Search results for: implement draft
774 Developmental Differences of Elementary School Children in Knowledge Acquisition Following a Sexual Abuse Prevention Program
Authors: Chrysanthi Nega, Fotini-Sonia Apergi
Abstract:
Child sexual abuse (CSA) in Greece is a highly prevalent phenomenon and yet remains largely underreported. CSA can negatively impact cognitive, emotional and psychosocial development, as well as personality formation and capacity for initiation and maintenance of healthy interpersonal relationships. It is particularly important for school-based prevention programs to be implemented early in elementary school, as they are reportedly effective in lowering abuse incidences and providing knowledge for coping in threatening environments. The purpose of the current study was to test the effectiveness of a school-based CSA prevention program (Safe-Touches) on Greek elementary school students (grades 1-3, N=272) and explore the effect of age and time of testing (academic term). There was a significant effect of age in the knowledge of Inappropriate Touch, when comparing pre and post-intervention assessments, with third graders showing greatest gains in knowledge, followed by second and first graders. Time of testing during the academic year also had a significant effect, as first graders tested later in the school year, scored higher on knowledge of Inappropriate Touch. The findings of the current study provide insight into the optimal timing to implement CSA prevention programs. Exposure to such programs and incorporation in the school curricula could largely benefit children of the Greek community in terms of safety and awareness.Keywords: child sexual abuse, Safe-Touches, school-based prevention, schooling
Procedia PDF Downloads 318773 Security as the Key Factor in Contemporary Tourism: Specificities Identified from the Analysis of Responders' Attitudes
Authors: Petar Kurecic, Josipa Penic
Abstract:
The paper represents a product of mentor-graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. The analysis was made through the anonymous questionnaire filled by the respondents from Croatia. Following the latest threatening events and having in mind those yet to come, it can be concluded that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive factors for the choice of a certain destination. Consequently, countries must not perceive security systems and measures as an unnecessary expense but as an essential element in organizing their tourist services. All hotels and respectable tourist agencies should have a crisis management, with detailed, thoroughly elaborated procedures for emergency situations. Tourists should be timely informed about the potential dangers and risks and the measures taken to prevent them, as well as on procedures for emergency situations. Additionally, it would be good to have mobile applications that would enable tourists to make direct emergency calls with instructions on behavior in crisis situations. It is also essential to implement and put into effect sophisticated security measures such as using surveillance cameras, controlling access to buildings, information exchange with colleagues and neighbors, reporting the suspicious occurrences to the security services, and training staff for crisis management. The security issue is definitely one of the crucial factors in the development of tourism in a certain country.Keywords: security, security measures in tourism, tourism, tourist destinations
Procedia PDF Downloads 281772 The Role of Online Social Networks in Social Movements: Social Polarization and Violations against Social Unity and Privacy of Individuals in Turkey
Authors: Tolga Yazıcı
Abstract:
As a matter of the fact that online social networks like Twitter, Facebook and MySpace have experienced an extensive growth in recent years. Social media offers individuals with a tool for communicating and interacting with one another. These social networks enable people to stay in touch with other people and express themselves. This process makes the users of online social networks active creators of content rather than being only consumers of traditional media. That’s why millions of people show strong desire to learn the methods and tools of digital content production and necessary communication skills. However, the booming interest in communication and interaction through online social networks and high level of eagerness to invent and implement the ways to participate in content production raise some privacy and security concerns. This presentation aims to open the assumed revolutionary, democratic and liberating nature of the online social media up for discussion by reviewing some recent political developments in Turkey. Firstly, the role of Internet and online social networks in mobilizing collective movements through social interactions and communications will be questioned. Secondly, some cases from Gezi and Okmeydanı Protests and also December 17-25 period will be presented in order to illustrate misinformation and manipulation in social media and violation of individual privacy through online social networks in order to damage social unity and stability contradictory to democratic nature of online social networking.Keywords: online social media networks, democratic participation, social movements, social polarization, privacy of individuals, Turkey
Procedia PDF Downloads 341771 Heat: A Healthy Eating Programme
Authors: Osagbai Joshua Eriki, Ngozi Agunwamba, Alice Hill, Lorna Almond, Maniya Duffy, Devashini Naidoo, David Ho, Raman Deo
Abstract:
Aims: To evaluate the baseline eating pattern in a psychiatric hospital through quantifying purchases of food and drink items at the hospital shop and to implement a traffic light healthy eating labeling system. Method: A electronic till with reporting capabilities was purchased. A two-week period of baseline data collection was conducted. Thereafter, a system for labeling items based on the nutritional value of the food items at the hospital shop was implemented. Green labeling represented the items with the lowest calories and red the most. Further data was collated on the number and types of items purchased by patients according to the category, and the initial effectiveness of the system was evaluated. Result: Despite the implementation of the traffic light system, the red category had the highest number of items purchased by patients, highlighting the importance of promoting healthy eating choices. However, the study also showed that the system was effective in promoting healthy options, as the number of items purchased from the green category increased during the study period. Conclusion: The implementation of a traffic light labeling system for items sold at the hospital shop offers a promising approach to promoting healthy eating habits and choices. This is likely to contribute to a toolkit of measures when considering the multifactorial challenges that obesity and weight issues pose for long-stay psychiatric inpatientsKeywords: mental health, nutrition, food, healthy
