Search results for: codes of conduct
811 The Promising Way to Minimize the Negative Effects of Iron Fortification
Authors: M. Juffrie, Siti Helmyati, Toto Sudargo, B. J. Istiti Kandarina
Abstract:
Background: Iron fortification is one potential way to overcome anemia but it can cause gut microbiota imbalance. Probiotics addition can increase the growth of good gut bacteria while prebiotics can support the probiotics growth. Tempeh is rich in nutrients required for hemoglobin synthesis, such as protein, vitamin B12, vitamin C, zinc, iron and copper. Objective: To know the efficacy of fermented tempeh extract fortified with iron and synbiotic in maintain gut microbiota balance. Methods: Fermented synbiotic tempeh extract was made using Lactobacillus plantarum Dad13 and Fructo-oligosaccharides. A total of 32 anemic Wistar rats underwent the iron repletion phase then divided into 4 groups, given: 1) Fermented synbiotic tempeh extract with 50 ppm Fe/NaFeEDTA (Na), 2) Fermented synbiotic tempeh extract with 50 ppm Fe/FeSO4 (Fe), 3) Fermented synbiotic tempeh extract (St), and 4) not receive any interventions (Co). Rats were feed AIN-93 free Fe during intervention. Gut microbiota was measured with culture technique using selective media agar while hemoglobin concentration (Hb) was measured with photometric method before and after intervention. Results: There were significant increase in Hb after intervention in Na, Fe, and St, 6.85 to 11.80; 6.41 to 11.48 and 6.47 to 11.03 mg/dL, respectively (p <0.05). Co did not show increase in Hb (6.40 vs. 6.28 mg/dL). Lactobacilli increased in all groups while both of Bifidobacteria increased and E. coli decreased only in Na and St groups. Conclusion: Iron fortification of fermented synbiotic tempeh extract can increase hemoglobin concentrations in anemic animal, increase Lactobacilli and decrease E. coli. It can be an alternative solution to conduct iron fortification without deteriorate the gut microbiota.Keywords: tempeh, synbiotic, iron, haemoglobin, gut microbiota
Procedia PDF Downloads 457810 The Trauma Suffered by Left behind Children and Its Impact on Their Emotional Development: A Pilot Study with Brazilian Immigrants in the United States
Authors: Liliane Clark
Abstract:
Immigrating to a different country may imply having to handle many difficult exertions. There is a particular issue that has to be endured by some immigrants: the children they had to leave behind. It is a phenomenon that occurs with certain frequency. Surprisingly, despite the fact that immigration in the United States is such a large proceeding, there is not much research about the topic in America exploring the trauma of the abandonment caused by this separation and its consequences on the mental health of those children. The term “left behind children” is usually applied to children who were left behind by their parents in their original nation under the care of a noteworthy relative, frequently the grandparents, when they moved to another country. This preliminary research, which is a partial study projected for a doctoral thesis, investigated whether the trauma of abandonment experienced by ten left behind children had affected their emotional development. The Strengths and Difficulties Questionnaire (SDQ) and a brief interview were utilized to assess the information. The SDQ explored scales such as emotional symptoms, conduct problems, hyperactivity, peer problems and prosocial behavior. In this pilot study, the results indicated that all these issues had some sort of significant correlation between them. During the interviews, the participants or their parents identified a range of symptoms: anxiety disorder, eating disorders, panic attacks, psychotic-like experiences, drug use and depression. Hence, it seems that there is a connection between the trauma of abandonment suffered due to the separation and the children’s consequent symptomatic behavior. Further studies are indeed necessary to validate the initial results of this investigation.Keywords: abandonment, parent migration, psychological problems, trauma
Procedia PDF Downloads 187809 Determination of Stress-Strain Curve of Duplex Stainless Steel Welds
Authors: Carolina Payares-Asprino
Abstract:
Dual-phase duplex stainless steel comprised of ferrite and austenite has shown high strength and corrosion resistance in many aggressive environments. Joining duplex alloys is challenging due to several embrittling precipitates and metallurgical changes during the welding process. The welding parameters strongly influence the quality of a weld joint. Therefore, it is necessary to quantify the weld bead’s integral properties as a function of welding parameters, especially when part of the weld bead is removed through a machining process due to aesthetic reasons or to couple the elements in the in-service structure. The present study uses the existing stress-strain model to predict the stress-strain curves for duplex stainless-steel welds under different welding conditions. Having mathematical expressions that predict the shape of the stress-strain curve is advantageous since it reduces the experimental work in obtaining the tensile test. In analysis and design, such stress-strain modeling simplifies the time of operations by being integrated into calculation tools, such as the finite element program codes. The elastic zone and the plastic zone of the curve can be defined by specific parameters, generating expressions that simulate the curve with great precision. There are empirical equations that describe the stress-strain curves. However, they only refer to the stress-strain curve for the stainless steel, but not when the material is under the welding process. It is a significant contribution to the applications of duplex stainless steel welds. For this study, a 3x3 matrix with a low, medium, and high level for each of the welding parameters were applied, giving a total of 27 weld bead plates. Two tensile specimens were manufactured from each welded plate, resulting in 54 tensile specimens for testing. When evaluating the four models used to predict the stress-strain curve in the welded specimens, only one model (Rasmussen) presented a good correlation in predicting the strain stress curve.Keywords: duplex stainless steels, modeling, stress-stress curve, tensile test, welding
