Search results for: internet pornography consumption
4086 News Reading Practices: Traditional Media versus New Media
Authors: Nuran Öze
Abstract:
People always want to be aware of what is happening around them. The nature of man constantly triggers the need for gathering information because of curiosity. The media has emerged to save people the need for information. It is known that the media has changed with the technological developments over time, diversified and, people's information needs are provided in different ways. Today, the Internet has become an integral part of everyday life. The invasion of the Internet into everyday life practices at this level affects every aspect of life. These effects cause people to change their life practices. Technological developments have always influenced of people, the way they reach information. Looking at the history of the media, the breaking point about the dissemination of information is seen as the invention of the machine of the printing press. This adventure that started with written media has now become a multi-dimensional structure. Written, audio, visual media has now changed shape with new technologies. Especially emerging of the internet to everyday life, of course, has effects on media field. 'New media' has appeared which contains most of traditional media features in its'. While in the one hand this transformation enables captures a harmony between traditional and new media, on the other hand, new media and traditional media are rivaling each other. The purpose of this study is to examine the problematic relationship between traditional media and new media through the news reading practices of individuals. This study can be evaluated as a kind of media sociology. To reach this aim, two different field researches will be done besides literature review. The research will be conducted in Northern Cyprus. Northern Cyprus Northern Cyprus is located in the Mediterranean Sea. North Cyprus is a country which is not recognized by any country except Turkey. Despite this, takes its share from all technological developments take place in the world. One of the field researches will consist of the questionnaires to be applied on media readers' news reading practices. This survey will be conducted in a social media environment. The second field survey will be conducted in the form of interviews with general editorials or news directors in traditional media. In the second field survey, in-depth interview method will be applied. As a result of these investigations, supporting sides between the new media and the traditional media and directions which contrast with each other will be revealed. In addition to that, it will try to understand the attitudes and perceptions of readers about the traditional media and the new media in this study.Keywords: new media, news, North Cyprus, traditional media
Procedia PDF Downloads 2264085 Smoking and Alcohol Consumption Predicts Multiple Head and Neck Cancers
Authors: Kim Kennedy, Daren Gibson, Stephanie Flukes, Chandra Diwakarla, Lisa Spalding, Leanne Pilkington, Andrew Redfern
Abstract:
Introduction: It is well known that patients with Head and Neck Cancer (HNC) are at increased risk of subsequent head and neck cancers due to various aetiologies. Aim: We sought to determine the factors contributing to an increased risk of subsequent HNC primaries, and also to evaluate whether Aboriginal patients are at increased risk. Methods: We performed a retrospective cohort analysis of 320 HNC patients from a single centre in Western Australia, identifying 80 Aboriginal patients and 240 non-Aboriginal patients matched on a 1:3 ratio by site, histology, rurality, and age. We collected patient data including smoking and alcohol consumption, tumour and treatment data, and data on subsequent HNC primaries. Results: A subsequent HNC primary was seen in 37 patients (11.6%) overall. There was no significant difference in the rate of second primary HNCs between Aboriginal patients (12.5%) and nonAboriginal patients (11.2%) (p=0.408). Subsequent HNCs, were strongly associated with smoking and alcohol consumption however, with 95% of patients with a second primary being ever-smokers, and 54% of patients with a second primary having a history of excessive alcohol consumption. In the 37 patients with multiple HNC primaries, there were a total of 57 HNCs, with 29 patients having two primaries, six patients having 3 HNC primaries, one patient with four, and one with six. 54 out of the 57 cancers were in ever smokers (94.7%). There were only two multiple HNC primaries in a never smoker, non-drinker, and these cases were of unknown etiology with HPV/p16 status unknown in both cases. In the whole study population, there were 32 HPV-positive HNCs, and 67 p16-positive HNCs, with only two 2 nd HNCs in a p16-positive case, giving a rate of 3% in the p16+ population, which is actually much lower than the rate of second primaries seen in the overall population (11.6%), and was highest in the p16-negative population (15.7%). This suggests that p16-positivity is not a strong risk factor for subsequent primaries, and in fact p16-negativity appeared to be associated with increased risk, however this data is limited by the large number of patients without documented p16 status (45.3% overall, 12% for oropharyngeal, and 59.6% for oral cavity primaries had unknown p16 status). Summary: Subsequent HNC primaries were strongly associated with smoking and alcohol excess. Second and later HNC primaries did not appear to occur at increased rates in Aboriginal patients compared with non-Aboriginal patients, and p16-positivity did not predict increased risk, however p16-negativity was associated with an increased risk of subsequent HNCs.Keywords: head and neck cancer, multiple primaries, aboriginal, p16 status, smoking, alcohol
Procedia PDF Downloads 694084 Frequency of Problem Drinking and Depression in Males with a History of Alcohol Consumption Admitted to a Tertiary Care Setting in Southern Sri Lanka
Authors: N. H. D. P. Fonseka, I. H. Rajapakse, A. S. Dissanayake
Abstract:
Background: Problem drinking, namely alcohol dependence (AD) and alcohol abuse (AA) are associated with major medical, social and economic adverse consequences. Problem drinking behavior is noted among those admitted to hospitals due to alcohol-related medical/surgical complaints as well as those with unrelated complaints. Literature shows an association between alcohol consumption and depression. Aims of this study were to determine the frequency of problem drinking and depression among males with a history of alcohol consumption tertiary care setting in Southern Sri Lanka. Method: Two-hundred male patients who consumed alcohol, receiving care in medical and surgical wards in Teaching Hospital Galle, were assessed. A validated J12 questionnaire of the Mini International Neuropsychiatric Interview was administered to determine frequency AA and AD. A validated PHQ 9 questionnaire to determine the prevalence and severity of depression. Results: Sixty-three participants (31%) had problem drinking. Of them, 61% had AD, and 39% had AA. Depression was noted in 39 (19%) subjects. In those who reported alcohol consumption not amounting to problem drinking, depression was noted in 23 (16%) participants. Mild depression was seen in 17, moderate in five and