Procedia PDF Downloads 99770 Variability of the Snowline Altitude at Different Region in the Eastern Tibetan Plateau in Recent 20 Years
Authors: Zhen Li, Chang Liu, Ping Zhang
Abstract:
These Glaciers are thought of as natural water reservoirs and are of vital importance to hydrological models and industrial production, and glacial changes act as significant indicators of climate change. The glacier snowline can be used as an indicator of the equilibrium line, which may be a key parameter to study the effect of climate change on glaciers. Using Google Earth Engine, we select optical satellite imageries and implement the Otsu thresholding method on a near-infrared band to detect snowline altitudes (SLAs) of 26 glaciers in three regions of the eastern Tibetan Plateau. Three different study regions in the eastern Tibetan Plateau have different climate regimes, which are Sepu Kangri (SK, maritime glacier), Bu’Gyai Kangri (BK, continental glacier) and west of Qiajajima (WQ, continental glacier), along a latitudinal transect from south to north. We analyzed the effects of climatic factors on the SLA changes from 1995 to 2016. SLAs are fluctuating upward, and the rising values are 100 m, 60 m, and 34 m from south to north during the 22 years. We also observed that the climatic factor that affects the variability of SLA gradually changes from precipitation to temperature from south to north. The northern continental glaciers are mainly affected by temperature, and the southern maritime glaciers affected by precipitation. Owing to the influence of primary climatic factors, continental glaciers are found to have higher SLAs on the south slope, while maritime glaciers have higher SLAs on the north slope.Keywords: climate change, glacier, snowline altitude, tibetan plateau
Procedia PDF Downloads 150769 Efficacy of Remote Sensing Application in Monitoring the Effectiveness of Afforestation Project in Northern Nigeria
Authors: T. Garba, Y. Y. Babanyara, K. G. Ilellah, M. A. Modibbo, T. O. Quddus, M. J. Sani
Abstract:
After the United Nation Convention on Desertification (UNCD) in 1977 which was preceded by extensive, regional, and local studies, and consultations with numerous scientists, decision-makers, and relevant institutions. Global Plan of Action to Combat Desertification (PACD) was formulated, endorsed by member Countries. The role of implementing PACD was vested with Governments of countries affected by desertification. The Federal Government of Nigeria as a signatory and World Bank funded and implement afforestation project aimed at combating desertification between 1988 and 1999. This research, therefore, applied remote sensing techniques to assess the effectiveness of the project. To achieve that a small portion of about 143,609 hectares was curved out from the project area. Normalized Difference of the Vegetative Index (NDVI) and Land Use Land Cover were derived from Landsat TM 1986, Landsat ETM 1999 and Nigeria Sat 1, 2007 of the project area. The findings show that there was an increase in cultivated area due to the project from 1986 through 1999 and 2007. This is further buttressed by the three NDVI imageries due to their high positive pixel value from 0.04 in 1986 to 0.22 in 1999 and to 0.32 in 2007 These signifies the gradual physical development of Afforestation project in the area. In addition, it was also verified by histograms of changes in vegetation which indicated an increased vegetative cover from 60,192 in 1986, to 102,476 in 1999 and then to 88,343 in 2007. The study concluded that Remote Sensing approach has actually confirmed that the project was indeed successful and effective.Keywords: afforestation, desertification, landsat, vegetative index, remote sensing
Procedia PDF Downloads 316768 Work in the Industry of the Future-Investigations of Human-Machine Interactions
Authors: S. Schröder, P. Ennen, T. Langer, S. Müller, M. Shehadeh, M. Haberstroh, F. Hees
Abstract:
Since a bit over a year ago, Festo AG and Co. KG, Festo Didactic SE, robomotion GmbH, the researchers of the Cybernetics-Lab IMA/ZLW and IfU, as well as the Human-Computer Interaction Center at the RWTH Aachen University, have been working together in the focal point of assembly competences to realize different scenarios in the field of human-machine interaction (HMI). In the framework of project ARIZ, questions concerning the future of production within the fourth industrial revolution are dealt with. There are many perspectives of human-robot collaboration that consist Industry 4.0 on an individual, organization and enterprise level, and these will be addressed in ARIZ. The aim of the ARIZ projects is to link AI-Approaches to assembly problems and to implement them as prototypes in demonstrators. To do so, island and flow based production scenarios will be simulated and realized as prototypes. These prototypes will serve as applications of flexible robotics as well as AI-based planning and control of production process. Using the demonstrators, human interaction strategies will be examined with an information system on one hand, and a robotic system on the other. During the tests, prototypes of workspaces that illustrate prospective production work forms will be represented. The human being will remain a central element in future productions and will increasingly be in charge of managerial tasks. Questions thus arise within the overall perspective, primarily concerning the role of humans within these technological revolutions, as well as their ability to act and design respectively to the acceptance of such systems. Roles, such as the 'Trainer' of intelligent systems may become a possibility in such assembly scenarios.Keywords: human-machine interaction, information technology, island based production, assembly competences
Procedia PDF Downloads 206767 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems
Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu
Abstract:
Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system
Procedia PDF Downloads 297766 A Prediction Model Using the Price Cyclicality Function Optimized for Algorithmic Trading in Financial Market
Authors: Cristian Păuna
Abstract:
After the widespread release of electronic trading, automated trading systems have become a significant part of the business intelligence system of any modern financial investment company. An important part of the trades is made completely automatically today by computers using mathematical algorithms. The trading decisions are taken almost instantly by logical models and the orders are sent by low-latency automatic systems. This paper will present a real-time price prediction methodology designed especially for algorithmic trading. Based on the price cyclicality function, the methodology revealed will generate price cyclicality bands to predict the optimal levels for the entries and exits. In order to automate the trading decisions, the cyclicality bands will generate automated trading signals. We have found that the model can be used with good results to predict the changes in market behavior. Using these predictions, the model can automatically adapt the trading signals in real-time to maximize the trading results. The paper will reveal the methodology to optimize and implement this model in automated trading systems. After tests, it is proved that this methodology can be applied with good efficiency in different timeframes. Real trading results will be also displayed and analyzed in order to qualify the methodology and to compare it with other models. As a conclusion, it was found that the price prediction model using the price cyclicality function is a reliable trading methodology for algorithmic trading in the financial market.Keywords: algorithmic trading, automated trading systems, financial markets, high-frequency trading, price prediction
Procedia PDF Downloads 184765 Food Safety and Quality Assurance and Skills Development among Farmers in Georgia
Authors: Kakha Nadiardze, Nana Phirosmanashvili
Abstract:
The goal of this paper is to present the problems of lack of information among farmers in food safety. Global food supply chains are becoming more and more diverse, making traceability systems much harder to implement across different food markets. In this abstract, we will present our work for analyzing the key developments in Georgian food market from regulatory controls to administrative procedures to traceability technologies. Food safety and quality assurance are most problematic issues in Georgia as food trade networks become more and more complex, food businesses are under more and more pressure to ensure that their products are safe and authentic. The theme follow-up principles from farm to table must be top-of-mind for all food manufacturers, farmers and retailers. Following the E. coli breakout last year, as well as more recent cases of food mislabeling, developments in food traceability systems is essential to food businesses if they are to present a credible brand image. Alongside this are the ever-developing technologies in food traceability networks, technologies that manufacturers and retailers need to be aware of if they are to keep up with food safety regulations and avoid recall. How to examine best practice in food management is the main question in order to protect company brand through safe and authenticated food. We are working with our farmers to work with our food safety experts and technology developers throughout the food supply chain. We provide time by time food analyses on heavy metals, pesticide residues and different pollutants. We are disseminating information among farmers how the latest food safety regulations will impact the methods to use to identify risks within their products.Keywords: food safety, GMO, LMO, E. coli, quality
Procedia PDF Downloads 514764 The Network Relative Model Accuracy (NeRMA) Score: A Method to Quantify the Accuracy of Prediction Models in a Concurrent External Validation
Authors: Carl van Walraven, Meltem Tuna
Abstract:
Background: Network meta-analysis (NMA) quantifies the relative efficacy of 3 or more interventions from studies containing a subgroup of interventions. This study applied the analytical approach of NMA to quantify the relative accuracy of prediction models with distinct inclusion criteria that are evaluated on a common population (‘concurrent external validation’). Methods: We simulated binary events in 5000 patients using a known risk function. We biased the risk function and modified its precision by pre-specified amounts to create 15 prediction models with varying accuracy and distinct patient applicability. Prediction model accuracy was measured using the Scaled Brier Score (SBS). Overall prediction model accuracy was measured using fixed-effects methods that accounted for model applicability patterns. Prediction model accuracy was summarized as the Network Relative Model Accuracy (NeRMA) Score which ranges from -∞ through 0 (accuracy of random guessing) to 1 (accuracy of most accurate model in concurrent external validation). Results: The unbiased prediction model had the highest SBS. The NeRMA score correctly ranked all simulated prediction models by the extent of bias from the known risk function. A SAS macro and R-function was created to implement the NeRMA Score. Conclusions: The NeRMA Score makes it possible to quantify the accuracy of binomial prediction models having distinct inclusion criteria in a concurrent external validation.Keywords: prediction model accuracy, scaled brier score, fixed effects methods, concurrent external validation
Procedia PDF Downloads 236763 Transforming ESL Teaching and Learning with ICT
Authors: Helena Sit
Abstract:
Developing skills in using ICT in the language classroom has been discussed at all educational levels. Digital tools and learning management systems enable teachers to transform their instructional activities while giving learners the opportunity to engage with virtual communities. In the field of English as a second language (ESL) teaching and learning, the use of technology-enhanced learning and diverse pedagogical practices continues to grow. Whilst technology and multimodal learning is a way of the future for education, second language teachers now face the predicament as to whether implementing these newer ways of learning is, in fact, beneficial or disadvantageous to learners. Research has shown that integrating multimodality and technology can improve students’ engagement and participation in their English language learning. However, students can experience anxiety or misunderstanding when engaging with E-learning or digital-mediated learning. This paper aims to explore how ESL teaching and learning are transformed via the use of educational technology and what impact it has had on student teachers. Case study is employed in this research. The study reviews the growing presence of technology and multimodality in university language classrooms, discusses their impact on teachers’ pedagogical practices, and proposes scaffolding strategies to help design effective English language courses in the Australian education context. The study sheds light on how pedagogical integration today may offer a way forward for language teachers of tomorrow and provides implications to implement an evidence-informed approach that blends knowledge from research, practice and people experiencing the practice in the digital era.Keywords: educational technology, ICT in higher education, curriculum design and innovation, teacher education, multiliteracies pedagogy