Procedia PDF Downloads 167808 Physics Recitations for College Physics Courses Using Breakout Rooms during COVID Pandemic
Authors: Pratheesh Jakkala
Abstract:
This paper addresses the use of breakout sessions to conduct successful weekly physics recitations for College Physics I and II at a large University in remote teaching method during COVID-19 pandemic. All breakout sessions are synchronous, conducted live, and handled by teaching assistants. A two-prong approach is used to maintain the integrity of recitations. Three different conference platforms WebEx, Zoom, and Canvas conferences, were tested, and BigBlue button using Canvas was adopted. The results and experiences of all three learning platforms are presented in this paper. Recitation questions were assigned on WebAssign learning platform and a standard five-question template developed by the instructor was used for group discussions and active peer-peer engagement. Breakout sessions feature of BigBlueButton in Canvas conferences was successfully implemented. Each breakout session consists of a team of 4 students. An online whiteboard, chat window options were used for live teamwork. Student peer-peer interactions, Teaching Assistants’ interaction with students were video and audio recorded. A total of 72 students in College Physics II and 55 students in College Physics I was enrolled. 82% of students agreed that method under study is better than previous methods. The study addressed the quality of student teamwork, student attitude towards problem-solving, and student performance in the exams.Keywords: recitations, breakout rooms, online learning platforms, COVID pandemic
Procedia PDF Downloads 110807 Fires in Historic Buildings: Assessment of Evacuation of People by Computational Simulation
Authors: Ivana R. Moser, Joao C. Souza
Abstract:
Building fires are random phenomena that can be extremely violent, and safe evacuation of people is the most guaranteed tactic in saving lives. The correct evacuation of buildings, and other spaces occupied by people, means leaving the place in a short time and by the appropriate way. It depends on the perception of spaces by the individual, the architectural layout and the presence of appropriate routing systems. As historical buildings were constructed in other times, when, as in general, the current security requirements were not available yet, it is necessary to adapt these spaces to make them safe. Computer models of evacuation simulation are widely used tools for assessing the safety of people in a building or agglomeration sites and these are associated with the analysis of human behaviour, makes the results of emergency evacuation more correct and conclusive. The objective of this research is the performance evaluation of historical interest buildings, regarding the safe evacuation of people, through computer simulation, using PTV Viswalk software. The buildings objects of study are the Colégio Catarinense, centennial building, located in the city of Florianópolis, Santa Catarina / Brazil. The software used uses the variables of human behaviour, such as: avoid collision with other pedestrians and avoid obstacles. Scenarios were run on the three-dimensional models and the contribution to safety in risk situations was verified as an alternative measure, especially in the impossibility of applying those measures foreseen by the current fire safety codes in Brazil. The simulations verified the evacuation time in situations of normality and emergency situations, as well as indicate the bottlenecks and critical points of the studied buildings, to seek solutions to prevent and correct these undesirable events. It is understood that adopting an advanced computational performance-based approach promotes greater knowledge of the building and how people behave in these specific environments, in emergency situations.Keywords: computer simulation, escape routes, fire safety, historic buildings, human behavior
Procedia PDF Downloads 186806 Views and Experiences of Medical Students of Kerman University of Medical Sciences on Facilitators and Inhibitators of Quality of Education in the Clinical Education System in 2021
Authors: Hossein Ghaedamini, Salman Farahbakhsh, Alireza Amirbeigi, Zahra Saghafi, Salman Daneshi, Alireza Ghaedamini
Abstract:
Background: Assessing the challenges of clinical education of medical students is one of the most important and sensitive parts of medical education. The aim of this study was to investigate the views and experiences of Kerman medical students on the factors that facilitate and inhibit the quality of clinical education. Materials and Methods: This research was qualitative and used a phenomenological approach. The study population included medical interns of Kerman University of Medical Sciences in 1400. The method of data collection was in-depth interviews with participants. Data were encoded and analyzed by Claizey stepwise model. Results: First, about 540 primary codes were extracted in the form of two main themes (facilitators and inhibitors) and 10 sub-themes including providing motivational models and creating interest in interns, high scientific level of professors and the appropriate quality of their teaching, the use of technology in the clinical education process, delegating authority and freedom of action and more responsibilities to interns, inappropriate treatment of some officials, professors, assistants and department staff with their interns, inadequate educational programming, lack of necessary cooperation and providing inappropriate treatment by clinical training experts for interns, inadequate evaluation method in clinical training for interns, poor quality mornings, the unefficiency of grand rounds, the inappropriate way of evaluating clinical training for interns, the lack of suitable facilities and conditions with the position of a medical intern, and the hardwork of some departments were categorized. Conclusion: Clinical education is always mixed with special principles and subtleties, and special attention to facilitators and inhibitors in this process has an important role in improving its quality.Keywords: clinical education, medical students, qualitative study, education