moderately severe in one. Among those who had problem drinking, 16 (25%) had depression. Mild depression was seen in four, moderate in seven, moderately severe in three and severe in two. Conclusions: A high proportion alcohol users had problem drinking. Adverse consequences associated with problem drinking places a major strain on the health system especially in a low resource setting where healthcare spending is limited and alcohol cessation support services are not well organised. Thus alcohol consumption and problem drinking behaviour need to be inquired into all medical consultations. Community prevalence of depression in Sri Lanka is approximately 10%. Depression among those consuming alcohol was two times higher compared to the general population. The rates of depression among those with problem drinking were especially high being 2.5 times more common than in the general population. A substantial proportion of these patients with depression had moderately severe or severe depression. When depression coexists with problem drinking, it may increase the tendency to consume alcohol as well as act as a barrier to the success of alcohol cessation interventions. Thus screening all patients who consume alcohol for depression, especially those who are problem drinkers becomes an important step in their clinical evaluation. In addition, in view of the high prevalence of problem drinking and coexistent depression, the need to organize a structured alcohol cessation support service in Sri Lanka as well as the need for increasing access to psychological evaluation and treatment of those with problem drinking are highlighted.Keywords: alcohol abuse, alcohol, depression, problem drinking
Procedia PDF Downloads 1604083 Cyber Security Situational Awareness among Students: A Case Study in Malaysia
Authors: Yunos Zahri, Ab Hamid R. Susanty, Ahmad Mustaffa
Abstract:
This paper explores the need for a national baseline study on understanding the level of cyber security situational awareness among primary and secondary school students in Malaysia. The online survey method was deployed to administer the data collection exercise. The target groups were divided into three categories: Group 1 (primary school aged 7-9 years old), Group 2 (primary school aged 10-12 years old), and Group 3 (secondary school aged 13-17 years old). A different questionnaire set was designed for each group. The survey topics/areas included Internet and digital citizenship knowledge. Respondents were randomly selected from rural and urban areas throughout all 14 states in Malaysia. A total of 9,158 respondents participated in the survey, with most states meeting the minimum sample size requirement to represent the country’s demographics. The findings and recommendations from this baseline study are fundamental to develop teaching modules required for children to understand the security risks and threats associated with the Internet throughout their years in school. Early exposure and education will help ensure healthy cyber habits among millennials in Malaysia.Keywords: cyber security awareness, cyber security education, cyber security, school students
Procedia PDF Downloads 3024082 Analyzing Preservice Teachers’ Attitudes toward Technology
Authors: Ahmet Oguz Akturk, Kemal Izci, Gurbuz Caliskan, Ismail Sahin
Abstract:
Rapid developments in technology are to necessitate societies to closely follow technological developments and change themselves to adopt those developments. It is obvious that one of the areas that are impacted from technological developments is education. Analyzing preservice teachers’ attitudes toward technology is crucial for both educational and professional purposes since teacher candidates are essential for educating future individual living in technological age. In this study, it is aimed to analyze preservice teachers’ attitudes toward technology and some variables (e.g., gender, daily internet usage and possessed technological devices) that predicting those attitudes. In this study, relational survey model used as research method and 329 preservice teachers who are studying in a large university located at the middle part of Turkey are voluntarily participated. Results of the study showed that mostly preservice teachers displayed positive attitudes toward technology while male preservice teachers’ attitudes toward technology was more positive than female preservice teachers. In order to analyze predicting factors for preservice teachers’ attitudes toward technology, stepwise multiple regressions were utilized. The results of stepwise multiple regression showed that daily internet use was the most strong predicting factor for predicting preservice teachers’ attitudes toward technology.Keywords: attitudes toward technology, preservice teachers, gender, stepwise multiple regression analysis
Procedia PDF Downloads 2914081 Randomized Controlled Trial of Ultrasound Guided Bilateral Intermediate Cervical Plexus Block in Thyroid Surgery
Authors: Neerja Bharti, Drishya P.
Abstract:
Introduction: Thyroidectomies are extensive surgeries involving a significant degree of tissue handling and dissection and are associated with considerable postoperative pain. Regional anaesthesia techniques have immerged as possible inexpensive and safe alternatives to opioids in the management of pain after thyroidectomy. The front of the neck is innervated by branches from the cervical plexus, and hence, several approaches for superficial and deep cervical plexus block (CPB) have been described to provide postoperative analgesia after neck surgery. However, very few studies have explored the analgesic efficacy of intermediate CPB for thyroid surgery. In this study, we have evaluated the effects of ultrasound-guided bilateral intermediate CPB on perioperative opioid consumption in patients undergoing thyroidectomy under general anesthesia. Methods: In this prospective randomized controlled study, fifty ASA grade I-II adult patients undergoing thyroidectomy were randomly divided into two groups: the study group received ultrasound-guided bilateral intermediate CPB with 10 ml 0.5% ropivacaine on each side, while the control group received the same block with 10 ml normal saline on each side just after induction of anesthesia. Anesthesia was induced with propofol, fentanyl, and vecuronium and maintained with propofol infusion titrated to maintain the BIS between 40 and 60. During the postoperative period, rescue analgesia was provided with PCA fentanyl, and the pain scores, total fentanyl consumption, and incidence of nausea and vomiting during 24 hours were recorded, and overall patient satisfaction was assessed. Results: The groups were well-matched with respect to age, gender, BMI, and duration of surgery. The difference in intraoperative propofol and fentanyl consumption was not statistically significant between groups. However, the intraoperative haemodynamic parameters were better maintained in the study group than in the control group. The postoperative pain scores, as measured by VAS at rest and during movement, were lower, and the total fentanyl consumption during 24 hours was significantly less in the study group as compared to the control group. Patients in the study group reported better satisfaction scores than those in the control group. No adverse effects of ultrasound-guided intermediate CPB block were reported. Conclusion: We concluded that ultrasound-guided intermediate cervical plexus block is a safe and effective method for providing perioperative analgesia during thyroid surgery.Keywords: thyroidectomy, cervical plexus block, pain relief, opioid consumption
