Search results for: automated cad drawing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1654

Search results for: automated cad drawing

754 Data Recording for Remote Monitoring of Autonomous Vehicles

Authors: Rong-Terng Juang

Abstract:

Autonomous vehicles offer the possibility of significant benefits to social welfare. However, fully automated cars might not be going to happen in the near further. To speed the adoption of the self-driving technologies, many governments worldwide are passing laws requiring data recorders for the testing of autonomous vehicles. Currently, the self-driving vehicle, (e.g., shuttle bus) has to be monitored from a remote control center. When an autonomous vehicle encounters an unexpected driving environment, such as road construction or an obstruction, it should request assistance from a remote operator. Nevertheless, large amounts of data, including images, radar and lidar data, etc., have to be transmitted from the vehicle to the remote center. Therefore, this paper proposes a data compression method of in-vehicle networks for remote monitoring of autonomous vehicles. Firstly, the time-series data are rearranged into a multi-dimensional signal space. Upon the arrival, for controller area networks (CAN), the new data are mapped onto a time-data two-dimensional space associated with the specific CAN identity. Secondly, the data are sampled based on differential sampling. Finally, the whole set of data are encoded using existing algorithms such as Huffman, arithmetic and codebook encoding methods. To evaluate system performance, the proposed method was deployed on an in-house built autonomous vehicle. The testing results show that the amount of data can be reduced as much as 1/7 compared to the raw data.

Keywords: autonomous vehicle, data compression, remote monitoring, controller area networks (CAN), Lidar

Procedia PDF Downloads 159
753 The Impact of Artificial Intelligence in the Development of Textile and Fashion Industry

Authors: Basem Kamal Abasakhiroun Farag

Abstract:

Fashion, like many other areas of design, has undergone numerous developments over the centuries. The aim of the article is to recognize and evaluate the importance of advanced technologies in fashion design and to examine how they are transforming the role of contemporary fashion designers by transforming the creative process. It also discusses how contemporary culture is involved in such developments and how it influences fashion design in terms of conceptualization and production. The methodology used is based on examining various examples of the use of technology in fashion design and drawing parallels between what was feasible then and what is feasible today. Comparison of case studies, examples of existing fashion designs and experiences with craft methods; We therefore observe patterns that help us predict the direction of future developments in this area. Discussing the technological elements in fashion design helps us understand the driving force behind the trend. The research presented in the article shows that there is a trend towards significantly increasing interest and progress in the field of fashion technology, leading to the emergence of hybrid artisanal methods. In summary, as fashion technologies advance, their role in clothing production is becoming increasingly important, extending far beyond the humble sewing machine.

Keywords: fashion, identity, such, textiles ambient intelligence, proximity sensors, shape memory materials, sound sensing garments, wearable technology bio textiles, fashion trends, nano textiles, new materials, smart textiles, techno textiles fashion design, functional aesthetics, 3D printing.

Procedia PDF Downloads 61
752 The Challenges Involved in Investigating and Prosecuting Hate Crime Online

Authors: Mark Williams

Abstract:

The digital revolution has radically transformed our social environment creating vast opportunities for interconnectivity and social interaction. This revolution, however, has also changed the reach and impact of hate crime, with social media providing a new platform to victimize and harass users in their homes. In this way, developments in the information and communication technologies have exacerbated and facilitated the commission of hate crime, increasing its prevalence and impact. Unfortunately, legislators, policymakers and criminal justice professionals have struggled to keep pace with these technological developments, reducing their ability to intervene in, regulate and govern the commission of hate crimes online. This work is further complicated by the global nature of this crime due to the tendency for offenders and victims to reside in multiple different jurisdictions, as well as the need for criminal justice professionals to obtain the cooperation of private companies to access information required for prosecution. Drawing on in-depth interviews with key criminal justice professionals and policymakers with detailed knowledge in this area, this paper examines the specific challenges the police and prosecution services face as they attempt to intervene in and prosecute the commission of hate crimes online. It is argued that any attempt to reduce online othering, such as the commission of hate crimes online, must be multifaceted, collaborative and involve both innovative technological solutions as well as internationally agreed ethical and legal frameworks.

Keywords: cybercrime, digital policing, hate crime, social media

Procedia PDF Downloads 218
751 Mining the Proteome of Fusobacterium nucleatum for Potential Therapeutics Discovery

Authors: Abdul Musaweer Habib, Habibul Hasan Mazumder, Saiful Islam, Sohel Sikder, Omar Faruk Sikder

Abstract:

The plethora of genome sequence information of bacteria in recent times has ushered in many novel strategies for antibacterial drug discovery and facilitated medical science to take up the challenge of the increasing resistance of pathogenic bacteria to current antibiotics. In this study, we adopted subtractive genomics approach to analyze the whole genome sequence of the Fusobacterium nucleatum, a human oral pathogen having association with colorectal cancer. Our study divulged 1499 proteins of Fusobacterium nucleatum, which has no homolog in human genome. These proteins were subjected to screening further by using the Database of Essential Genes (DEG) that resulted in the identification of 32 vitally important proteins for the bacterium. Subsequent analysis of the identified pivotal proteins, using the KEGG Automated Annotation Server (KAAS) resulted in sorting 3 key enzymes of F. nucleatum that may be good candidates as potential drug targets, since they are unique for the bacterium and absent in humans. In addition, we have demonstrated the 3-D structure of these three proteins. Finally, determination of ligand binding sites of the key proteins as well as screening for functional inhibitors that best fitted with the ligands sites were conducted to discover effective novel therapeutic compounds against Fusobacterium nucleatum.

