel. However, release of certain metallic fission products across intact TRISO coatings has been observed for decades. Despite numerous studies, mechanisms by which fission products migrate across the coating layers remain poorly understood. In this study, scanning transmission electron microscopy (STEM), energy dispersive X-ray spectroscopy (EDS), high-resolution transmission electron microscopy (HRTEM) and electron energy loss spectroscopy (EELS) were used to examine the distribution, composition and structure of fission products in a TRISO coated particle neutron irradiated to 3.6 x 1021 n/cm² fast fluence at 1040 ⁰C. Precession electron diffraction was used to investigate characters of grain boundaries where specific fission product precipitates are located. The retention fraction of 110mAg in the investigated TRISO particle was estimated to be 0.19. A high density of nanoscale fission product precipitates was observed in the SiC layer close to the SiC-IPyC interface, most of which are rich in Pd, while Ag was not identified. Some Pd-rich precipitates contain U. Precipitates tend to have complex structure and composition. Although a precipitate appears to have uniform contrast in STEM, EDS indicated that there may be composition variations throughout the precipitate, and HRTEM suggested that the precipitate may have several parts different in crystal structure or orientation. Attempts were made to measure charge states of precipitates using EELS and study their possible effect on precipitate transport.Keywords: TRISO particle, fission product, nuclear fuel, electron microscopy, neutron irradiation
Procedia PDF Downloads 2652772 The Effect of Artificial Intelligence on Mobile Phones and Communication Systems
Authors: Ibram Khalafalla Roshdy Shokry
Abstract:
This paper gives service feel multiple get entry to (CSMA) verbal exchange model based totally totally on SoC format method. Such model can be used to guide the modelling of the complex c084d04ddacadd4b971ae3d98fecfb2a communique systems, consequently use of such communication version is an crucial method in the creation of excessive general overall performance conversation. SystemC has been selected as it gives a homogeneous format drift for complicated designs (i.e. SoC and IP based format). We use a swarm device to validate CSMA designed version and to expose how advantages of incorporating communication early within the layout process. The wireless conversation created via the modeling of CSMA protocol that may be used to attain conversation among all of the retailers and to coordinate get proper of entry to to the shared medium (channel).The device of automobiles with wi-fiwireless communique abilities is expected to be the important thing to the evolution to next era intelligent transportation systems (ITS). The IEEE network has been continuously operating at the development of an wireless vehicular communication protocol for the enhancement of wi-fi get admission to in Vehicular surroundings (WAVE). Vehicular verbal exchange systems, known as V2X, help car to car (V2V) and automobile to infrastructure (V2I) communications. The wi-ficiencywireless of such communication systems relies upon on several elements, amongst which the encircling surroundings and mobility are prominent. as a result, this observe makes a speciality of the evaluation of the actual performance of vehicular verbal exchange with unique cognizance on the effects of the actual surroundings and mobility on V2X verbal exchange. It begins by wi-fi the actual most range that such conversation can guide and then evaluates V2I and V2V performances. The Arada LocoMate OBU transmission device changed into used to check and evaluate the effect of the transmission range in V2X verbal exchange. The evaluation of V2I and V2V communique takes the real effects of low and excessive mobility on transmission under consideration.Multiagent systems have received sizeable attention in numerous wi-fields, which include robotics, independent automobiles, and allotted computing, where a couple of retailers cooperate and speak to reap complicated duties. wi-figreen communication among retailers is a critical thing of these systems, because it directly influences their usual performance and scalability. This scholarly work gives an exploration of essential communication factors and conducts a comparative assessment of diverse protocols utilized in multiagent systems. The emphasis lies in scrutinizing the strengths, weaknesses, and applicability of those protocols across diverse situations. The studies additionally sheds light on rising tendencies within verbal exchange protocols for multiagent systems, together with the incorporation of device mastering strategies and the adoption of blockchain-based totally solutions to make sure comfy communique. those developments offer valuable insights into the evolving landscape of multiagent structures and their verbal exchange protocols.Keywords: communication, multi-agent systems, protocols, consensussystemC, modelling, simulation, CSMA
Procedia PDF Downloads 252771 Respiratory Bioaerosol Dynamics: Impact of Salinity on Evaporation
Authors: Akhil Teja Kambhampati, Mark A. Hoffman
Abstract:
In the realm of infectious disease research, airborne viral transmission stands as a paramount concern due to its pivotal role in propagating pathogens within densely populated regions. However, amidst this landscape, the phenomenon of hygroscopic growth within respiratory bioaerosols remains relatively underexplored. Unlike pure water aerosols, the unique composition of respiratory bioaerosols leads to varied evaporation rates and hygroscopic growth patterns, influenced by factors such as ambient humidity, temperature, and airflow. This study addresses this gap by focusing on the behaviors of single respiratory bioaerosol utilizing salinity to induce saliva-like hygroscopic behavior. By employing mass, momentum, and energy equations, the study unveils the intricate interplay between evaporation and hygroscopic growth over time. The numerical model enables temporal analysis of bioaerosol characteristics, including size, temperature, and trajectory. The analysis reveals that due to evaporation, there is a reduction in initial size, which shortens the lifetime and distance traveled. However, when hygroscopic growth begins to influence the bioaerosol size, the rate of size reduction slows significantly. The interplay between evaporation and hygroscopic growth results in bioaerosol size within the inhalation range of humans and prolongs the traveling distance. Findings procured from the analysis are crucial for understanding the spread of infectious diseases, especially in high-risk environments such as healthcare facilities and public transportation systems. By elucidating the nuanced behaviors of respiratory bioaerosols, this study seeks to inform the development of more effective preventative strategies against pathogens propagation in the air, thereby contributing to public health efforts on a global scale.Keywords: airborne viral transmission, high-risk environments, hygroscopic growth, evaporation, numerical modeling, pathogen propagation, preventative strategies, public health, respiratory bioaerosols
Procedia PDF Downloads 392770 Morphology Analysis of Apple-Carrot Juice Treated by Manothermosonication (MTS) and High Temperature Short Time (HTST) Processes
Authors: Ozan Kahraman, Hao Feng
Abstract:
Manothermosonication (MTS), which consists of the simultaneous application of heat and ultrasound under moderate pressure (100-700 kPa), is one of the technologies which destroy microorganisms and inactivates enzymes. Transmission electron microscopy (TEM) is a microscopy technique in which a beam of electrons is transmitted through an ultra-thin specimen, interacting with the specimen as it passes through it. The environmental scanning electron microscope or ESEM is a scanning electron microscope (SEM) that allows for the option of collecting electron micrographs of specimens that are "wet," uncoated. These microscopy techniques allow us to observe the processing effects on the samples. This study was conducted to investigate the effects of MTS and HTST treatments on the morphology of apple-carrot juices by using TEM and ESEM microscopy. Apple-carrot juices treated with HTST (72 0C, 15 s), MTS 50 °C (60 s, 200 kPa), and MTS 60 °C (30 s, 200 kPa) were observed in both ESEM and TEM microscopy. For TEM analysis, a drop of the solution dispersed in fixative solution was put onto a Parafilm ® sheet. The copper coated side of the TEM sample holder grid was gently laid on top of the droplet and incubated for 15 min. A drop of a 7% uranyl acetate solution was added and held for 2 min. The grid was then removed from the droplet and allowed to dry at room temperature and presented into the TEM. For ESEM analysis, a critical point drying of the filters was performed using a critical point dryer (CPD) (Samdri PVT- 3D, Tousimis Research Corp., Rockville, MD, USA). After the CPD, each filter was mounted onto a stub and coated with gold/palladium with a sputter coater (Desk II TSC Denton Vacuum, Moorestown, NJ, USA). E.Coli O157:H7 cells on the filters were observed with an ESEM (Philips XL30 ESEM-FEG, FEI Co., Eindhoven, The Netherland). ESEM (Environmental Scanning Electron Microscopy) and TEM (Transmission Electron Microscopy) images showed extensive damage for the samples treated with MTS at 50 and 60 °C such as ruptured cells and breakage on cell membranes. The damage was increasing with increasing exposure time.Keywords: MTS, HTST, ESEM, TEM, E.COLI O157:H7
Procedia PDF Downloads 2852769 Static and Dynamic Tailings Dam Monitoring with Accelerometers
Authors: Cristiana Ortigão, Antonio Couto, Thiago Gabriel
Abstract:
In the wake of Samarco Fundão’s failure in 2015 followed by Vale’s Brumadinho disaster in 2019, the Brazilian National Mining Agency started a comprehensive dam safety programmed to rank dam safety risks and establish monitoring and analysis procedures. This paper focuses on the use of accelerometers for static and dynamic applications. Static applications may employ tiltmeters, as an example shown later in this paper. Dynamic monitoring of a structure with accelerometers yields its dynamic signature and this technique has also been successfully used in Brazil and this paper gives an example of tailings dam.Keywords: instrumentation, dynamic, monitoring, tailings, dams, tiltmeters, automation
Procedia PDF Downloads 1472768 Risk-Based Computer Auditing and Measures of Prevention
Authors: Mohammad Hadi Khorashadi Zadeh, Amin Karkon, Seyd Mohammad Reza Mashhoori
Abstract:
the technology of Computer audit played a major role in the progress and prospects of a proper application to improve the quality and efficiency of audit work. But due to the technical complexity and the specific risks of computer audit, it should be shown effective in audit and preventive action. Mainly through research in this paper, we proposes the causes of audit risk in a computer environment and the risk of further proposals for measures to control, to some extent reduce the risk of computer audit and improve the audit quality.Keywords: computer auditing, risk, measures to prevent, information technology
Procedia PDF Downloads 4892767 Web Map Service for Fragmentary Rockfall Inventory