Procedia PDF Downloads 79762 The Impact of Equine-Assisted Therapy on Occupational Engagement for Children with Intellectual and/or Developmental Disabilities: From the Perspectives of the Children and Their Caregivers
Authors: Morgan Dempsey, Sam Lewis, Maggie Pierce, Alex Goodman
Abstract:
This research investigates the impact of equine-assisted therapy programs on occupational engagement for children with intellectual and developmental disabilities. There is a general lack of evidence for equine-based services for this population, so this research aims to decrease gaps in the current literature. To gain comprehensive insight, data will be collected from both the child and their caregiver. This study takes a qualitative approach utilizing online surveys and in-person guided interviews. The participants are individuals ages 4-17 with a diagnosed intellectual or developmental disability who are currently participating in a PATH int. certified equine-assisted therapy program. Also, caregivers of individuals who meet this criterion are included. This study decreases gaps in the literature by providing comprehensive data regarding the impacts of these services on occupational engagement. The addressed domains are physical, behavioral, emotional, and social functioning, as well as overall activity engagement and impacts in everyday life. With a better understanding of how equine-assisted therapy affects relevant outcomes for children with disabilities, an increased number of occupational therapists can implement these uniquely effective services while adhering to standards of evidence-based practice. Ultimately, this research strives to contribute to generalizable data in occupational therapy by supporting the implementation of equine-assisted services for children with intellectual and/or developmental disabilities and their caregivers/families.Keywords: occupational therapy, pediatric, rehabilitation, hippotherapy
Procedia PDF Downloads 36761 Reimagine and Redesign: Augmented Reality Digital Technologies and 21st Century Education
Authors: Jasmin Cowin
Abstract:
Augmented reality digital technologies, big data, and the need for a teacher workforce able to meet the demands of a knowledge-based society are poised to lead to major changes in the field of education. This paper explores applications and educational use cases of augmented reality digital technologies for educational organizations during the Fourth Industrial Revolution. The Fourth Industrial Revolution requires vision, flexibility, and innovative educational conduits by governments and educational institutions to remain competitive in a global economy. Educational organizations will need to focus on teaching in and for a digital age to continue offering academic knowledge relevant to 21st-century markets and changing labor force needs. Implementation of contemporary disciplines will need to be embodied through learners’ active knowledge-making experiences while embracing ubiquitous accessibility. The power of distributed ledger technology promises major streamlining for educational record-keeping, degree conferrals, and authenticity guarantees. Augmented reality digital technologies hold the potential to restructure educational philosophies and their underpinning pedagogies thereby transforming modes of delivery. Structural changes in education and governmental planning are already increasing through intelligent systems and big data. Reimagining and redesigning education on a broad scale is required to plan and implement governmental and institutional changes to harness innovative technologies while moving away from the big schooling machine.Keywords: fourth industrial revolution, artificial intelligence, big data, education, augmented reality digital technologies, distributed ledger technology
Procedia PDF Downloads 277760 Experimental Characterization of Anti-Icing System and Accretion of Re-Emitted Droplets on Turbojet Engine Blades
Authors: Guillaume Linassier, Morgan Balland, Hugo Pervier, Marie Pervier, David Hammond
Abstract:
Atmospheric icing for turbojet is caused by ingestion of super-cooled water droplets. To prevent operability risks, manufacturer can implement ice protection systems. Thermal systems are commonly used for this purpose, but their activation can cause the formation of a water liquid film, that can freeze downstream the heated surface or even on other components. In the framework of STORM, a European project dedicated to icing physics in turbojet engines, a cascade rig representative of engine inlet blades was built and tested in an icing wind tunnel. This mock-up integrates two rows of blades, the upstream one being anti-iced using an electro-thermal device the downstream one being unheated. Under icing conditions, the anti-icing system is activated and set at power level to observe a liquid film on the surface and droplet re-emission at the trailing edge. These re-emitted droplets will impinge on the downstream row and contribute to ice accretion. A complete experimental database was generated, including the characterization of ice accretion shapes, and the characterization of electro-thermal anti-icing system (power limit for apparition of the runback water or ice accretion). These data will be used for validation of numerical tools for modeling thermal anti-icing systems in the scope of engine application, as well as validation of re-emission droplets model for stator parts.Keywords: turbomachine, anti-icing, cascade rig, runback water
Procedia PDF Downloads 182759 Present and Future of Micromobility in the City of Medellin
Authors: Saul Emilio Rivero Mejia, Estefanya Marin Tabares, Carlos Andres Rodriguez Toro, Katherine Bolano Restrepo, Sarita Santa Cortes
Abstract:
Medellin is the Colombian city with the best public transportation system in the country, which is composed of two subway lines, five metro cables, two Bus Rapid Transit lines, and a streetcar. But despite the above, the Aburra Valley, the area in which the city is located, comparatively speaking, has a lower number of urban roads per inhabitant built, compared to the national average. In addition, since there is approximately one vehicle for every three inhabitants in Medellin, the problems of congestion and environmental pollution have become more acute over the years, and it has even been necessary to implement restrictive measures to the use of private vehicles on a permanent basis. In that sense, due to the limitations of physical space, the low public investment in road infrastructure, it is necessary to opt for mobility alternatives according to the above. Within the options for the city, there is what is known as micromobility. Micromobility is understood as those small and light means of transport used to travel short distances, which use electrical energy, such as skateboards and bicycles. These transport alternatives have a high potential for use by the city's young population, but this requires an adequate infrastructure and also state regulation. Taking into account the above, this paper will analyze the current state and future of micro mobility in the city of Medellin, making a prospective analysis, supported by a PEST (political, economic, social and technological) analysis. Based on the above, it is expected to identify the growth of demand for these alternative means and its impact on the mobility of the city in the medium and short term.Keywords: electric, micromobility, transport, sustainable