Keywords: colorectal cancer, drug target, Fusobacterium nucleatum, homology modeling, ligands

Procedia PDF Downloads 384
750 Leveraging Artificial Intelligence to Analyze the Interplay between Social Vulnerability Index and Mobility Dynamics in Pandemics

Authors: Joshua Harrell, Gideon Osei Bonsu, Susan Garza, Clarence Conner, Da’Neisha Harris, Emma Bukoswki, Zohreh Safari

Abstract:

The Social Vulnerability Index (SVI) stands as a pivotal tool for gauging community resilience amidst diverse stressors, including pandemics like COVID-19. This paper synthesizes recent research and underscores the significance of SVI in elucidating the differential impacts of crises on communities. Drawing on studies by Fox et al. (2023) and Mah et al. (2023), we delve into the application of SVI alongside emerging data sources to uncover nuanced insights into community vulnerability. Specifically, we explore the utilization of SVI in conjunction with mobility data from platforms like SafeGraph to probe the intricate relationship between social vulnerability and mobility dynamics during the COVID-19 pandemic. By leveraging 16 community variables derived from the American Community Survey, including socioeconomic status and demographic characteristics, SVI offers actionable intelligence for guiding targeted interventions and resource allocation. Building upon recent advancements, this paper contributes to the discourse on harnessing AI techniques to mitigate health disparities and fortify public health resilience in the face of pandemics and other crises.

Keywords: social vulnerability index, mobility dynamics, data analytics, health equity, pandemic preparedness, targeted interventions, data integration

Procedia PDF Downloads 61
749 Computer-Aided Classification of Liver Lesions Using Contrasting Features Difference

Authors: Hussein Alahmer, Amr Ahmed

Abstract:

Liver cancer is one of the common diseases that cause the death. Early detection is important to diagnose and reduce the incidence of death. Improvements in medical imaging and image processing techniques have significantly enhanced interpretation of medical images. Computer-Aided Diagnosis (CAD) systems based on these techniques play a vital role in the early detection of liver disease and hence reduce liver cancer death rate.  This paper presents an automated CAD system consists of three stages; firstly, automatic liver segmentation and lesion’s detection. Secondly, extracting features. Finally, classifying liver lesions into benign and malignant by using the novel contrasting feature-difference approach. Several types of intensity, texture features are extracted from both; the lesion area and its surrounding normal liver tissue. The difference between the features of both areas is then used as the new lesion descriptors. Machine learning classifiers are then trained on the new descriptors to automatically classify liver lesions into benign or malignant. The experimental results show promising improvements. Moreover, the proposed approach can overcome the problems of varying ranges of intensity and textures between patients, demographics, and imaging devices and settings.

Keywords: CAD system, difference of feature, fuzzy c means, lesion detection, liver segmentation

Procedia PDF Downloads 318
748 The Role of Foreign Investment in Fostering Economic Growth in Post War Countries

Authors: Khadija Amin

Abstract:

The significant contribution of foreign investment in promoting economic recovery, especially in countries recovering from conflict, is generally recognized. This study examines the influence of foreign investment on the economic development of countries that have had long-lasting internal conflicts. The study examines the complex correlation between foreign investment and economic progress using the production function framework based on endogenous growth theory. In addition to foreign investment, the research considers a range of factors that affect economic growth, such as trade dynamics, the spread of information, attempts to promote peace, changes in the labor market, and the accumulation of domestic capital. The study challenges common beliefs by revealing a statistically negligible negative association between GDP growth and foreign investment (FI) inflows in post-war economies. The existing literature highlights the positive impact of trade and foreign investment on economic growth. However, this study emphasizes that these impacts are complex and depend on various contextual factors such as trade policies, infrastructure development, domestic investment levels, human capital development, and macroeconomic stability. The results emphasize the crucial significance of foreign investment in stimulating development while also drawing attention to the intricacies of precisely assessing its economic consequences. Measuring the economic impact of foreign investment is a difficult task that requires detailed analysis considering many contextual elements and changing socioeconomic conditions.

Keywords: economic grouths, foreign investment, trade policies, domestic investment

Procedia PDF Downloads 34
747 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 260
746 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy

Authors: Babatunde Osabiya

Abstract:

Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.