Procedia PDF Downloads 98805 Effect of Site Amplification on Seismic Safety Evaluation of Flyover Pier
Authors: Mohammad Raihan Mukhlis, M. Abdur Rahman Bhuiyan
Abstract:
Bangladesh is a developing country in which a lot of multi-span simply/continuous supported flyovers are being constructed in its major cities. Being situated in a seismically active region, seismic safety evaluation of flyovers is essential for seismic risk reduction. Effects of site amplification on seismic safety evaluation of flyover piers are the main concern of this study. In this regard, failure mode, lateral strength and displacement ductility of piers of a typical multi-span simply supported flyover have been evaluated by Japan Road Association (JRA) recommended guidelines, with and without considering site amplification. Ultimate flexural strengths of piers have been computed using the pushover analysis results. Shear capacity of piers has been calculated using the guidelines of JRA. Lateral strengths have been determined depending on the failure modes of the piers. Displacement ductility of piers has been computed using yield and ultimate displacements of the piers obtained from the pushover analysis results. Selected earthquake time history is used in seismic safety evaluation of the flyover piers. Finally, the ductility design method is used to conduct the seismic safety evaluation of the piers with and without considering site amplification. From the numerical results, it has been revealed that the effects of site amplification on seismic safety evaluation of bridge structures should be carefully taken into account.Keywords: displacement ductility, flyover pier, lateral strength, safety evaluation, site amplification
Procedia PDF Downloads 169804 Utilization of CD-ROM Database as a Storage and Retrieval System by Students of Nasarawa State University Keffi
Authors: Suleiman Musa
Abstract:
The utilization of CD-ROM as a storage and retrieval system by Nasarawa State University Keffi (NSUK) Library is crucial in preserving and dissemination of information to students and staff. This study investigated the utilization of CD-ROM Database storage and retrieval system by students of NUSK. Data was generated using structure questionnaire. One thousand and fifty two (1052) respondents were randomly selected among post-graduate and under-graduate students. Eight hundred and ten (810) questionnaires were returned, but only five hundred and ninety three (593) questionnaires were well completed and useful. The study found that post-graduate students use CD-ROM Databases more often than the under-graduate students in NSUK. The result of the study revealed that knowledge about CD-ROM Database 33.22% got it through library staff. 29.69% use CD-ROM once a month. Large number of users 45.70% purposely uses CD-ROM Databases for study and research. In fact, lack of users’ orientation amount to 58.35% of problems faced, while 31.20% lack of trained staff make it more difficult for utilization of CD-ROM Database. Major numbers of users 38.28% are neither satisfied nor dissatisfied, while a good number of them 27.99% are satisfied. Then 1.52% is highly dissatisfied but could not give reasons why. However, to ensure effective utilization of CD-ROM Database storage and retrieval system by students of NSUK, the following recommendations are made: effort should be made to encourage under-graduate in using CD-ROM Database. The institution should conduct orientation/induction course for students on CD-ROM Databases in the library. There is need for NSUK to produce in house databases on their CD-ROM for easy access by users.Keywords: utilization, CD-ROM databases, storage, retrieval, students
Procedia PDF Downloads 445803 Numerical Study of Jet Impingement Heat Transfer
Authors: A. M. Tiara, Sudipto Chakraborty, S. K. Pal
Abstract:
Impinging jets and their different configurations are important from the viewpoint of the fluid flow characteristics and their influence on heat transfer from metal surfaces due to their complex flow characteristics. Such flow characteristics results in highly variable heat transfer from the surface, resulting in varying cooling rates which affects the mechanical properties including hardness and strength. The overall objective of the current research is to conduct a fundamental investigation of the heat transfer mechanisms for an impinging coolant jet. Numerical simulation of the cooling process gives a detailed analysis of the different parameters involved even though employing Computational Fluid Dynamics (CFD) to simulate the real time process, being a relatively new research area, poses many challenges. The heat transfer mechanism in the current research is actuated by jet cooling. The computational tool used in the ongoing research for simulation of the cooling process is ANSYS Workbench software. The temperature and heat flux distribution along the steel strip with the effect of various flow parameters on the heat transfer rate can be observed in addition to determination of the jet impingement patterns, which is the major aim of the present analysis. Modelling both jet and air atomized cooling techniques using CFD methodology and validating with those obtained experimentally- including trial and error with different models and comparison of cooling rates from both the techniques have been included in this work. Finally some concluding remarks are made that identify some gaps in the available literature that have influenced the path of the current investigation.Keywords: CFD, heat transfer, impinging jets, numerical simulation