Authors: M. Amparo Nunez-Andres, Nieves Lantada
Abstract:
One of the most harmful geological risks is rockfalls. They cause both economic lost, damaged in buildings and infrastructures, and personal ones. Therefore, in order to estimate the risk of the exposed elements, it is necessary to know the mechanism of this kind of events, since the characteristics of the rock walls, to the propagation of fragments generated by the initial detached rock mass. In the framework of the research RockModels project, several inventories of rockfalls were carried out along the northeast of the Spanish peninsula and the Mallorca island. These inventories have general information about the events, although the important fact is that they contained detailed information about fragmentation. Specifically, the IBSD (Insitu Block Size Distribution) is obtained by photogrammetry from drone or TLS (Terrestrial Laser Scanner) and the RBSD (Rock Block Size Distribution) from the volume of the fragment in the deposit measured by hand. In order to share all this information with other scientists, engineers, members of civil protection, and stakeholders, it is necessary a platform accessible from the internet and following interoperable standards. In all the process, open-software have been used: PostGIS 2.1., Geoserver, and OpenLayers library. In the first step, a spatial database was implemented to manage all the information. We have used the data specifications of INSPIRE for natural risks adding specific and detailed data about fragmentation distribution. The next step was to develop a WMS with Geoserver. A previous phase was the creation of several views in PostGIS to show the information at different scales of visualization and with different degrees of detail. In the first view, the sites are identified with a point, and basic information about the rockfall event is facilitated. In the next level of zoom, at medium scale, the convex hull of the rockfall appears with its real shape and the source of the event and fragments are represented by symbols. The queries at this level offer a major detail about the movement. Eventually, the third level shows all elements: deposit, source, and blocks, in their real size, if it is possible, and in their real localization. The last task was the publication of all information in a web mapping site (www.rockdb.upc.edu) with data classified by levels using libraries in JavaScript as OpenLayers.Keywords: geological risk, web mapping, WMS, rockfalls
Procedia PDF Downloads 1602766 Fuzzy Inference System for Diagnosis of Malaria
Authors: Purnima Pandit
Abstract:
Malaria remains one of the world’s most deadly infectious disease and arguably, the greatest menace to modern society in terms of morbidity and mortality. To choose the right treatment and to ensure a quality of life suitable for a specific patient condition, early and accurate diagnosis of malaria is essential. It reduces transmission of disease and prevents deaths. Our work focuses on designing an efficient, accurate fuzzy inference system for malaria diagnosis.Keywords: fuzzy inference system, fuzzy logic, malaria disease, triangular fuzzy number
Procedia PDF Downloads 2972765 Artificial Intelligence in Ethiopian Higher Education: The Impact of Digital Readiness Support, Acceptance, Risk, and Trust on Adoption
Authors: Merih Welay Welesilassie
Abstract:
Understanding educators' readiness to incorporate AI tools into their teaching methods requires comprehensively examining the influencing factors. This understanding is crucial, given the potential of these technologies to personalise learning experiences, improve instructional effectiveness, and foster innovative pedagogical approaches. This study evaluated factors affecting teachers' adoption of AI tools in their English language instruction by extending the Technology Acceptance Model (TAM) to encompass digital readiness support, perceived risk, and trust. A cross-sectional quantitative survey was conducted with 128 English language teachers, supplemented by qualitative data collection from 15 English teachers. The structural mode analysis indicated that implementing AI tools in Ethiopian higher education was notably influenced by digital readiness support, perceived ease of use, perceived usefulness, perceived risk, and trust. Digital readiness support positively impacted perceived ease of use, usefulness, and trust while reducing safety and privacy risks. Perceived ease of use positively correlated with perceived usefulness but negatively influenced trust. Furthermore, perceived usefulness strengthened trust in AI tools, while perceived safety and privacy risks significantly undermined trust. Trust was crucial in increasing educators' willingness to adopt AI technologies. The qualitative analysis revealed that the teachers exhibited strong content and pedagogical knowledge but needed more technology-related knowledge. Moreover, It was found that the teachers did not utilise digital tools to teach English. The study identified several obstacles to incorporating digital tools into English lessons, such as insufficient digital infrastructure, a shortage of educational resources, inadequate professional development opportunities, and challenging policies and governance. The findings provide valuable guidance for educators, inform policymakers about creating supportive digital environments, and offer a foundation for further investigation into technology adoption in educational settings in Ethiopia and similar contexts.Keywords: digital readiness support, AI acceptance, perceived risc, AI trust
Procedia PDF Downloads 18