Keywords: security risk, legal framework, cyber security and policy, national security

Procedia PDF Downloads 90
745 Customized Design of Amorphous Solids by Generative Deep Learning

Authors: Yinghui Shang, Ziqing Zhou, Rong Han, Hang Wang, Xiaodi Liu, Yong Yang

Abstract:

The design of advanced amorphous solids, such as metallic glasses, with targeted properties through artificial intelligence signifies a paradigmatic shift in physical metallurgy and materials technology. Here, we developed a machine-learning architecture that facilitates the generation of metallic glasses with targeted multifunctional properties. Our architecture integrates the state-of-the-art unsupervised generative adversarial network model with supervised models, allowing the incorporation of general prior knowledge derived from thousands of data points across a vast range of alloy compositions, into the creation of data points for a specific type of composition, which overcame the common issue of data scarcity typically encountered in the design of a given type of metallic glasses. Using our generative model, we have successfully designed copper-based metallic glasses, which display exceptionally high hardness or a remarkably low modulus. Notably, our architecture can not only explore uncharted regions in the targeted compositional space but also permits self-improvement after experimentally validated data points are added to the initial dataset for subsequent cycles of data generation, hence paving the way for the customized design of amorphous solids without human intervention.

Keywords: metallic glass, artificial intelligence, mechanical property, automated generation

Procedia PDF Downloads 53
744 A Review of Sustainable Energy-Saving Solutions in Active and Passive Solar Systems of Zero Energy Buildings Based on the Internet of Things

Authors: Hanieh Sadat Jannesari, Hoori Jannesar, Alireza Hajian HosseinAbadi

Abstract:

In general, buildings are responsible for a considerable share of consumed energy and carbon emissions worldwide and play a significant role in formulating sustainable development strategies. Therefore, a lot of effort is put into the design and construction of zero-energy buildings (ZEBs) to help eliminate the problems associated with the reduction of energy resources and environmental degradation. Two strategies are significant in designing ZEBs: minimizing the need for energy utilization in buildings (particularly for cooling and heating) through highly energy-efficient designs and using renewable energies and other technologies to meet the remaining energy needs. This paper reviews the works related to these two strategies concerning sustainable energy-saving solutions using renewable energy technologies and the Internet of Things in ZEBs. Drawing on the theories and recently implemented projects of energy engineers in ZEBs, we have reported the required technologies within the framework of this paper’s objectives. Overall, solutions based on renewable and sustainable technologies such as photovoltaic (PV) modules, thermal collectors, Phase Change Material (PCM) techniques, etc., are used in active and passive systems designed for various applications in such buildings as cooling, heating, lighting, cooking, etc. The results obtained from examining these projects show that it is possible to minimize the amount of energy required to be produced for and consumed by these buildings.

Keywords: active and passive renewable energy systems, internet of things, storage, zero energy buildings

Procedia PDF Downloads 26
743 Applying Critical Realism to Qualitative Social Work Research: A Critical Realist Approach for Social Work Thematic Analysis Method

Authors: Lynne Soon-Chean Park

Abstract:

Critical Realism (CR) has emerged as an alternative to both the positivist and constructivist perspectives that have long dominated social work research. By unpacking the epistemic weakness of two dogmatic perspectives, CR provides a useful philosophical approach that incorporates the ontological objectivist and subjectivist stance. The CR perspective suggests an alternative approach for social work researchers who have long been looking to engage in the complex interplay between perceived reality at the empirical level and the objective reality that lies behind the empirical event as a causal mechanism. However, despite the usefulness of CR in informing social work research, little practical guidance is available about how CR can inform methodological considerations in social work research studies. This presentation aims to provide a detailed description of CR-informed thematic analysis by drawing examples from a social work doctoral research of Korean migrants’ experiences and understanding of trust associated with their settlement experience in New Zealand. Because of its theoretical flexibility and accessibility as a qualitative analysis method, thematic analysis can be applied as a method that works both to search for the demi-regularities of the collected data and to identify the causal mechanisms that lay behind the empirical data. In so doing, this presentation seeks to provide a concrete and detailed exemplar for social work researchers wishing to employ CR in their qualitative thematic analysis process.

Keywords: critical Realism, data analysis, epistemology, research methodology, social work research, thematic analysis

Procedia PDF Downloads 209
742 Engaging Students with Special Education Needs through Technology-Enhanced Interactive Activities in Class

Authors: Pauli P.Y. Lai

Abstract:

Students with Special Education Needs (SEN) face many challenges in learning. Various challenges include difficulty in handwriting, slow understanding and assimilation, difficulty in paying attention during class, and lack of communication skills. To engage students with Special Education Needs in class with general students, Blackboard Collaborate is used as a teaching and learning tool to deliver a lecture with interactive activities. Blackboard Collaborate provides a good platform to create and enhance active, collaborative and interactive learning experience whereby the SEN students can easily interact with their general peers and the instructor by using the features of drawing on a virtual whiteboard, file sharing, classroom chatter, breakout room, hand-raising feature, polling, etc. By integrating a blended learning approach with Blackboard Collaborate, the students with Special Education Needs could engage in interactive activities with ease in class. Our research aims at exploring and discovering the use of Blackboard Collaborate for inclusive education based on a qualitative design with in-depth interviews. Being served in a general education environment, three university students with different kinds of learning disabilities have participated in our study. All participants agreed that functions provided by Blackboard Collaborate have enhanced their learning experiences and helped them learn better. Their academic performances also showed that SEN students could perform well with the help of technology. This research studies different aspects of using Blackboard Collaborate to create an inclusive learning environment for SEN students.