Procedia PDF Downloads 235802 Free and Open Source Software for BIM Workflow of Steel Structure Design
Authors: Danilo Di Donato
Abstract:
The continuous new releases of free and open source software (FOSS) and the high costs of proprietary software -whose monopoly is characterized by closed codes and the low level of implementation and customization of software by end-users- impose a reflection on possible tools that can be chosen and adopted for the design and the representation of new steel constructions. The paper aims to show experimentation carried out to verify the actual potential and the effective applicability of FOSS supports to the BIM modeling of steel structures, particularly considering the goal of a possible workflow in order to achieve high level of development (LOD); allow effective interchange methods between different software. To this end, the examined software packages are those with open source or freeware licenses, in order to evaluate their use in architectural praxis. The test has primarily involved the experimentation of Freecad -the only Open Source software that allows a complete and integrated BIM workflow- and then the results have been compared with those of two proprietary software, Sketchup and TeklaBim Sight, which are released with a free version, but not usable for commercial purposes. The experiments carried out on Open Source, and freeware software was then compared with the outcomes that are obtained by two proprietary software, Sketchup Pro and Tekla Structure which has special modules particularly addressed to the design of steel structures. This evaluation has concerned different comparative criteria, that have been defined on the basis of categories related to the reliability, the efficiency, the potentiality, achievable LOD and user-friendliness of the analyzed software packages. In order to verify the actual outcomes of FOSS BIM for the steel structure projects, these results have been compared with a simulation related to a real case study and carried out with a proprietary software BIM modeling. Therefore, the same design theme, the project of a shelter of public space, has been developed using different software. Therefore the purpose of the contribution is to assess what are the developments and potentialities inherent in FOSS BIM, in order to estimate their effective applicability to professional practice, their limits and new fields of research they propose.Keywords: BIM, steel buildings, FOSS, LOD
Procedia PDF Downloads 174801 Dido: An Automatic Code Generation and Optimization Framework for Stencil Computations on Distributed Memory Architectures
Authors: Mariem Saied, Jens Gustedt, Gilles Muller
Abstract:
We present Dido, a source-to-source auto-generation and optimization framework for multi-dimensional stencil computations. It enables a large programmer community to easily and safely implement stencil codes on distributed-memory parallel architectures with Ordered Read-Write Locks (ORWL) as an execution and communication back-end. ORWL provides inter-task synchronization for data-oriented parallel and distributed computations. It has been proven to guarantee equity, liveness, and efficiency for a wide range of applications, particularly for iterative computations. Dido consists mainly of an implicitly parallel domain-specific language (DSL) implemented as a source-level transformer. It captures domain semantics at a high level of abstraction and generates parallel stencil code that leverages all ORWL features. The generated code is well-structured and lends itself to different possible optimizations. In this paper, we enhance Dido to handle both Jacobi and Gauss-Seidel grid traversals. We integrate temporal blocking to the Dido code generator in order to reduce the communication overhead and minimize data transfers. To increase data locality and improve intra-node data reuse, we coupled the code generation technique with the polyhedral parallelizer Pluto. The accuracy and portability of the generated code are guaranteed thanks to a parametrized solution. The combination of ORWL features, the code generation pattern and the suggested optimizations, make of Dido a powerful code generation framework for stencil computations in general, and for distributed-memory architectures in particular. We present a wide range of experiments over a number of stencil benchmarks.Keywords: stencil computations, ordered read-write locks, domain-specific language, polyhedral model, experiments
Procedia PDF Downloads 127800 Shear Behavior of Reinforced Concrete Beams Casted with Recycled Coarse Aggregate
Authors: Salah A. Aly, Mohammed A. Ibrahim, Mostafa M. khttab
Abstract:
The amount of construction and demolition (C&D) waste has increased considerably over the last few decades. From the viewpoint of environmental preservation and effective utilization of resources, crushing C&D concrete waste to produce coarse aggregate (CA) with different replacement percentage for the production of new concrete is one common means for achieving a more environment-friendly concrete. In the study presented herein, the investigation was conducted in two phases. In the first phase, the selection of the materials was carried out and the physical, mechanical and chemical characteristics of these materials were evaluated. Different concrete mixes were designed. The investigation parameter was Recycled Concrete Aggregate (RCA) ratios. The mechanical properties of all mixes were evaluated based on compressive strength and workability results. Accordingly, two mixes have been chosen to be used in the next phase. In the second phase, the study of the structural behavior of the concrete beams was developed. Sixteen beams were casted to investigate the effect of RCA ratios, the shear span to depth ratios and the effect of different locations and reinforcement of openings on the shear behavior of the tested specimens. All these beams were designed to fail in shear. Test results of the compressive strength of concrete indicated that, replacement of natural