Procedia PDF Downloads 125758 Implementation of Lean Production in Business Enterprises: A Literature-Based Content Analysis of Implementation Procedures
Authors: P. Pötters, A. Marquet, B. Leyendecker
Abstract:
The objective of this paper is to investigate different implementation approaches for the implementation of Lean production in companies. Furthermore, a structured overview of those different approaches is to be made. Therefore, the present work is intended to answer the following research question: What differences and similarities exist between the various systematic approaches and phase models for the implementation of Lean Production? To present various approaches for the implementation of Lean Production discussed in the literature, a qualitative content analysis was conducted. Within the framework of a qualitative survey, a selection of texts dealing with lean production and its introduction was examined. The analysis presents different implementation approaches from the literature, covering the descriptive aspect of the study. The study also provides insights into similarities and differences among the implementation approaches, which are drawn from the analysis of latent text contents and author interpretations. In this study, the focus is on identifying differences and similarities among systemic approaches for implementing Lean Production. The research question takes into account the main object of consideration, objectives pursued, starting point, procedure, and endpoint of the implementation approach. The study defines the concept of Lean Production and presents various approaches described in literature that companies can use to implement Lean Production successfully. The study distinguishes between five systemic implementation approaches and seven phase models to help companies choose the most suitable approach for their implementation project. The findings of this study can contribute to enhancing transparency regarding the existing approaches for implementing Lean Production. This can enable companies to compare and contrast the available implementation approaches and choose the most suitable one for their specific project.Keywords: implementation, lean production, phase models, systematic approaches
Procedia PDF Downloads 104757 Islamic Credit Risk Management in Murabahah Financing: The Study of Islamic Banking in Malaysia
Authors: Siti Nor Amira Bt. Mohamad, Mohamad Yazis B. Ali Basah, Muhammad Ridhwan B. Ab. Aziz, Khairil Faizal B. Khairi, Mazlynda Bt. Md. Yusuf, Hisham B. Sabri
Abstract:
The understanding of risk and the concept of it occurs associated in Islamic financing was well-known in the financial industry by the using of Profit-and-Loss Sharing (PLS). It was presently in any Islamic financial transactions in order to comply with shariah rules. However, the existence of risk in Murabahah contract of financing is an ability that the counterparty is unable to complete its obligations within the agreed terms. Therefore, it is called as credit or default risk. Credit risk occurs when the client fails to make timely payment after the bank makes complete delivery of assets. Thus, it affects the growth of the bank as the banking business is in no position to have appropriate measures to cover the risk. Therefore, the bank may impose penalty on the outstanding balance. This paper aims to highlight the credit risk determinant and issues surrounding in Islamic bank in Malaysia in terms of Murabahah financing and how to manage it by using the proper techniques. Finally, it explores the credit risk management concept that might solve the problems arise. The study found that the credit risk can be managed properly by improving the use of comprehensive reference checklist of business partners on their character and past performance as well as their comprehensive database. Besides that, prevention of credit risk can be done by using collateral as security against the risk and we also argue on the Shariah guidelines and procedures should be implement coherently by the banking business because so that the risk would be control by having an effective instrument for Islamic modes of financing.Keywords: Islamic banking, credit risk, Murabahah financing, risk mitigation
Procedia PDF Downloads 456756 Study on Mitigation Measures of Gumti Hydro Power Plant Using Analytic Hierarchy Process and Concordance Analysis Techniques
Authors: K. Majumdar, S. Datta
Abstract:
Electricity is recognized as fundamental to industrialization and improving the quality of life of the people. Harnessing the immense untapped hydropower potential in Tripura region opens avenues for growth and provides an opportunity to improve the well-being of the people of the region, while making substantial contribution to the national economy. Gumti hydro power plant generates power to mitigate the crisis of power in Tripura, India. The first unit of hydro power plant (5 MW) was commissioned in June 1976 & another two units of 5 MW was commissioned simultaneously. But out of 15 MW capacity at present only 8-9 MW power is produced from Gumti hydro power plant during rainy season. But during lean season the production reduces to 0.5 MW due to shortage of water. Now, it is essential to implement some mitigation measures so that the further atrocities can be prevented and originality will be possible to restore. The decision making ability of the Analytic Hierarchy Process (AHP) and Concordance Analysis Techniques (CAT) are utilized to identify the better decision or solution to the present problem. Some related attributes are identified by the method of surveying within the experts and the available reports and literatures. Similar criteria are removed and ultimately seven relevant ones are identified. All the attributes are compared with each other and rated accordingly to their importance over the other with the help of Pair wise Comparison Matrix. In the present investigation different mitigation measures are identified and compared to find the best suitable alternative which can solve the present uncertainties involving the existence of the Gumti Hydro Power Plant.Keywords: concordance analysis techniques, analytic hierarchy process, hydro power