Keywords: blackboard collaborate, enhanced learning experience, inclusive education, special education needs

Procedia PDF Downloads 129
741 Automated End-to-End Pipeline Processing Solution for Autonomous Driving

Authors: Ashish Kumar, Munesh Raghuraj Varma, Nisarg Joshi, Gujjula Vishwa Teja, Srikanth Sambi, Arpit Awasthi

Abstract:

Autonomous driving vehicles are revolutionizing the transportation system of the 21st century. This has been possible due to intensive research put into making a robust, reliable, and intelligent program that can perceive and understand its environment and make decisions based on the understanding. It is a very data-intensive task with data coming from multiple sensors and the amount of data directly reflects on the performance of the system. Researchers have to design the preprocessing pipeline for different datasets with different sensor orientations and alignments before the dataset can be fed to the model. This paper proposes a solution that provides a method to unify all the data from different sources into a uniform format using the intrinsic and extrinsic parameters of the sensor used to capture the data allowing the same pipeline to use data from multiple sources at a time. This also means easy adoption of new datasets or In-house generated datasets. The solution also automates the complete deep learning pipeline from preprocessing to post-processing for various tasks allowing researchers to design multiple custom end-to-end pipelines. Thus, the solution takes care of the input and output data handling, saving the time and effort spent on it and allowing more time for model improvement.

Keywords: augmentation, autonomous driving, camera, custom end-to-end pipeline, data unification, lidar, post-processing, preprocessing

Procedia PDF Downloads 116
740 The Arts in Medicine and Health: A Necessity for Evidence-Based Health Systems

Authors: Alan S. Weber

Abstract:

This contribution reviews the current biomedical and qualitative arts research on arts-in-health interventions to improve both individual and population health outcomes. Arts therapies–for example, music therapy with roots in Aristoxenus’s Ἁρμονικὰ στοιχεῖα and the Pythagorean sect–have long been employed in therapeutic contexts. However, the 20th century witnessed the increasing use of the visual and plastic arts (drawing, painting, sculpting), performing arts (drama and dance), and other expressive arts modalities into occupational therapy, well-being medicine, and psychological and psychiatric counselling, diagnosis, and treatment. A significant body of peer-reviewed evidence in the medical and neurological sciences on the role of arts-in-health has developed, and specifically, research on music and art therapy has led to their inclusion within the current biomedical paradigm of evidence-based practice. The arts cannot only aid in public and population health promotion (promoting healthy behaviors and lifestyles, preventing disease onset) but also in addressing psychological issues (regulation of emotion; stress, anxiety, and depression reduction), behavioural issues (basic life skills, coping), and physiological response (immune system function, hormonal regulation, homeostatis). Working as a cross-disciplinary researcher in the arts in an American medical college, the author has developed several successful arts-in-health programs at the national and international level.

Keywords: arts-in-health, evidence based medicine, arts for health, expressive arts therapies

Procedia PDF Downloads 68
739 Viewing Entrepreneurship Through a Goal Congruity Lens: The Roles of Dominance and Communal Goal Orientations in Women’s and Men’s Venture Interests

Authors: Xiaoming Yang, Abby Folberg, Carey Ryan, Lwetzel, Tgoering

Abstract:

We examined gender differences in entrepreneurial career interests drawing on goal congruity theory, which posits that people adopt gender-stereotypic goal orientations in response to social pressures to conform to traditional gender roles. Aspiring entrepreneurs (N = 351) first wrote three to five sentences about what they believed made an entrepreneur successful. They then completed measures of agentic and communal goal orientations (i.e., male and female stereotypic orientations, respectively) and indicated their interests in starting ventures in stereotypically feminine (e.g., salon), masculine (e.g., auto-repair) and science, technology, engineering, and mathematics (STEM; e.g., software developer) ventures. Qualitative analyses demonstrated that participants ascribed agentic and, more specifically, dominance, attributes to entrepreneurs; few participants ascribed communal attributes (e.g., warmth). Bifactor structural equation modeling indicated that, as expected, agentic goal orientations included dimensions of competence, self-direction, and dominance orientations and communal goal orientations were unidimensional. Further, as expected, dominance and communal orientations partially accounted for gender differences in all three career types. We discuss implications for entrepreneurial education and practice from a goal congruity perspective and the use of bifactor modeling to improve the measurement of goal orientations.