Procedia PDF Downloads 964080 Water and Beverage Consumption among Children and Adolescents in Tehran Metropolitan City of Iran
Authors: Mitra Abtahi, Esmat Nasseri, Morteza Abodllahi
Abstract:
Introduction: Adequate hydration is necessary for proper physical and mental function. The aim of this study is to determine the consumption of water and all other beverages in children (8-13 years) and adolescents (14-17 years) in Tehran metropolitan city of Iran. Materials and Methods: In this cross-sectional study, 455 children (8-13 years) and 334 adolescents (14-17 years) were retrieved from north, center, and south of Tehran (18 schools). Instrument for data collection consisted of a “demographic and general health” questionnaire and a “7-day fluid record”. Data analyses were performed with SPSS 16 software. Results: The mean total consumption of fluids in school children was 1302 ± 500.6 ml/day. The highest mean intakes were observed for water (666 ± 398 ml/day), followed by milk (239 ± 183 ml/day), regular soft beverages (RSB) (188 ± 148 ml/day), and juices (60 ± 74 ml/day). Water, hot drinks (mainly tea) and soft drinks intake was significantly more in boys than girls. A significantly lower intake of milk and a higher intake of RSB and hot beverages (mainly tea) have been seen among adolescents compared to children. Conclusion: The most important finding is that mean fluid intake of children and adolescents does not meet international adequate intake references for water and fluids. This finding may suggest the necessity of development of the local references. To improve fluid intake habits of children and adolescents, relevant policy making and actions are warranted.Keywords: adolescents, beverages, children, water
Procedia PDF Downloads 1744079 Computer Self-Efficacy, Study Behaviour and Use of Electronic Information Resources in Selected Polytechnics in Ogun State, Nigeria
Authors: Fredrick Olatunji Ajegbomogun, Bello Modinat Morenikeji, Okorie Nancy Chituru
Abstract:
Electronic information resources are highly relevant to students' academic and research needs but are grossly underutilized, despite the institutional commitment to making them available. The under-utilisation of these resources could be attributed to a low level of study behaviour coupled with a low level of computer self-efficacy. This study assessed computer self-efficacy, study behaviour, and the use of electronic information resources by students in selected polytechnics in Ogun State. A simple random sampling technique using Krejcie and Morgan's (1970) Table was used to select 370 respondents for the study. A structured questionnaire was used to collect data on respondents. Data were analysed using frequency counts, percentages, mean, standard deviation, Pearson Product Moment Correlation (PPMC) and multiple regression analysis. Results reveal that the internet (= 1.94), YouTube (= 1.74), and search engines (= 1.72) were the common information resources available to the students, while the Internet (= 4.22) is the most utilized resource. Major reasons for using electronic information resources were to source materials and information (= 3.30), for research (= 3.25), and to augment class notes (= 2.90). The majority (91.0%) of the respondents have a high level of computer self-efficacy in the use of electronic information resources through selecting from screen menus (= 3.12), using data files ( = 3.10), and efficient use of computers (= 3.06). Good preparation for tests (= 3.27), examinations (= 3.26), and organization of tutorials (= 3.11) are the common study behaviours of the respondents. Overall, 93.8% have good study behaviour. Inadequate computer facilities to access information (= 3.23), and poor internet access (= 2.87) were the major challenges confronting students’ use of electronic information resources. According to the PPMC results, study behavior (r = 0.280) and computer self-efficacy (r = 0.304) have significant (p 0.05) relationships with the use of electronic information resources. Regression results reveal that self-efficacy (=0.214) and study behavior (=0.122) positively (p 0.05) influenced students' use of electronic information resources. The study concluded that students' use of electronic information resources depends on the purpose, their computer self-efficacy, and their study behaviour. Therefore, the study recommended that the management should encourage the students to improve their study habits and computer skills, as this will enhance their continuous and more effective utilization of electronic information resources.Keywords: computer self-efficacy, study behaviour, electronic information resources, polytechnics, Nigeria
Procedia PDF Downloads 1204078 Internet of Things Based Patient Health Monitoring System
Authors: G. Yoga Sairam Teja, K. Harsha Vardhan, A. Vinay Kumar, K. Nithish Kumar, Ch. Shanthi Priyag
Abstract:
The emergence of the Internet of Things (IoT) has facilitated better device control and monitoring in the modern world. The constant monitoring of a patient would be drastically altered by the usage of IoT in healthcare. As we've seen in the case of the COVID-19 pandemic, it's important to keep oneself untouched while continuously checking on the patient's heart rate and temperature. Additionally, patients with paralysis should be closely watched, especially if they are elderly and in need of special care. Our "IoT BASED PATIENT HEALTH MONITORING SYSTEM" project uses IoT to track patient health conditions in an effort to address these issues. In this project, the main board is an 8051 microcontroller that connects a number of sensors, including a heart rate sensor, a temperature sensor (LM-35), and a saline water measuring circuit. These sensors are connected via an ESP832 (WiFi) module, which enables the sending of recorded data directly to the cloud so that the patient's health status can be regularly monitored. An LCD is used to monitor the data in offline mode, and a buzzer will sound if any variation from the regular readings occurs. The data in the cloud may be viewed as a graph, making it simple for a user to spot any unusual conditions.Keywords: IoT, ESP8266, 8051 microcontrollers, sensors
Procedia PDF Downloads 874077 Association of Preoperative Pain Catastrophizing with Postoperative Pain after Lower Limb Trauma Surgery
Authors: Asish Subedi, Krishna Pokharel, Birendra Prasad Sah, Pashupati Chaudhary
Abstract:
Objectives: To evaluate an association between preoperative Nepali pain catastrophizing scale (N-PCS) scores and postoperative pain intensity and total opioid consumption. Methods: In this prospective cohort study we enrolled 135 patients with an American Society of Anaesthesiologists physical status I or II, aged between 18 and 65 years, and scheduled for surgery for lower-extremity fracture under spinal anaesthesia. Maximum postoperative pain reported during the 24 h was classified into two groups, no-mild pain group (Numeric rating scale [NRS] scores 1 to 3) and a moderate-severe pain group (NRS 4-10). The Spearman correlation coefficient was used to compare the association between the baseline N-PCS scores and outcome variables, i.e., the maximum NRS pain score and the total tramadol consumption within the first 24 h after surgery. Logistic regression models were used to identify the predictors for the intensity of postoperative pain. Results: As four patients violated the protocol, the data of 131 patients were analysed. Mean N-PCS scores reported by the moderate-severe pain group was 27.39 ±9.50 compared to 18.64 ±10 mean N-PCS scores by the no-mild pain group (p<0.001). Preoperative PCS scores correlated positively with postoperative pain intensity (r =0.39, [95% CI 0.23-0.52], p<0.001) and total tramadol consumption (r =0.32, [95% CI 0.16-0.47], p<0.001). An increase in catastrophizing scores was associated with postoperative moderate-severe pain (odds ratio, 1.08 [95% confidence interval, 1.02-1.15], p=0.006) after adjusting for gender, ethnicity and preoperative anxiety. Conclusion: Patients who reported higher pain catastrophizing preoperatively were at increased risk of experiencing moderate-severe postoperative pain.Keywords: nepali, pain catastrophizing, postoperative pain, trauma
Procedia PDF Downloads 1204076 Improving Comfort and Energy Mastery: Application of a Method Based on Indicators Morpho-Energetic
Authors: Khadidja Rahmani, Nahla Bouaziz
Abstract:
The climate change and the economic crisis, which are currently running, are the origin of the emergence of many issues and problems, which are related to the domain of energy and environment in à direct or indirect manner. Since the urban space is the core element and the key to solve the current problem, particular attention is given to it in this study. For this reason, we rented to the later a very particular attention; this is for the opportunities that it provides and that can be invested to attenuate a little this situation, which is disastrous and worried, especially in the face of the requirements of sustainable development. Indeed, the purpose of this work is to develop a method, which will allow us to guide designers towards projects with a certain degree of thermo-aeraulic comfort while requiring a minimum energy consumption. In this context, the architects, the urban planners and the engineers (energeticians) have to collaborate jointly to establish a method based on indicators for the improvement of the urban environmental quality (aeraulic-thermo comfort), correlated with a reduction in the energy demand of the entities that make up this environment, in areas with a sub-humid climate. In order to test the feasibility and to validate the method developed in this work, we carried out a series of simulations using computer-based simulation. This research allows us to evaluate the impact of the use of the indicators in the design of the urban sets, on the economic and ecological plan. Using this method, we prove that an urban design, which carefully considered energetically, can contribute significantly to the preservation of the environment and the reduction of the consumption of energy.Keywords: comfort, energy consumption, energy mastery, morpho-energetic indicators, simulation, sub-humid climate, urban sets
Procedia PDF Downloads 2754075 The Use of Non-Parametric Bootstrap in Computing of Microbial Risk Assessment from Lettuce Consumption Irrigated with Contaminated Water by Sanitary Sewage in Infulene Valley
Authors: Mario Tauzene Afonso Matangue, Ivan Andres Sanchez Ortiz
Abstract:
The Metropolitan area of Maputo (Mozambique Capital City) is located in semi-arid zone (800 mm annual rainfall) with 1101170 million inhabitants. On the west side, there are the flatlands of Infulene where the Mulauze River flows towards to the Indian Ocean, receiving at this site, the storm water contaminated with sanitary sewage from Maputo, transported through a concrete open channel. In Infulene, local communities grow salads crops such as tomato, onion, garlic, lettuce, and cabbage, which are then commercialized and consumed in several markets in Maputo City. Lettuce is the most daily consumed salad crop in different meals, generally in fast-foods, breakfasts, lunches, and dinners. However, the risk of infection by several pathogens due to the consumption of lettuce, using the Quantitative Microbial Risk Assessment (QMRA) tools, is still unknown since there are few studies or publications concerning to this matter in Mozambique. This work is aimed at determining the annual risk arising from the consumption of lettuce grown in Infulene valley, in Maputo, using QMRA tools. The exposure model was constructed upon the volume of contaminated water remaining in the lettuce leaves, the empirical relations between the number of pathogens and the indicator of microorganisms (E. coli), the consumption of lettuce (g) and reduction of pathogens (days). The reference pathogens were Vibrio cholerae, Cryptosporidium, norovirus, and Ascaris. The water quality samples (E. coli) were collected in the storm water channel from January 2016 to December 2018, comprising 65 samples, and the urban lettuce consumption data were collected through inquiry in Maputo Metropolis covering 350 persons. A non-parametric bootstrap was performed involving 10,000 iterations over the collected dataset, namely, water quality (E. coli) and lettuce consumption. The dose-response models were: Exponential for Cryptosporidium, Kummer Confluent hypergeomtric function (1F1) for Vibrio and Ascaris Gaussian hypergeometric function (2F1-(a,b;c;z) for norovirus. The annual infection risk estimates were performed using R 3.6.0 (CoreTeam) software by Monte Carlo (Latin hypercubes), a sampling technique involving 10,000 iterations. The annual infection risks values expressed by Median and the 95th percentile, per person per year (pppy) arising from the consumption of lettuce are as follows: Vibrio cholerae (1.00, 1.00), Cryptosporidium (3.91x10⁻³, 9.72x 10⁻³), nororvirus (5.22x10⁻¹, 9.99x10⁻¹) and Ascaris (2.59x10⁻¹, 9.65x10⁻¹). Thus, the consumption of the lettuce would result in greater risks than the tolerable levels ( < 10⁻³ pppy or 10⁻⁶ DALY) for all pathogens, and the Vibrio cholerae is the most virulent pathogens, according to the hit-single models followed by the Ascaris lumbricoides and norovirus. The sensitivity analysis carried out in this work pointed out that in the whole QMRA, the most important input variable was the reduction of pathogens (Spearman rank value was 0.69) between harvest and consumption followed by water quality (Spearman rank value was 0.69). The decision-makers (Mozambique Government) must strengthen the prevention measures related to pathogens reduction in lettuce (i.e., washing) and engage in wastewater treatment engineering.Keywords: annual infections risk, lettuce, non-parametric bootstrapping, quantitative microbial risk assessment tools
Procedia PDF Downloads 1204074 Efficient Use of Power Light-Emitting Diode Chips in the Main Lighting System and in Generating Heat in Intelligent Buildings
Authors: Siamak Eskandari, Neda Ebadi
Abstract:
Among common electronic parts which have been invented and have made a great revolution in the lighting system through the world, certainly LEDs have no rival. These small parts with their very low power consumption, very dazzling and powerful light and small size and with their extremely high lifetime- compared to incandescent bulbs and compact fluorescent lamp (CFLs) have undoubtedly revolutionized the lighting industry of the world. Based on conducted studies and experiments, in addition to their acceptable light and low power consumption -compared to incandescent bulbs and CFLs-, they have very low and in some cases zero environmental pollution and negative effects on human beings. Because of their longevity, in the case of using high-quality circuits and proper and consistent use of LEDs in conventional and intelligent buildings, there will be no need to replace the burnout lamps, for a long time (10 years). In this study which was conducted on 10-watt power LEDs with suitable heatsink/cooling, considerable amount of heat was generated during lighting after 5 minutes and 45 seconds. The temperature rose to above 99 degrees Celsius and this amount of heat can raise the water temperature to 60 degrees Celsius and more. Based on conducted experiments, this can provide the heat required for bathing, washing, radiators (in cold seasons) easily and only by imposing very low cost and it will be a big step in the optimization of energy consumption in the future.Keywords: energy, light, water, optimization of power LED
Procedia PDF Downloads 1534073 Symbolic Analysis of Input Impedance of CMOS Floating Active Inductors with Application in Fully Differential Bandpass Amplifier
Authors: Kittipong Tripetch
Abstract:
This paper proposes studies of input impedance of two types of the CMOS active inductor. It derives two input impedance formulas. The first formula is the input impedance of a grounded active inductor. The second formula is an input impedance of floating active inductor. After that, these formulas can be used to simulate magnitude and phase response of input impedance as a function of current consumption with MATLAB. Common mode rejection ratio (CMRR) of a fully differential bandpass amplifier is derived based on superposition principle. CMRR as a function of input frequency is plotted as a function of current consumptionKeywords: grounded active inductor, floating active inductor, fully differential bandpass amplifier
Procedia PDF Downloads 4264072 Debunking Sexual Myths in Bangladesh through an Intervention on the Internet
Authors: E. Rommes, Els Toonen, Rahil Roodsaz, Suborna Camellia, Farhana Alam, Saad Khan, Jhalok Ranjon Talukder, Tanveer Hassan, Syeda Farjana Ahmed, Sabina Faiz Rashid
Abstract:
In Bangladesh, a country in which adults (both parents and teachers) find it particularly hard to speak with youth about sexuality, adolescents seem to struggle with various insecurities about their sexual feelings, thoughts, behavior and physical characteristics. On the basis of a large number of interviews and focus groups with rural and urban Bangla adolescent girls and boys of lower and middle class as part of the large-scale three-year project ‘Breaking the Shame’, we have identified ten sexual themes or ‘myths’ that youth struggle with most. These encompass amongst others beliefs and insecurities on masturbation, discharge, same-sex behavior and feelings, the effects of watching porn and gender norms. We argue that the Internet is a particularly suitable medium to ‘debunk’ those myths, as youth can consult it anonymously and privately and so avoid social shame. Moreover, amongst the myths, we have identified two kinds which may need different debunking techniques. One kind of myth concerns scientifically uncontested, generally biological related information, such as the effects of having sex with a pregnant woman, questions on the effects of a penile or vaginal discharge or questions on the effects of masturbation. The second kind of myths concerns more diverse information sources and deals with e.g. religious or culturally specific norms, such as on the meaning and existence of homosexuality or gender appropriate norms of behavior in Bangladesh. For addressing both kinds of myths, expert information including a wealth of references to information resources needs to be provided, which the Internet is very suitable for. For the second kind of myths, adolescents also need to learn how to deal with sometimes conflicting norms and information sources, and they need to develop and reflect on their own opinions as part of their identity formation. On the basis of a literature review, we thus distinguish general information needs from identity formation needs, which includes the need to be able to relate information and opinions to one’s own opinions and situation. Hence, we argue that youth not only need abstract expert information to be able to debunk sexual myths, but also the option to discuss this information with other adolescents and compare their own situation and opinions with other peers, who in that way serve as ‘warm experts’ for each other. In this paper, we will describe the outcomes of our qualitative study above. In addition, we will present our findings of an intervention by presenting youth with general, uncontested information on the Internet with additional peer discussion options to compare the debunking effects on different kinds of myths.Keywords: peer discussion, intervention, sexual myths, shame
Procedia PDF Downloads 2164071 The Effect of Reminiscence Therapy with Ethernet-Based Videos on Cognition and Apathy in Elderly with Mild Dementia
Authors: Ayse Inel Manav, Nuray Simsek
Abstract:
The number of people with dementia and the problems that are experienced by these people are increasing along with aging world population. This study was carried out to assess the effects of reminiscence therapy using internet videos on the cognitive condition and apathy levels of elderly people who had mild dementia and lived in nursing homes. This randomly controlled experimental study was conducted between 25 May-25 August 2016 in the nursing home, elderly care and rehabilitation centers in Adana and Seyhan, Turkey. A total of 32 individuals participated in this study, 16 in the experimental group and 16 in the control group. Data were collected using a personal information form developed on the basis of the published literature, the Standardized Mini Mental Test (SMMT) and the Apathy Rating Scale (ARS). The Clinical Research Ethics Committee's approval, written institutional permission, and the written consent of the participants were obtained before data collection. The individuals in the experimental group received reminiscence therapy using internet videos for 60 minutes one day a week for three months. During the same period, 25-30 minutes of unstructured interviews on subjects unrelated to reminiscence were carried out with individuals in the control group. The SMMT and ARS were administered before the applications in the experimental group and at the end of the third month. The collected data were analyzed using descriptive statistics (means, standard deviations, and frequencies) as well as Student's t-test, the Mann-Whitney U-test, and Wilcoxon's signed ranks test. In this study, the total SMMT post-test scores of the experimental group were higher than those of the control group (p = 0.001; p < 0.01). There was a difference between experimental and control groups' total SMMT post-test scores (p = 0.001; p < 0.01). The experimental group's ARS total post-test scores were higher than those of the control group (p = 0.001; p < 0.01). This study found that group reminiscence therapy using internet videos improved the cognitive functions and apathy levels of elderly individuals with mild dementia.Keywords: apaty, cognitive testing, dementia, elderly, reminisence threapy