Procedia PDF Downloads 354755 Approaching In vivo Dosimetry for Kilovoltage X-Ray Radiotherapy
Authors: Rodolfo Alfonso, David Alonso, Albin Garcia, Jose Luis Alonso
Abstract:
Recently a new kilovoltage radiotherapy unit model Xstrahl 200 - donated to the INOR´s Department of Radiotherapy (DR-INOR) in the framework of a IAEA's technical cooperation project- has been commissioned. This unit is able to treat shallow and low deep laying lesions, as it provides 8 discrete beam qualities, from 40 to 200 kV. As part of the patient-specific quality assurance program established at DR-INOR for external beam radiotherapy, it has been recommended to implement in vivo dose measurements (IVD), as they allow effectively discovering eventual errors or failures in the radiotherapy process. For that purpose a radio-photoluminescence (RPL) dosimetry system, model XXX, -also donated to DR-INOR by the same IAEA project- has been studied and commissioned. Main dosimetric parameters of the RPL system, such as reproducibility, linearity, and filed size influence were assessed. In a similar way, the response of radiochromic EBT3 type film was investigated for purposes of IVD. Both systems were calibrated in terms of entrance surface dose. Results of the dosimetric commissioning of RPL and EBT3 for IVD, and their pre-clinical implementation through end-to-end test cases are presented. The RPL dosimetry seems more recommendable for hyper-fractionated schemes with larger fields and curved patient contours, as those in chest wall irradiations, where the use of more than one dosimeter could be required. The radiochromic system involves smaller corrections with field size, but it sensibility is lower; hence it is more adequate for hypo-fractionated treatments with smaller fields.Keywords: glass dosimetry, in vivo dosimetry, kilovotage radiotherapy, radiochromic dosimetry
Procedia PDF Downloads 398754 Innovations in International Trauma Education: An Evaluation of Learning Outcomes and Community Impact of a Guyanese trauma Training Graduate Program
Authors: Jeffrey Ansloos
Abstract:
International trauma education in low and emerging economies requires innovative methods for capacity building in existing social service infrastructures. This study details the findings of a program evaluation used to assess the learning outcomes and community impact of an international trauma-focused graduate degree program in Guyana. Through a collaborative partnership between Lesley University, the Government of Guyana, and UNICEF, a 2-year low-residency masters degree graduate program in trauma-focused assessment, intervention, and treatment was piloted with a cohort of Guyanese mental health professionals. Through an analytical review of the program development, as well as qualitative data analysis of participant interviews and focus-groups, this study will address the efficacy of the programming in terms of preparedness of professionals to understand, evaluate and implement trauma-informed practices across various child, youth, and family mental health service settings. Strengths and limitations of this international trauma-education delivery model will be discussed with particular emphasis on the role of capacity-building interventions, community-based participatory curriculum development, innovative technological delivery platforms, and interdisciplinary education. Implications for further research and subsequent program development will be discussed.Keywords: mental health promotion, global health promotion, trauma education, innovations in education, child, youth, mental health education
Procedia PDF Downloads 367753 Tea (Camellia sinensis (L.) O. Kuntze) Typology in Kenya: A Review
Authors: Joseph Kimutai Langat
Abstract:
Tea typology is the science of classifying tea. This study was carried out between November 2023 and July 2024, whose main objective was to investigate the typological classification nomenclature of processed tea in the world, narrowing down to Kenya. Centres of origin, historical background, tea growing region, scientific naming system, market, fermentation levels, processing/ oxidation levels and cultural reasons are used to classify tea at present. Of these, the most common typology is by oxidation, and more specifically, by the production methods within the oxidation categories. While the Asian tea producing countries categorises tea products based on the decreasing oxidation levels during the manufacturing process: black tea, green tea, oolong tea and instant tea, Kenya’s tea typology system is based on the degree of fermentation process, i.e. black tea, purple tea, green tea and white tea. Tea is also classified into five categories: black tea, green tea, white tea, oolong tea, and dark tea. Black tea is the main tea processed and exported in Kenya, manufactured mainly by withering, rolling, or by use of cutting-tearing-curling (CTC) method that ensures efficient conversion of leaf herbage to made tea, oxidizing, and drying before being sorted into different grades. It is from these varied typological methods that this review paper concludes that different regions of the world use different classification nomenclature. Therefore, since tea typology is not standardized, it is recommended that a global tea regulator dealing in tea classification be created to standardize tea typology, with domestic in-country regulatory bodies in tea growing countries accredited to implement the global-wide typological agreements and resolutions.Keywords: classification, fermentation, oxidation, tea, typology
Procedia PDF Downloads 40752 Assessment of Green Infrastructure for Sustainable Urban Water Management
Authors: Suraj Sharma
Abstract:
Green infrastructure (GI) offers a contemporary approach for reducing the risk of flooding, improve water quality, and harvesting stormwater for sustainable use. GI promotes landscape planning to enhance sustainable development and urban resilience. However, the existing literature is lacking in ensuring the comprehensive assessment of GI performance in terms of ecosystem function and services for social, ecological, and economical system resilience. We propose a robust indicator set and fuzzy comprehensive evaluation (FCE) for quantitative and qualitative analysis for sustainable water management to assess the capacity of urban resilience. Green infrastructure in urban resilience water management system (GIUR-WMS) supports decision-making for GI planning through scenario comparisons with urban resilience capacity index. To demonstrate the GIUR-WMS, we develop five scenarios for five sectors of Chandigarh (12, 26, 14, 17, and 34) to test common type of GI (rain barrel, rain gardens, detention basins, porous pavements, and open spaces). The result shows the open spaces achieve the highest green infrastructure urban resilience index of 4.22/5. To implement the open space scenario in urban sites, suitable vacant can be converted to green spaces (example: forest, low impact recreation areas, and detention basins) GIUR-WMS is easy to replicate, customize and apply to cities of different sizes to assess environmental, social and ecological dimensions.Keywords: green infrastructure, assessment, urban resilience, water management system, fuzzy comprehensive evaluation