aggregate by up to 50% recycled concrete aggregates in mixtures with 350 Kg/m3 cement content led to increase of concrete compressive strength. Moreover, the tensile strength and the modulus of elasticity of the specimens with RCA have very close values to those with natural aggregates. The ultimate shear strength of beams with RCA is very close to those with natural aggregates indicating the possibility of using RCA as partial replacement to produce structural concrete elements. The validity of both the Egyptian Code for the design and implementation of Concrete Structures (ECCS) 203-2007 and American Concrete Institute (ACI) 318-2011Codes for estimating the shear strength of the tested RCA beams was investigated. It was found that the codes procedures gives conservative estimates for shear strength.Keywords: construction and demolition (C&D) waste, coarse aggregate (CA), recycled coarse aggregates (RCA), opening
Procedia PDF Downloads 392799 The Cleaning Equipment to Prevents Dust Diffusion of Bus Air Filters
Authors: Jiraphorn Satechan, Thanaphon Khamthieng, Warunee Phanwong
Abstract:
This action research aimed at designing and developing the cleaning equipment to preventing dust diffusion of bus air filter. Quantitative and qualitative data collection methods were used to conduct data from October 1st, 2018 to September 30th, 2019. All of participants were male (100.0%) with aged 40- 49 years and 57.15%, of them finish bachelor degree. 71.43% of them was a driver and 57.15% of them had the working experience between 10 and 15 years. Research revealed that the participants assessed the quality of the bus air filter cleaning equipment for preventing dust diffusion at a moderate level (σ= 0.29), and 71.43 of them also suggested the development methods in order to improve the quality of bus air filters cleaning equipment as follows: 1) to install the circuit breaker for cutting the electricity and controlling the on-off of the equipment and to change the motor to the DC system, 2) should install the display monitor for wind pressure and electricity system as well as to install the air pressure gauge, 3) should install the tank lid lock for preventing air leakage and dust diffusion by increasing the blowing force and sucking power, 4) to stabilize the holding points for preventing the filter shaking while rotating and blowing for cleaning and to reduce the rotation speed in order to allow the filters to move slowly for the air system to blow for cleaning more thoroughly, 5) the amount of dust should be measured before and after cleaning and should be designed the cleaning equipment to be able to clean with a variety of filters, and sizes. Moreover, the light-weight materials should be used to build the cleaning equipment and the wheels should be installed at the base of the equipment in order to make it easier to move.Keywords: Cleaning Equipment, Bus Air Filters, Preventing Dust Diffusion, Innovation
Procedia PDF Downloads 110798 Mining User-Generated Contents to Detect Service Failures with Topic Model
Authors: Kyung Bae Park, Sung Ho Ha
Abstract:
Online user-generated contents (UGC) significantly change the way customers behave (e.g., shop, travel), and a pressing need to handle the overwhelmingly plethora amount of various UGC is one of the paramount issues for management. However, a current approach (e.g., sentiment analysis) is often ineffective for leveraging textual information to detect the problems or issues that a certain management suffers from. In this paper, we employ text mining of Latent Dirichlet Allocation (LDA) on a popular online review site dedicated to complaint from users. We find that the employed LDA efficiently detects customer complaints, and a further inspection with the visualization technique is effective to categorize the problems or issues. As such, management can identify the issues at stake and prioritize them accordingly in a timely manner given the limited amount of resources. The findings provide managerial insights into how analytics on social media can help maintain and improve their reputation management. Our interdisciplinary approach also highlights several insights by applying machine learning techniques in marketing research domain. On a broader technical note, this paper illustrates the details of how to implement LDA in R program from a beginning (data collection in R) to an end (LDA analysis in R) since the instruction is still largely undocumented. In this regard, it will help lower the boundary for interdisciplinary researcher to conduct related research.Keywords: latent dirichlet allocation, R program, text mining, topic model, user generated contents, visualization
Procedia PDF Downloads 187797 Geological Mapping of Gabel Humr Akarim Area, Southern Eastern Desert, Egypt: Constrain from Remote Sensing Data, Petrographic Description and Field Investigation
Authors: Doaa Hamdi, Ahmed Hashem
Abstract:
The present study aims at integrating the ASTER data and Landsat 8 data to discriminate and map alteration and/or mineralization zones in addition to delineating different lithological units of Humr Akarim Granites area. The study area is located at 24º9' to 24º13' N and 34º1' to 34º2'45"E., covering a total exposed surface area of about 17 km². The area is characterized by rugged topography with low to moderate relief. Geologic fieldwork and petrographic investigations revealed that the basement complex of the study area is composed of metasediments, mafic dikes, older granitoids, and alkali-feldspar granites. Petrographic investigations revealed that the secondary minerals in the study area are mainly represented by chlorite, epidote, clay minerals and iron oxides. These minerals have specific spectral signatures in the region of visible near-infrared and short-wave infrared (0.4 to 2.5 µm). So that the ASTER imagery processing was concentrated on VNIR-SWIR spectrometric data in order to achieve the purposes of this study (geologic mapping of hydrothermal alteration zones and delineate possible radioactive potentialities). Mapping of hydrothermal alterations zones in addition to discriminating the lithological units in the study area are achieved through the utilization of some different image processing, including color band composites (CBC) and data transformation techniques such as band ratios (BR), band ratio codes (BRCs), principal component analysis(PCA), Crosta Technique and minimum noise fraction (MNF). The field verification and petrographic investigation confirm the results of ASTER imagery and Landsat 8 data, proposing a geological map (scale 1:50000).Keywords: remote sensing, petrography, mineralization, alteration detection