Procedia PDF Downloads 1974070 Using Closed Frequent Itemsets for Hierarchical Document Clustering
Authors: Cheng-Jhe Lee, Chiun-Chieh Hsu
Abstract:
Due to the rapid development of the Internet and the increased availability of digital documents, the excessive information on the Internet has led to information overflow problem. In order to solve these problems for effective information retrieval, document clustering in text mining becomes a popular research topic. Clustering is the unsupervised classification of data items into groups without the need of training data. Many conventional document clustering methods perform inefficiently for large document collections because they were originally designed for relational database. Therefore they are impractical in real-world document clustering and require special handling for high dimensionality and high volume. We propose the FIHC (Frequent Itemset-based Hierarchical Clustering) method, which is a hierarchical clustering method developed for document clustering, where the intuition of FIHC is that there exist some common words for each cluster. FIHC uses such words to cluster documents and builds hierarchical topic tree. In this paper, we combine FIHC algorithm with ontology to solve the semantic problem and mine the meaning behind the words in documents. Furthermore, we use the closed frequent itemsets instead of only use frequent itemsets, which increases efficiency and scalability. The experimental results show that our method is more accurate than those of well-known document clustering algorithms.Keywords: FIHC, documents clustering, ontology, closed frequent itemset
Procedia PDF Downloads 3994069 Email Based Global Automation with Raspberry Pi and Control Circuit Module: Development of Smart Home Application
Authors: Lochan Basyal
Abstract:
Global Automation is an emerging technology of today’s era and is based on Internet of Things (IoT). Global automation deals with the controlling of electrical appliances throughout the world. The fabrication of this system has been carried out with interfacing an electrical control system module to Raspberry Pi. An electrical control system module includes a relay driver mechanism through which appliances are controlled automatically in respective condition. In this research project, one email ID has been assigned to Raspberry Pi, and the users from different location having different email ID can mail to Raspberry Pi on assigned email address “[email protected]” with subject heading “Device Control” with predefined command on compose email line. Also, a notification regarding current working condition of this system has been updated on respective user email ID. This approach is an innovative way of implementing smart automation system through which a user can control their electrical appliances like light, fan, television, refrigerator, etc. in their home with the use of email facility. The development of this project helps to enhance the concept of smart home application as well as industrial automation.Keywords: control circuit, e-mail, global automation, internet of things, IOT, Raspberry Pi
Procedia PDF Downloads 1674068 Mass Media Products Consumption Patterns in Rural South-South, Nigeria Communities
Authors: Inemesit Akpan Umoren, Aniekan James Akpan
Abstract:
Media practitioners and information managers have often erroneously operated on the premise that media messages are received as disseminated to the extent that audiences of whatever background assimilate the content uniformly. This does not subsist since media audiences are often segmented in terms of educational level, social category, place of residence, gender, among others. While those who are highly educated, live in urban areas and are of highest standing are more likely to have direct access to the media, those in the rural areas and of low education and standing, may not have direct or easy access. These, therefore, informed the study to establish the consumption patterns of mass media products by residents of rural communities in south-south, Nigeria. The study, which was anchored on the multi-step flow and social categories theories, adopted a survey research design and a sample of 383 using Mayer’s 1979 guide drawn from nine rural communities in the south-south, Nigeria states of Akwa Ibom, Rivers and Edo. Findings among others showed that while a negligible percentage is highly exposed to media messages of all types, a greater member depend on opinion leaders, social groups, drinking joints, among other such for filtered content. It was concluded that since rural or community media organizations are very vital in ensuring media content get to all audience without necessarily being passing through intermediaries. Among the recommendations was that information managers and media organizations should always have in mind the ruralites while packaging their contents even in the mainstream media.Keywords: consumption, media, media product, pattern
Procedia PDF Downloads 1444067 Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10
Authors: Zainurrasyid Abdullah, Mohamed Fadzlee Sulaiman, Muhammad Fadzlan Zainal, M. Zabri Adil Talib, Aswami Fadillah M. Ariffin
Abstract:
The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation.Keywords: artifacts analysis, digital forensics, forensic analysis, memory analysis, registry analysis, tor browser, Windows 10
Procedia PDF Downloads 1704066 Information Technology and the Challenges Facing the Legal Profession in Nigeria
Authors: Odoh Ben Uruchi
Abstract:
Information Technology is an outcome of the nexus between the computer technology and the communication technology which has grown as silver fiber in Nigeria. Information Technology represents the fourth generation of human communication after sight, oral and written communications. The internet, as with all path-breaking technological developments gives us all the ample privileges to act as a global community; advertise and operate across all frontiers; over boarders and beyond the control of any government. The security concerns, computer abuse and the side effects of this technology have moved to the forefront of the consciousness of law enforcement agencies. Unfortunately, Nigeria is one of the very few countries in the world to have not legislated Cyber Laws, although several unsuccessful attempts have been made in recent times at providing the legal framework for regulating the activities in Nigerian cyberspace. Traditional legal systems have led to great difficulty in keeping pace with the rapid growth of the internet and its impact throughout Nigeria. The only existing legal frameworks are constantly being challenged by technological advancement. This has created a need to constantly update and adapt the way in which we organize ourselves as Legal Practitioners in order to maintain overall control of its domestic and national interests. This paper seeks to appraise the challenges facing the legal profession in Nigeria because of want of Cyber Laws. In doing this, the paper shall highlight the loopholes in the existing laws and recommends the way forward.Keywords: information technology, challenges, legal profession, Nigeria