Procedia PDF Downloads 143751 The Role of Information and Communication Technology to Enhance Transparency in Public Funds Management in the DR Congo
Authors: Itulelo Matiyabu Imaja, Manoj Maharaj, Patrick Ndayizigamiye
Abstract:
Lack of transparency in public funds management is observed in many African countries. The DR Congo is among the most corrupted countries in Africa, and this is due mainly to lack of transparency and accountability in public funds management. Corruption has a negative effect on the welfare of the country’s citizens and the national economic growth. Public funds collection and allocation are the major areas whereby malpractices such as bribe, extortion, embezzlement, nepotism and other practices related to corruption are prevalent. Hence, there is a need to implement strong mechanisms to enforce transparency in public funds management. Many researchers have suggested some control mechanisms in curbing corruption in public funds management focusing mainly on law enforcement and administrative reforms with little or no insight on the role that ICT can play in preventing and curbing the corrupt behaviour. In the Democratic Republic of Congo (DRC), there are slight indications that the government of the DR Congo is integrating ICT to fight corruption in public funds collection and allocation. However, such government initiatives are at an infancy stage, with no tangible evidence on how ICT could be used effectively to address the issue of corruption in the context of the country. Hence, this research assesses the role that ICT can play for transparency in public funds management and suggest a framework for its adoption in the Democratic Republic of Congo. This research uses the revised Capability model (Capability, Empowerment, Sustainability model) as the guiding theoretical framework. The study uses the exploratory design methodology coupled with a qualitative approach to data collection and purposive sampling as sampling strategy.Keywords: corruption, DR congo, ICT, management, public funds, transparency
Procedia PDF Downloads 349750 Mass Customization of Chemical Protective Clothing
Authors: Eugenija Strazdiene, Violeta Bytautaite, Daivute Krisciuniene
Abstract:
The object of the investigation is the suit for chemical protection, which totally covers human body together with breathing apparatus, breathing mask and helmet (JSC Ansell Protective Solutions Lithuania). The end users of such clothing are the members of rescue team – firefighters. During the presentation, the results of 3D scanning with stationary Human Solutions scanner and portable Artec Eva scanner will be compared on the basis of the efficiency of scanning procedure and scanning accuracy. Also, the possibilities to exporting scanned bodies into specialized CAD systems for suit design development and material consumption calculation will be analyzed. The necessity to understand and to implement corresponding clothing material properties during 3D visualization of garment on CAD systems will be presented. During the presentation, the outcomes of the project ‘Smart and Safe Work Wear Clothing SWW’ will be discussed. The project is carried out under the Interreg Baltic Sea Region Program as 2014-2020 European territorial cooperation objective. Thematic priority is Capacity for Innovation. The main goal of the project is to improve competitiveness and to increase business possibilities for work wear enterprises in the Baltic Sea Region. The project focuses on mass customization of products for various end users. It engages textile and clothing manufacturing technology researchers, work wear producers, end users, as well as national textile and clothing branch organizations in Finland, Lithuania, Latvia, Estonia and Poland.Keywords: CAD systems, mass customization, 3D scanning, safe work wear
Procedia PDF Downloads 202749 From Dissection to Diagnosis: Integrating Radiology into Anatomy Labs for Medical Students
Authors: Julia Wimmers-Klick
Abstract:
At the Canadian University of British Columbia's Faculty of Medicine, anatomy has traditionally been taught through a combination of lectures and dissection labs in the first two years, with radiology taught separately through lectures and online modules. However, this separation may leave students underprepared for medical practice, as medical imaging is essential for diagnosing anatomical and pathological conditions. To address this, a pilot project was initiated aimed at integrating radiological imaging into anatomy dissection labs from day one of medical school. The incorporated radiological images correlated with the current dissection areas. Additional stations were added within the lab, tailored to the specific content being covered. These stations focused on bones, and quiz questions, along with light-box exercises using radiographs, CT scans, and MRIs provided by the radiology department. The images used were free of pathologies. Examples of these will be presented in the poster. Feedback from short interviews with students and instructors has been positive, particularly among second-year students who appreciated the integration compared to their first-year experience. This low-budget approach was easy to implement but faced challenges, as lab instructors were not radiologists and occasionally struggled to answer students' questions. Instructors expressed a desire for basic training or a refresher course in radiology image reading, particularly focused on identifying healthy landmarks. Overall, all participants agreed that integrating radiology with anatomy reinforces learning during dissection, enhancing students' understanding and preparation for clinical practice.Keywords: quality improvement, radiology education, anatomy education, integration
Procedia PDF Downloads 10748 An Experimental Study of Self-Regulated Learning with High School Gifted Pupils
Authors: Prakash Singh
Abstract:
Research studies affirm the view that gifted pupils are endowed with unique personality traits, enabling them to study at higher levels of thinking, at a faster pace, and with a greater degree of autonomy than their average counterparts. The focus of this study was whether high school gifted pupils are capable of studying an advanced level curriculum on their own by employing self-regulated learning (SRL) strategies. To be self-regulated, pupils are required to be metacognitively, motivationally, and behaviourally active participants in their own learning processes so that they are able to initiate and direct their personal curriculum efforts to acquire cognitive skills and knowledge, instead of being solely reliant on their teachers. Researchers working with gifted populations concede that limited studies have been conducted thus far to examine gifted pupils’ expertise in using SRL strategies to assume ownership of their learning. In order to conduct this investigation, an enriched module in Accounting for specifically gifted grade eleven pupils was developed, incorporating advanced level content, and use was made of the Post-test-Only Control Group Design to accomplish this research objective. The results emanating from this empirical study strongly suggest that SRL strategies can be employed to overcome a narrow, rigid approach that limits the education of gifted pupils in the regular classroom of the high school. SRL can meaningfully offer an alternative way to implement an advanced level curriculum for the gifted in the mainstream of education. This can be achieved despite the limitations of differentiation in the regular classroom.Keywords: advanced level curriculum, high school gifted pupils, self-regulated learning, teachers’ professional competencies
Procedia PDF Downloads 402747 Safe Zone: A Framework for Detecting and Preventing Drones Misuse
Authors: AlHanoof A. Alharbi, Fatima M. Alamoudi, Razan A. Albrahim, Sarah F. Alharbi, Abdullah M Almuhaideb, Norah A. Almubairik, Abdulrahman Alharby, Naya M. Nagy
Abstract:
Recently, drones received a rapid interest in different industries worldwide due to its powerful impact. However, limitations still exist in this emerging technology, especially privacy violation. These aircrafts consistently threaten the security of entities by entering restricted areas accidentally or deliberately. Therefore, this research project aims to develop drone detection and prevention mechanism to protect the restricted area. Until now, none of the solutions have met the optimal requirements of detection which are cost-effectiveness, high accuracy, long range, convenience, unaffected by noise and generalization. In terms of prevention, the existing methods are focusing on impractical solutions such as catching a drone by a larger drone, training an eagle or a gun. In addition, the practical solutions have limitations, such as the No-Fly Zone and PITBULL jammers. According to our study and analysis of previous related works, none of the solutions includes detection and prevention at the same time. The proposed solution is a combination of detection and prevention methods. To implement the detection system, a passive radar will be used to properly identify the drone against any possible flying objects. As for the prevention, jamming signals and forceful safe landing of the drone integrated together to stop the drone’s operation. We believe that applying this mechanism will limit the drone’s invasion of privacy incidents against highly restricted properties. Consequently, it effectively accelerates drones‘ usages at personal and governmental levels.Keywords: detection, drone, jamming, prevention, privacy, RF, radar, UAV
Procedia PDF Downloads 211746 Bridging Biomedical Engineering Bachelor's Degree Programs in Saudi Arabia: A Study Case of Riyadh College of Technology
Authors: Hamad Albadr
Abstract:
With a rapid influence to sustain the needs for global trends that had arisen for the increasing complexities in health-care provision, the increasing number of health professionals at different levels, and the need to assure more equitable access to health care, the great variation in the levels of initial education for health care professional around the world had been assign bachelor's degree as the minimum point of entry to the health professions. This intent had affected all the health care professions including biomedical engineering. In Saudi Arabia, these challenges add more pressure to retain the global trends for associate degree graduates to upgrade their education to the bachelor's degree or called birding. This paper is to review the reality of biomedical technology programs that offered in Saudi Arabia by Technical Colleges or Community Colleges nationwide and the challenges that face these colleges to run such bridging program to achieve the Bachelor's degree in biomedical engineering and the official requirements by the Ministry of Higher Education and to maintain the international standards. The author will use strategic planning methodology for designing the biomedical engineering bridging of bachelor's program by reviewing the responsibilities of the biomedical engineers in hospitals through their job descriptions to determine the job assessment needs in advance to Developing a Curriculum (DACUM) through Instructional System Design (ISD) approach via five steps: Analysis, Design, Development, Implement, Evaluate (ADDIE).Keywords: bachelor's degree bridging, biomedical engineering program, Saudi Arabia, Riyadh College of Technology
Procedia PDF Downloads 488745 Simulation of Utility Accrual Scheduling and Recovery Algorithm in Multiprocessor Environment
Authors: A. Idawaty, O. Mohamed, A. Z. Zuriati
Abstract:
This paper presents the development of an event based Discrete Event Simulation (DES) for a recovery algorithm known Backward Recovery Global Preemptive Utility Accrual Scheduling (BR_GPUAS). This algorithm implements the Backward Recovery (BR) mechanism as a fault recovery solution under the existing Time/Utility Function/ Utility Accrual (TUF/UA) scheduling domain for multiprocessor environment. The BR mechanism attempts to take the faulty tasks back to its initial safe state and then proceeds to re-execute the affected section of the faulty tasks to enable recovery. Considering that faults may occur in the components of any system; a fault tolerance system that can nullify the erroneous effect is necessary to be developed. Current TUF/UA scheduling algorithm uses the abortion recovery mechanism and it simply aborts the erroneous task as their fault recovery solution. None of the existing algorithm in TUF/UA scheduling domain in multiprocessor scheduling environment have considered the transient fault and implement the BR mechanism as a fault recovery mechanism to nullify the erroneous effect and solve the recovery problem in this domain. The developed BR_GPUAS simulator has derived the set of parameter, events and performance metrics according to a detailed analysis of the base model. Simulation results revealed that BR_GPUAS algorithm can saved almost 20-30% of the accumulated utilities making it reliable and efficient for the real-time application in the multiprocessor scheduling environment.Keywords: real-time system (RTS), time utility function/ utility accrual (TUF/UA) scheduling, backward recovery mechanism, multiprocessor, discrete event simulation (DES)
Procedia PDF Downloads 306