Procedia PDF Downloads 164796 Judicial Independence and Preservation of the Rule of Law in Africa: The Case of South Africa
Authors: Mbuzeni Mathenjwa
Abstract:
Upon their independence, most African countries adopted constitutions that proclaim respect for the rule of law. The decision to constitutionalise the rule of law is basically informed by the countries’ experience during the colonial era which was characterised by discrimination on various grounds including race, gender and religion. Despite the promise to be bound by and adhere to the rule of law, disrespect for the rule of law has become a norm in the African continent. This is evident from the reported incidence of abuse of power, failure to perform obligations imposed by law and flagrant disregard of the law by the Executive including the heads of states in the continent. In some African countries including South Africa, the courts of law have been approached to rule on the legality of the decisions of the executives, taken contrary to the prescripts of the law. South African Courts have laid down a number of decisions wherein they found that the conduct of the executive contravenes the rule of law. Consequently decisions of the executive have been declared invalid by courts. In this regard courts have become a safety net in preserving the rule of law in. Accordingly, this paper discusses the role of the courts in preserving the rule of law in Africa. This it does by explaining the notion of judicial independence and the doctrine of the rule of law. The explanation on the notion of judicial independence is relevant because only an independent judiciary can effectively review and set aside the decision of the executive including the president of a country. Furthermore, a comparative overview of the enforcement of the rule of law in African countries is done. The methods used for this research is literature review, and study of legislation and case law in selected African countries relating to the independence of the judiciary and the rule of law. Finally, a conclusion is drawn on the role of the independent judiciary to preserve the rule of law in Africa.Keywords: Africa, constitutions, independence, judiciary
Procedia PDF Downloads 291795 Views of Middle-Aged Women in Malaysia towards Menopause: A Qualitative Study
Authors: Halimatus Sakdiah Minhat, Hamizah Sulaiman
Abstract:
Introduction: Old age is commonly link with menopause among women. The main purpose of this study is to explore the views of middle-aged women and its association with menopause. Methods: Qualitative interviews in the form of focus group discussions (FGD) were conducted among women aged between 35 and 59 years old living in urban localities in two different states in Malaysia. Selection of respondents were conducted using the maximum variation sampling, focussing on five age categories which are between 35 to 39, 40 to 44, 45 to 49, 50 to 54 and 55 to 59 years old. Each FGD involved 5 to 7 respondents and lasted for 1 to 2 hours each. The content of the interviews were recorded, transcribed verbatim after each interview before the next focus group discussion is conducted. Field notes of reflexive observations were recorded by the rapporteur. Individual transcripts were analysed using standard methods of qualitative thematic analysis. The material was read through twice and later coded. The codes were further collapsed into several key themes related to perceptions towards menopause among the respondents. Results: A total number of 36 middle-aged women were consented for the interviews. The contents of the interviews revealed that younger women tend to associate menopause with being old, which were dominated by the younger aged categories of less than 50 years old. Majority of the respondents linked menopause with end of woman’s reproductive capacity or inability to give birth, lethargic or endless feeling of tiredness and insomnia, emotional instability or having more sensitive feelings and also the beginning of many health problems such as osteoarthritis which they perceived very synonyms with being old. Conclusion: The findings of this study indirectly reflect the negative views towards menopause among the middle-aged women in Malaysia. Being residents in the urban areas equipped with advanced technology and health information, do not exclude them from having negative views about menopause. However, this is a qualitative study which only focussing on age ranges, regardless of their socioeconomic and demographic background, which make further studies on related issues are necessaries. The fact that it was a qualitative interview, the findings could not be generalised and only specific to the targeted population.Keywords: Menopause, Middle-aged women, old, Malaysia
Procedia PDF Downloads 292794 The Digital Living Archive and the Construction of a Participatory Cultural Memory in the DARE-UIA Project: Digital Environment for Collaborative Alliances to Regenerate Urban Ecosystems in Middle-Sized Cities
Authors: Giulia Cardoni, Francesca Fabbrii
Abstract:
Living archives perform a function of social memory sharing, which contributes to building social bonds, communities, and identities. This potential lies in the ability to live archives to put together an archival function, which allows the conservation and transmission of memory with an artistic, performative and creative function linked to the present. As part of the DARE-UIA (Digital environment for collaborative alliances to regenerate urban ecosystems in middle-sized cities) project the creation of a living digital archive made it possible to create a narrative that would consolidate the cultural memory of the Darsena district of the city of Ravenna. The aim of the project is to stimulate the urban regeneration of a suburban area of a city, enhancing its cultural memory and identity heritage through digital heritage tools. The methodology used involves various digital storytelling actions necessary for the overall narrative using georeferencing systems (GIS), storymaps and 3D reconstructions for a transversal narration of historical content such as personal and institutional historical photos and to enhance the industrial archeology heritage of the neighborhood. The aim is the creation of an interactive and replicable narrative in similar contexts to the Darsena district in Ravenna. The living archive, in which all the digital contents are inserted, finds its manifestation towards the outside in the form of a museum spread throughout the neighborhood, making the contents usable on smartphones via QR codes and totems inserted on-site, creating thematic itineraries spread around the neighborhood. The construction of an interactive and engaging digital narrative has made it possible to enhance the material and immaterial heritage of the neighborhood by recreating the community that has historically always distinguished it.Keywords: digital living archive, digital storytelling, GIS, 3D, open-air museum, urban regeneration, cultural memory
Procedia PDF Downloads 106793 'I'm in a Very Safe Place': Webcam Sex Workers in Aotearoa, New Zealand and Their Perceptions of Danger and Risk
Authors: Madeline V. Henry
Abstract:
Sex work is a contested subject in academia. Many authors now argue that the practice should be recognized as a legitimate and rationally chosen form of labor, and that decriminalization is necessary to ensure the safety of sex workers and reduce their stigmatization. However, a prevailing argument remains that the work is inherently violent and oppressive and that all sex workers are directly or indirectly coerced into participating in the industry. This argument has been complicated by the recent proliferation of computer-mediated technologies that allow people to conduct sex work without the need to be physically co-present with customers or pimps. One example of this is the practice of ‘camming’, wherein ‘webcam models’ stream themselves stripping and/or performing autoerotic stimulation in an online chat-room for payment. In this presentation, interviews with eight ‘camgirls’ (aged 22-34) will be discussed. Their talk has been analyzed using Foucauldian discourse analysis, focusing on common discursive threads in relation to the work and their subjectivities. It was found that the participants demonstrated appreciation for the lack of physical danger they were in, but emphasized the unique and significant dangers of online-based sex work (their images and videos being recorded and shared without their consent, for example). Participants also argued that their largest concerns were based around stigma, which they claimed remained prevalent despite the decriminalized legal model in Aotearoa/New Zealand (which has been in place for over 14 years). Overall, this project seeks to challenge commonplace academic approaches to sex work, adding further research to support sex workers’ rights and highlighting new issues to consider in a digital environment.Keywords: camming, sex work, stigma, risk
Procedia PDF Downloads 155792 Association of Clostridium difficile Infection and Bone Cancer
Authors: Daniela Prado, Lexi Frankel, Amalia Ardeljan, Lokesh Manjani, Matthew Cardeiro, Omar Rashid
Abstract:
Background: Clostridium difficile (C. diff) is a gram-positive bacterium that is known to cause life-threatening diarrhea and severe inflammation of the colon. It originates as an alteration of the gut microbiome and can be transmitted through spores. Recent studies have shown a high association between the development of C. diff in cancer patients due to extensive hospitalization. However, research is lacking regarding C. diff’s association in the causation or prevention of cancer. The objective of this study was to therefore assess the correlation between Clostridium difficile infection (CDI) and the incidence of bone cancer. Methods: This retrospective analysis used data provided by a Health Insurance Portability and Accountability Act (HIPAA) compliant national database to evaluate the patients infected versus patients not infected with C. diff using ICD-10 and ICD-9 codes. Access to the database was granted by the Holy Cross Health, Fort Lauderdale, for the purpose of academic research. Standard statistical methods were used. Results: Between January 2010 and December 2019, the query was analyzed and resulted in 78863 patients in both the infected and control group, respectively. The two groups were matched by age range and CCI score. The incidence of bone cancer was 659 patients (0.835%) in the C. diff group compared to 1941 patients (2.461%) in the control group. The difference was statistically significant by a P-value < 2.2x10^-16 with an odds ratio (OR)= 0.33 (0.31-0.37) with a 95% confidence interval (CI). Treatment for CDI was analyzed for both C. diff infected and noninfected populations. 91 out of 16,676 (0.55%) patients with a prior C. diff infection and treated with antibiotics were compared to the control group were 275 out of 16,676 (1.65%) patients with no history of CDI and received antibiotic treatment. Results remained statistically significant by P-value <2.2x10-16 with an OR= 0.42 (0.37, 0.48). and a 95% CI. Conclusion: The study shows a statistically significant correlation between C. diff and a reduced incidence of bone cancer. Further evaluation is recommended to assess the potential of C. difficile in reducing bone cancer incidence.Keywords: bone cancer, colitis, clostridium difficile, microbiome