Keywords: gender, entrepreneurship, gender stereotypes, agentic and communal goal orientations, entrepreneurship education

Procedia PDF Downloads 94
738 The Impact of Cybercrime on Youth Development in Nigeria

Authors: Christiana Ebobo

Abstract:

Cybercrime consists of numerous crimes that are perpetrated on the internet on daily basis. The forms include but not limited to Identity theft, Pretentious dating, Desktop counterfeiting, Internet chat room, Cyber harassment, Fraudulent electronic mails, Automated Teller Machine Spoofing, Pornography, Piracy, Hacking, Credit card frauds, Phishing and Spamming. The general term used among the youths for this type of crime in Nigeria is ‘Yahoo Yahoo’. Cybercrime is on the increase among the youths at all levels as such this study aims at examining the impact of cybercrime on youth development in Nigeria. The study examines the impact of cybercrime on youths’ academic performance, integrity, employment and religious practices. The study is a survey which made use of questionnaire and focus group discussion among 150 randomly selected youths in Gwagwalada LCDA, Federal Capital Territory, Nigeria. The study adopts the systems theory as its theoretical framework. The study also adopts the simple frequency table and percentage for its data analysis. The study reveals that cybercrime has eaten deep into the minds of some youths and some of them are practicing diabolic means to succeed in it. It is also reveals that majority (68%) of the respondents believe that cybercrime impacts negatively on youths’ academic performance in Nigeria. The major recommendation of this study is that cybercrime offenders should be treated like armed robbers in order to discourage other youths from getting involved in it.

Keywords: armed robber, cybercrime, integrity, youth

Procedia PDF Downloads 521
737 The Impact of Corporate Social Responsibilities on Employees’ Green Behavior: The Moderating Role of Organizational Trust

Authors: Zubair Ahmad

Abstract:

Drawing from social exchange theory, this study proposes to explore the association between corporate social responsibility as external CSR and Internal CSR with employees' green behavior. Furthermore, the author also analyzed the moderating role of organizational trust among the aforementioned associations. The target respondents for this descriptive study were employees working hotel industry of Pakistan. An online questionnaire link was sent to hotel managers and is requested to share the questionnaire link with employees. The respondents for this study were selected through the convenience sampling technique. The collected data from participants is analyzed through AMOS and SPSS. The findings show that both internal corporate social responsibility and external corporate social responsibility exert a positive and significant influence on employees' green behavior. Thus it is concluded that the key driver behind the green behavior of hotel employees is the social setting of their workplace. Findings also revealed that organizational trust plays a positive role in enhancing the green behavior of hotel employees. This study extends the literature on corporate social responsibility by exploring the boundary role of organizational trust between internal and external corporate social responsibility and employees' green behavior in hotels. Moreover, CSR activities should be performed for attaining a competitive edge and maintaining a balance between progress and sustainability of the environment.

Keywords: corporate social responsibility, internal corporate social responsibility, external corporate social responsibility, social exchange theory, employee green behavior, organizational trust

Procedia PDF Downloads 105
736 An Automated Procedure for Estimating the Glomerular Filtration Rate and Determining the Normality or Abnormality of the Kidney Stages Using an Artificial Neural Network

Authors: Hossain A., Chowdhury S. I.

Abstract:

Introduction: The use of a gamma camera is a standard procedure in nuclear medicine facilities or hospitals to diagnose chronic kidney disease (CKD), but the gamma camera does not precisely stage the disease. The authors sought to determine whether they could use an artificial neural network to determine whether CKD was in normal or abnormal stages based on GFR values (ANN). Method: The 250 kidney patients (Training 188, Testing 62) who underwent an ultrasonography test to diagnose a renal test in our nuclear medical center were scanned using a gamma camera. Before the scanning procedure, the patients received an injection of ⁹⁹ᵐTc-DTPA. The gamma camera computes the pre- and post-syringe radioactive counts after the injection has been pushed into the patient's vein. The artificial neural network uses the softmax function with cross-entropy loss to determine whether CKD is normal or abnormal based on the GFR value in the output layer. Results: The proposed ANN model had a 99.20 % accuracy according to K-fold cross-validation. The sensitivity and specificity were 99.10 and 99.20 %, respectively. AUC was 0.994. Conclusion: The proposed model can distinguish between normal and abnormal stages of CKD by using an artificial neural network. The gamma camera could be upgraded to diagnose normal or abnormal stages of CKD with an appropriate GFR value following the clinical application of the proposed model.