Procedia PDF Downloads 5164065 Open Innovation for Crowdsourced Product Development: The Case Study of Quirky.com
Authors: Ana Bilandzic, Marcus Foth, Greg Hearn
Abstract:
In a narrow sense, innovation is the invention and commercialisation of a new product or service in the marketplace. The literature suggests places that support knowledge exchange and social interaction, e.g. coffee shops, to nurture innovative ideas. With the widespread success of Internet, interpersonal communication and interaction changed. Online platforms complement physical places for idea exchange and innovation – the rise of hybrid, ‘net localities.’ Further, since its introduction in 2003 by Chesbrough, the concept of open innovation received increased attention as a topic in academic research as well as an innovation strategy applied by companies. Open innovation allows companies to seek and release intellectual property and new ideas from outside of their own company. As a consequence, the innovation process is no longer only managed within the company, but it is pursued in a co-creation process with customers, suppliers, and other stakeholders. Quirky.com (Quirky), a company founded by Ben Kaufman in 2009, recognised the opportunity given by the Internet for knowledge exchange and open innovation. Quirky developed an online platform that makes innovation available to everyone. This paper reports on a study that analysed Quirky’s business process in an extended event-driven process chain (eEPC). The aim was to determine how the platform enabled crowdsourced innovation for physical products on the Internet. The analysis reveals that key elements of the business model are based on open innovation. Quirky is an example of how open innovation can support crowdsourced and crowdfunded product ideation, development and selling. The company opened up various stages in the innovation process to its members to contribute in the product development, e.g. product ideation, design, and market research. Throughout the process, members earn influence through participating in the product development. Based on the influence they receive, shares on the product’s turnover. The outcomes of the study’s analysis highlighted certain benefits of open innovation for product development. The paper concludes with recommendations for future research to look into opportunities of open innovation approaches to be adopted by tertiary institutions as a novel way to commercialise research intellectual property.Keywords: business process, crowdsourced innovation, open innovation, Quirky
Procedia PDF Downloads 2274064 Cultural Works Interacting with the Generational Aesthetic Gap between Gen X and Gen Z in China: A Qualitative Study
Authors: Qianyu Zhang
Abstract:
The spread of digital technology in China has worsened the generation gap and intergenerational competition for cultural and aesthetic discourse. Meanwhile, the increased accessibility of cultural works has encouraged the sharing and inheritance of collective cultural memories between generations. However, not each cultural work can engage positively with efforts to bridge intergenerational aesthetic differences. This study argues that in contemporary China, where new media and the Internet are widely available, featured cultural works have more potential to help enhance the cultural aesthetic consensus among different generations, thus becoming an effective countermeasure to narrow the intergenerational aesthetic rift and cultural discontinuity. Specifically, the generational aesthetic gap is expected to be bridged or improved through the shared appreciation or consumption of cultural works that meet certain conditions by several generations. In-depth interviews of Gen X and Gen Z (N=15, respectively) in China uncovered their preferences and commonalities for cultural works and shared experiences in appreciating them. Results demonstrate that both generations’ shared appreciation of cultural work is a necessary but insufficient condition for its effective response to the generational aesthetic gap. Coding analysis rendered six dimensions that cultural works with the potential to bridge the intergenerational aesthetic divide should satisfy simultaneously: genre, theme, content, elements, quality, and accessibility. Cultural works that engage multiple senses/ compound realistic, domestic and contemporary cultural memories/ contain the narrative of family life and nationalism/ include more elements familiar to the previous generation/ are superb-produced and unaffected/ are more accessible better promote intergenerational aesthetic exchange and value recognition. Moreover, compared to the dilemma of the previous generation facing the aesthetic gap, the later generation plays a crucial role in bridging the generational aesthetic divide.Keywords: cultural works, generation gap, generation X, generation Z, cultural memory
Procedia PDF Downloads 1534063 Performing Artists Consumption of Celebrity Entertainment TV News Shows: Relations to the Desire and Perception of Fame
Authors: Annette Davies
Abstract:
Celebrity entertainment TV news shows such as Access Hollywood, Entertainment Tonight, E! News, etc., have remained extremely popular. While the effects of these shows have been examined in academic literature on various sample populations, the effects have rarely been examined on a sample population of performing artists in the entertainment field. The present research investigates how the consumption of these shows influence the desire for fame and the perception of fame among active performing artists. Two separate chi-square analyses were conducted to yield the following results: 1) as the viewing of these shows increases, the overall desire for fame also tends to increase; 2) performers who believe that these celebrity entertainment TV news shows frame fame positively are more likely to perceive fame as a positive achievement overall. Thus, the results of the second finding are consistent with second-level agenda-setting theory. Limitations and suggestions for future research are also discussed.Keywords: celebrity, entertainment, fame, performers
Procedia PDF Downloads 1164062 Context Aware Anomaly Behavior Analysis for Smart Home Systems
Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
Abstract:
The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.Keywords: Internet of Things, network security, context awareness, intrusion detection
Procedia PDF Downloads 1914061 Development of a Flexible Lora-Based Wireless Sensory System for Long-Time Health Monitoring of Civil Structures
Authors: Hui Zhang, Sherif Beskhyroun
Abstract:
In this study, a highly flexible LoRa-Based wireless sensing system was used to assess the strain state performance of building structures. The system was developed to address the local damage limitation of structural health monitoring (SHM) systems. The system is part of an intelligent SHM system designed to monitor, collect and transmit strain changes in key structural components. The main purpose of the wireless sensor system is to reduce the development and installation costs, and reduce the power consumption of the system, so as to achieve long-time monitoring. The highly stretchable flexible strain gauge is mounted on the surface of the structure and is waterproof, heat resistant, and low temperature resistant, greatly reducing the installation and maintenance costs of the sensor. The system was also developed with the aim of using LoRa wireless communication technology to achieve both low power consumption and long-distance transmission, therefore solving the problem of large-scale deployment of sensors to cover more areas in large structures. In the long-term monitoring of the building structure, the system shows very high performance, very low actual power consumption, and wireless transmission stability. The results show that the developed system has a high resolution, sensitivity, and high possibility of long-term monitoring.Keywords: LoRa, SHM system, strain measurement, civil structures, flexible sensing system
Procedia PDF Downloads 1034060 An Approach For Evolving a Relaible Low Power Ultra Wide Band Transmitter with Capacitve Sensing
Abstract:
This work aims for a tunable capacitor as a sensor which can vary the control voltage of a voltage control oscillator in a ultra wide band (UWB) transmitter. In this paper power consumption is concentrated. The reason for choosing a capacitive sensing is it give slow temperature drift, high sensitivity and robustness. Previous works report a resistive sensing in a voltage control oscillator (VCO) not aiming at power consumption. But this work aims for power consumption of a capacitive sensing in ultra wide band transmitter. The ultra wide band transmitter to be used is a direct modulation of pulses. The VCO which is the heart of pulse generator of UWB transmitter works on the principle of voltage to frequency conversion. The VCO has and odd number of inverter stages which works on the control voltage input this input is now from a variable capacitor and the buffer stages is reduced from the previous work to maintain the oscillating frequency. The VCO is also aimed to consume low power. Then the concentration in choosing a variable capacitor is aimed. A compact model of a capacitor with the transient characteristics is to be designed with a movable dielectric and multi metal membranes. Previous modeling of the capacitor transient characteristics is with a movable membrane and a fixed membrane. This work aims at a membrane with a wide tuning suitable for ultra wide band transmitter.This is used in this work because a capacitive in a ultra wide transmitter need to be tuned in such a way that all satisfies FCC regulations.Keywords: capacitive sensing, ultra wide band transmitter, voltage control oscillator, FCC regulation
Procedia PDF Downloads 3914059 Association of Single Nucleotide Polymorphisms in Leptin and Leptin Receptors with Oral Cancer
Authors: Chiung-Man Tsai, Chia-Jui Weng
Abstract:
Leptin (LEP) and leptin receptor (LEPR) both play a crucial role in the mediation of physiological reactions and carcinogenesis and may serve as a candidate biomarker of oral cancer. The present case-control study aimed to examine the effects of single nucleotide polymorphisms (SNPs) of LEP -2548 G/A (rs7799039), LEPR K109R (rs1137100), and LEPR Q223R (rs1137101) with or without interacting to environmental carcinogens on the risk for oral squamous cell carcinoma (OSCC). The SNPs of three genetic allele, from 567 patients with oral cancer and 560 healthy controls in Taiwan were analyzed. All of The three genetic polymorphisms exhibited insignificant (P > .05) effects on the risk to have oral cancer. However, the patients with polymorphic allele of LEP -2548 have a significant low risk for the development of clinical stage (A/G, AOR = 0.670, 95% CI = 0.454–0.988, P < .05; A/G+G/G, AOR = 0.676, 95% CI = 0.467–0.978, P < .05) compared to patients with ancestral homozygous A/A genotype. Additionally, an interesting result was found that the impact of LEP -2548 G/A SNP on oral carcinogenesis in subjects without tobacco consumption (A/G, AOR=2.078, 95% CI: 1.161-3.720, p=0.014; A/G+G/G, AOR=2.002, 95% CI: 1.143-3.505, p=0.015) is higher than subjects with tobacco consumption. These results suggest that the genetic polymorphism of LEP -2548 G/A (rs7799039), LEPR K109R (rs1137100), and LEPR Q223R (rs1137101) were not associated with the susceptibility of oral cancer; SNP in LEP -2548 G/A showed a poor clinicopathological development of oral cancer; Population without tobacco consumption and with polymorphic LEP -2548 G/A gene may significantly increase the risk to have oral cancer.Keywords: carcinogen, leptin, leptin receptor, oral squamous cell carcinoma, single nucleotide polymorphism
Procedia PDF Downloads 1854058 Smart Grid Simulator
Authors: Ursachi Andrei
Abstract:
The Smart Grid Simulator is a computer software based on advanced algorithms which has as the main purpose to lower the energy bill in the most optimized price efficient way as possible for private households, companies or energy providers. It combines the energy provided by a number of solar modules and wind turbines with the consumption of one household or a cluster of nearby households and information regarding weather conditions and energy prices in order to predict the amount of energy that can be produced by renewable energy sources and the amount of energy that will be bought from the distributor for the following day. The user of the system will not only be able to minimize his expenditures on energy fractures, but also he will be informed about his hourly consumption, electricity prices fluctuation and money spent for energy bought as well as how much money he saved each day and since he installed the system. The paper outlines the algorithm that supports the Smart Grid Simulator idea and presents preliminary test results that support the discussion and implementation of the system.Keywords: smart grid, sustainable energy, applied science, renewable energy sources
Procedia PDF Downloads 3474057 Hybrid Bee Ant Colony Algorithm for Effective Load Balancing and Job Scheduling in Cloud Computing
Authors: Thomas Yeboah
Abstract:
Cloud Computing is newly paradigm in computing that promises a delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). As Cloud Computing is a newly style of computing on the internet. It has many merits along with some crucial issues that need to be resolved in order to improve reliability of cloud environment. These issues are related with the load balancing, fault tolerance and different security issues in cloud environment.In this paper the main concern is to develop an effective load balancing algorithm that gives satisfactory performance to both, cloud users and providers. This proposed algorithm (hybrid Bee Ant Colony algorithm) is a combination of two dynamic algorithms: Ant Colony Optimization and Bees Life algorithm. Ant Colony algorithm is used in this hybrid Bee Ant Colony algorithm to solve load balancing issues whiles the Bees Life algorithm is used for optimization of job scheduling in cloud environment. The results of the proposed algorithm shows that the hybrid Bee Ant Colony algorithm outperforms the performances of both Ant Colony algorithm and Bees Life algorithm when evaluated the proposed algorithm performances in terms of Waiting time and Response time on a simulator called CloudSim.Keywords: ant colony optimization algorithm, bees life algorithm, scheduling algorithm, performance, cloud computing, load balancing
Procedia PDF Downloads 628