Keywords: artificial neural network, glomerular filtration rate, stages of the kidney, gamma camera

Procedia PDF Downloads 98
735 The Need for Implementing Building Information Modelling (BIM) and Integrated Project Delivery (IPD) in the Construction Project: A Case Study in UAE

Authors: C. W. F. Che Wan Putra, M. Alshawi, M. S. Al Ahbabi, M. Jabakhanji

Abstract:

Much of the waste that is generated throughout the life-cycle of a building is mainly related to project stakeholders not having access to information that others have created. This results in waste and high costs. Over the past decade, however, the industry reacted to these challenges by adopting effective procurement approaches, such as partnering and design and build, to improve collaboration and communication among projects’ stakeholders. Most recently, there is a focus on creating and reusing digital project information of stakeholders throughout the life-cycle to facilitate the exchange of information among partners. This shift is based around BIM (Building Information Modelling) and collaborative environment (IPD). The power of collaborative BIM goes beyond improving efficiency. Sustainability, perhaps the most important challenge for the design and construction community, is at the intersection of BIM and collaborative project delivery, drawing strength from both. Due to these benefits, a research study has been carried out to investigate the need of BIM and IPD, on a large scale construction project which is procured on a traditional approach, i.e. design-bid-build. A qualitative research work including a semi-structured interview with project partners was conducted on a typical project in the UAE, whereby the selected project suffered from severe delays and cost overrun. This paper aims to bring about clear evidence to what most likely to happen to a typical construction project in spite of employing very good consultants, project manager and contractors and how these problems could have been avoided if BIM and IPD were deployed.

Keywords: building information modelling (BIM), integrated project delivery (IPD), collaborative environment, case study

Procedia PDF Downloads 397
734 Application of Bim Model Data to Estimate ROI for Robots and Automation in Construction Projects

Authors: Brian Romansky

Abstract:

There are many practical, commercially available robots and semi-autonomous systems that are currently available for use in a wide variety of construction tasks. Adoption of these technologies has the potential to reduce the time and cost to deliver a project, reduce variability and risk in delivery time, increase quality, and improve safety on the job site. These benefits come with a cost for equipment rental or contract fees, access to specialists to configure the system, and time needed for set-up and support of the machines while in use. Calculation of the net ROI (Return on Investment) requires detailed information about the geometry of the site, the volume of work to be done, the overall project schedule, as well as data on the capabilities and past performance of available robotic systems. Assembling the required data and comparing the ROI for several options is complex and tedious. Many project managers will only consider the use of a robot in targeted applications where the benefits are obvious, resulting in low levels of adoption of automation in the construction industry. This work demonstrates how data already resident in many BIM (Building Information Model) projects can be used to automate ROI estimation for a sample set of commercially available construction robots. Calculations account for set-up and operating time along with scheduling support tasks required while the automated technology is in use. Configuration parameters allow for prioritization of time, cost, or safety as the primary benefit of the technology. A path toward integration and use of automatic ROI calculation with a database of available robots in a BIM platform is described.

Keywords: automation, BIM, robot, ROI.

Procedia PDF Downloads 83
733 Visual Template Detection and Compositional Automatic Regular Expression Generation for Business Invoice Extraction

Authors: Anthony Proschka, Deepak Mishra, Merlyn Ramanan, Zurab Baratashvili

Abstract:

Small and medium-sized businesses receive over 160 billion invoices every year. Since these documents exhibit many subtle differences in layout and text, extracting structured fields such as sender name, amount, and VAT rate from them automatically is an open research question. In this paper, existing work in template-based document extraction is extended, and a system is devised that is able to reliably extract all required fields for up to 70% of all documents in the data set, more than any other previously reported method. The approaches are described for 1) detecting through visual features which template a given document belongs to, 2) automatically generating extraction rules for a given new template by composing regular expressions from multiple components, and 3) computing confidence scores that indicate the accuracy of the automatic extractions. The system can generate templates with as little as one training sample and only requires the ground truth field values instead of detailed annotations such as bounding boxes that are hard to obtain. The system is deployed and used inside a commercial accounting software.

Keywords: data mining, information retrieval, business, feature extraction, layout, business data processing, document handling, end-user trained information extraction, document archiving, scanned business documents, automated document processing, F1-measure, commercial accounting software

Procedia PDF Downloads 127
732 Role of Adaptive Support Ventilation in Weaning of COPD Patients

Authors: A. Kamel Abd Elaziz Mohamed, B. Sameh Kamal el Maraghi

Abstract:

Introduction: Adaptive support ventilation (ASV) is an improved closed-loop ventilation mode that provides both pressure-controlled ventilation and PSV according to the patient’s needs. Aim of the work: To compare the short-term effects of Adaptive support ventilation (ASV), with conventional Pressure support ventilation (PSV) in weaning of intubated COPD patients. Patients and methods: Fifty patients admitted in the intensive care with acute exacerbation of COPD and needing intubation were included in the study. All patients were initially ventilated with control/assist control mode, in a stepwise manner and were receiving standard medical therapy. Patients were randomized into two groups to receive either ASV or PSV. Results: Out of fifty patients included in the study forty one patients in both studied groups were weaned successfully according to their ABG data and weaning indices. APACHE II score showed no significant difference in both groups. There were statistically significant differences between the groups in term of, duration of mechanical ventilation, weaning hours and length of ICU stay being shorter in (group 1) weaned by ASV. Re-intubation and mortality rate were higher in (group 11) weaned by conventional PSV, however the differences were not significant. Conclusion: ASV can provide automated weaning and achieve shorter weaning time for COPD patients hence leading to reduction in the total duration of MV, length of stay, and hospital costs.

Keywords: COPD patients, ASV, PSV, mechanical ventilation (MV)

Procedia PDF Downloads 388
731 Racism in Drug Policies: A Report on United States Legislation

Authors: Frederick Monyepao

Abstract:

Crack cocaine first appeared on the scene in the form of cocaine freebasing in the late 1970s. Stockbrokers, investment bankers, rock stars, Hollywood elites, and a few pro athletes were regular users of the substance. As criminogenic factors associated with substance abuse began to surface, congress passed new legislation. The laws led to the increase of health coverage insurances and the expansion of hospitals. By the mid-1980s, crack use spread into America's inner cities among impoverished African Americans and Latinos. While substance abuse increased among minority communities, legislation pertaining to substance abuse evolved. The prison industry also expanded the number of cells available. A qualitative approach was taken, drawing from a range secondary sources for contextual analysis. This paper traces out the continued marginalisation and racist undertones towards minorities as perpetuated by certain drug policies. It was discovered that the new legislation on crack was instrumental in the largest incarcerations the United States ever faced. Drug offenders increased in prisons eightfold from 1986 to 2000. The paper concludes that American drug control policies are consistently irrational and ineffective when measured by levels of substance use and abuse. On the contrary, these policies have been successful as agents of social control in maintaining the stratification patterns of racial/ethnic minorities and women. To move beyond prohibition, radical law and policy reform may require a change in narratives on substance use.

Keywords: crack, drug policy, minorities, racism, substance abuse

Procedia PDF Downloads 284
730 A Socio-Cultural Approach to Implementing Inclusive Education in South Africa

Authors: Louis Botha

Abstract:

Since the presentation of South Africa’s inclusive education strategy in Education White Paper 6 in 2001, very little has been accomplished in terms of its implementation. The failure to achieve the goals set by this policy document is related to teachers lacking confidence and knowledge about how to enact inclusive education, as well as challenges of inflexible curricula, limited resources in overcrowded classrooms, and so forth. This paper presents a socio-cultural approach to addressing these challenges of implementing inclusive education in the South African context. It takes its departure from the view that inclusive education has been adequately theorized and conceptualized in terms of its philosophical and ethical principles, especially in South African policy and debates. What is missing, however, are carefully theorized, practically implementable research interventions which can address the concerns mentioned above. Drawing on socio-cultural principles of learning and development and on cultural-historical activity theory (CHAT) in particular, this paper argues for the use of formative interventions which introduce appropriately constructed mediational artifacts that have the potential to initiate inclusive practices and pedagogies within South African schools and classrooms. It makes use of Vygotsky’s concept of double stimulation to show how the proposed artifacts could instigate forms of transformative agency which promote the adoption of inclusive cultures of learning and teaching.

Keywords: cultural-historical activity theory, double stimulation, formative interventions, transformative agency

Procedia PDF Downloads 231
729 Disaster Management and Resilience: A Conceptual Synthesis of Local

Authors: Oshienemen Albert, Dilanthi Amaratunga, Richard Haigh

Abstract:

Globally, disasters of any form can affect the environment, built environment, the waterways, societies, nations and communities in diverse areas. The such impacts could cut across, economic loss, social setting, cultural and livelihood structures of affected population. Thus, the raise of disaster impacts across developing nations are alarming with decades impact due to the lack of hard and soft infrastructural development across communities, inconsistency in the governmental policy and implementation, making it difficult for disaster affected communities to bounce back when necessary, especially in Nigeria. The Nigeria disasters, especially oil spillages have affected diverse communities across the Niger Delta region for decades with little or nothing as external support for the broken livelihood structure, cultural and economic damages of the people. Though, in the spirit of contribution to the communities affected by oil spill and negative consequence of petroleum production, the federal government at different times established some impressionistic bodies and agencies to oversee the affairs of the region as with regards to oil spillages and development. Thus, the agencies contributions are yet to manifest in practice. This amplifies the quest for the structural clarities of the management systems and the resilience’s of the communities, to better equip the communities for any such disaster. Therefore, the study sets to explore the Nigerian disaster management systems and resilience concept at local community level. Thus, desk-based approach and interviews are employed for the synthesis while, drawing conclusion and recommendations.

Keywords: disaster, community, management, resilience

Procedia PDF Downloads 181
728 Transformation and Integration: Iranian Women Migrants and the Use of Social Media in Australia

Authors: Azadeh Davachi

Abstract:

Although there is a growing interest in Iranian female migration and gender roles, little attention has been paid to how Iranian migrant women in Australia access and sustain social networks, both locally and spatially dispersed over time. Social network theories have much to offer an analysis of migrant’s social ties and interpersonal relationships. Thus, it is important to note that social media are not only new communication channels in a migration network but also that they actively transform the nature of these networks and thereby facilitate migration for migrants. Drawing on that, this article will focus on Iranian women migrants and the use of social media in migration in Australia. Based on the case of main social networks such as Facebook and Instagram; this paper will investigate that how women migrants use these networks to facilitate the process of migration and integration. In addition, with the use of social networks, they could promote their home business and as a result become more engaged economically in Australian society. This paper will focus on three main Iranian pages in Instagram and Facebook, they will contend that compared to men, women are more active in these social networks. Consequently, as this article will discuss with the use of these social media Iranian migrant women can become more engaged and overcome post migration hardships, thus, gender plays a key role in using social media in migrant communities. Based on these findings from these social media pages, this paper will conclude that social media are transforming migration networks and thereby lowering the threshold for migration. It also will be demonstrated that these networks boost Iranian women’s confidence and lead them to become more visible in Iranian migrant communities comparing to men.

Keywords: integration, gender, migration, women migrants

Procedia PDF Downloads 157
727 Protecting Labor Rights in the Platform Economy: Legal Challenges and Innovative Explorations

Authors: Ruwen Pei

Abstract:

In the rapidly evolving landscape of the digital economy, platform employment has emerged as a transformative labor force, fundamentally altering the traditional paradigms of the employer-employee relationship. This paper provides a comprehensive analysis of the unique dynamics and intricate legal challenges associated with platform work, where workers often navigate precarious labor conditions without the robust safety nets typically afforded in traditional industries. It underscores the limitations of current labor regulations, particularly in addressing pressing concerns such as income volatility and disparate benefits. By drawing insights from diverse global case studies, this study emphasizes the compelling need for platform companies to shoulder their social welfare responsibilities, ensuring fair treatment and security for their workers. Moreover, it critically examines the profound influence of socio-cultural factors and educational awareness on the platform economy, shedding light on the complexities of this emerging labor landscape. Advocating for a harmonious equilibrium between flexibility and security, this paper calls for substantial legal reforms and innovative policy initiatives that can adapt to the evolving nature of work in the digital age. Finally, it anticipates forthcoming trends in the digital economy and platform labor relations, underscoring the significance of proactive adaptation to foster equitable and inclusive employment practices.

Keywords: platform employment, labor protections, social welfare, legal reforms, digital economy

Procedia PDF Downloads 64
726 Community Benefitting through Tourism: DASTA-Thailand Model

Authors: Jutamas Wisansing, Thanakarn Vongvisitsin, Udom Hongchatikul

Abstract:

Designated Areas for Sustainable Tourism Administration (DASTA) is a public organization, dedicating to sustainable tourism development in 6 designated areas in Thailand. This paper provides rich reflections from a decade of DASTA, formulating an advanced model to deepen our understanding of 2 key intertwining issues; 1) what are the new landscapes of actors for community based tourism and 2) who are the benefactors and beneficiaries of tourism development within the community? An action research approach was used, enabling the process and evidence-based cases to be better captured. The aim is to build theoretical foundation through 13 communities/cases, which have engaged in community based tourism pilot projects. Drawing from emic and qualitative research, specific and contextual phenomenon provides succinct patterns of ‘Community Benefitting through Tourism (CbtT)’ model. The re-definition of the 2 key issues helps shape the interlinking of actors; practicalities of inclusive tourism and inter-sectoral framework and its value chain will also be set forth. In tourism sector, community members could be active primarily on the supply side as employees, entrepreneurs and local heritage experts. CbtT when well defined stimulates the entire value chain of local economy while promoting social innovation through positive dialogue with wider actors. Collaboration with a new set of actors who are from the tourism-related businesses and non-tourism related businesses create better impacts on mutual benefits.

Keywords: community based tourism, community benefitting through tourism -CbtT DASTA model, sustainable tourism in thailand, value chain and inclusive business

Procedia PDF Downloads 296
725 Anti-Corruption in Adverse Contexts: A Strategic Approach

Authors: Mushtaq H. Khan, Antonio Andreoni, Pallavi Roy

Abstract:

Developing countries are characterized by political settlements where formal rules are generally weakly enforced and widely violated. Conventional anti-corruption strategies that focus on improving the general enforcement of a rule of law and raising the costs of corruption facing individual public officials have typically delivered poor results in these contexts. Our alternative approach is to identify anti-corruption strategies that have a high impact and that are feasible to implement in these contexts. Our alternative approach identifies anti-corruption strategies from the bottom up. This involves identifying the characteristics of the corruption constraining particular development outcomes. By drawing on theories of rents and rent seeking, and theories of political settlements, we can assess the developmental impact of particular anti-corruption strategies and the feasibility of implementing these strategies. We argue that feasible anti-corruption in these contexts cannot be solely based on conventional anti-corruption strategies. In societies that have widespread rule violations, high-impact anti-corruption is only likely to be feasible if the overall strategy succeeds in aligning the interests and capabilities of powerful organizations at the sectoral level to support the enforcement of particular sets of rules. We examine four related strategies for changing these incentives and capabilities of critical stakeholders at the local or sectoral level, and we argue that this can provide a framework for organizing research on the impact and feasibility of anti-corruption activities in different priority areas in particular countries.

Keywords: anti-corruption, development, political settlements analysis, rule of law

Procedia PDF Downloads 413