Procedia PDF Downloads 277791 Comparative Study of Vertical and Horizontal Triplex Tube Latent Heat Storage Units
Authors: Hamid El Qarnia
Abstract:
This study investigates the impact of the eccentricity of the central tube on the thermal and fluid characteristics of a triplex tube used in latent heat energy storage technologies. Two triplex tube orientations are considered in the proposed study: vertical and horizontal. The energy storage material, which is a phase change material (PCM), is placed in the space between the inside and outside tubes. During the thermal energy storage period, a heat transfer fluid (HTF) flows inside the two tubes, transmitting the heat to the PCM through two heat exchange surfaces instead of one heat exchange surface as it is the case for double tube heat storage systems. A CFD model is developed and validated against experimental data available in the literature. The mesh independency study is carried out to select the appropriate mesh. In addition, different time steps are examined to determine a time step ensuring accuracy of the numerical results and reduction in the computational time. The numerical model is then used to conduct numerical investigations of the thermal behavior and thermal performance of the storage unit. The effects of eccentricity of the central tube and HTF mass flow rate on thermal characteristics and performance indicators are examined for two flow arrangements: co-current and counter current flows. The results are given in terms of isotherm plots, streamlines, melting time and thermal energy storage efficiency.Keywords: energy storage, heat transfer, melting, solidification
Procedia PDF Downloads 56790 A Comparative, Epidemiological Study of Acute Renal Colic Presentations to Major Academic Emergency Departments in Doha, Qatar and Melbourne, Australia
Authors: Sameer A. Pathan, Biswadev Mitra, Zain A. Bhutta, Isma Qureshi, Elle Spencer, Asmaa A. Hameed, Sana Nadeem, Ramsha Tahir, Shahzad Anjum, Peter A. Cameron
Abstract:
Background: This study aimed to compare epidemiology, clinical presentations, management and outcomes of renal colic presentations in two major academic centers and discuss potential implications of these results for the applicability of current evidence in the management of renal colic. Methods: We undertook a retrospective cohort study of patients with renal colic who presented to the Hamad General Hospital Emergency Department (HGH-ED), Qatar, and The Alfred ED, Melbourne, Australia, during a period of one year from August 1, 2012, to July 3, 2013. Cases were identified using ICD-9-CM codes, and an electronic template was used to record the data on predefined clinical variables. Results: A total of 12,223 from the HGH-ED and 384 from The Alfred ED were identified as renal colic presentations during the study period. The rate of renal colic presentations at the HGH-ED was 27.9 per 1000 ED visits compared to 6.7 per 1000 ED visits at The Alfred ED. Patients presenting to the HGH-ED were significantly younger [34.9 years (29.0- 43.4) than The Alfred ED [48 years (37-60); P < 0.001]. The median stone size was larger in the HGH-ED group [6 (4-8) mm] versus The Alfred ED group [4 (3-6) mm, P < 0.001]. The intervention rate in the stone-positive population was significantly higher in the HGH-ED group as opposed to The Alfred ED group (38.7% versus 11.9%, p<0.001). At the time of discharge, The Alfred ED group received less analgesic prescriptions (55.8% versus 83.5%, P < 0.001) and more tamsulosin prescriptions (25.3% versus 11.7%, P < 0.001). Conclusions: Renal colic presentations to the HGH-ED, Qatar, were younger, with larger stone size, compared to The Alfred ED, whereas, medical expulsion therapy use was higher at the Alfred ED. Differences in epidemiology should be considered while tailoring strategies for effective management of patients with renal colic in the given setting.Keywords: kidney stones, urolithiasis, nephrolithiasis, renal colic, epidemiology
Procedia PDF Downloads 241789 Molecular Epidemiology of Rotavirus in Post-Vaccination Era in Pediatric Patients with Acute Gastroenteritis in Thailand
Authors: Nutthawadee Jampanil, Kattareeya Kumthip, Niwat Maneekarn, Pattara Khamrin
Abstract:
Rotavirus A is one of the leading causes of acute gastroenteritis in children younger than five years of age, especially in low-income countries in Africa and South Asia. Two live-attenuated oral rotavirus vaccines, Rotarix and RotaTeq, have been introduced into routine immunization programs in many countries and have proven highly effective in reducing the burden of rotavirus-associated morbidity and mortality. In Thailand, Rotarix and RotaTeq vaccines have been included in the national childhood immunization program since 2020. The objectives of this research are to conduct a molecular epidemiological study and to characterize rotavirus genotypes circulating in pediatric patients with acute diarrhea in Chiang Mai, Thailand, from 2020-2022 after the implementation of rotavirus vaccines. Out of 858 stool specimens, 26 (3.0%) were positive for rotavirus A. G3P[8] (23.0%) was detected as the most predominant genotype, followed by G1P[8] (19.2%), G8P[8] (19.2%), G9P[8] (15.3%), G2P[4] (7.7%), G1P[6] (3.9%), G9P[4] (3.9%), and G8P[X] (3.9%). In addition, the uncommon rotavirus strain G3P[23] (3.9%) was also detected in this study, and this G3P[23] strain displayed a genetic background similar to the porcine rotavirus. In conclusion, there was a dramatic change in the prevalence of rotavirus A infection and the diversity of rotavirus A genotypes in pediatric patients in Chiang Mai, Northern Thailand, in the rotavirus post-vaccination period. The finding obtained from this research contributes to a better understanding of rotavirus epidemiology after rotavirus vaccine introduction. Furthermore, the identification of unusual G and P genotype combination strains provides significant evidence for the potential interspecies transmission between human and animal rotaviruses.Keywords: rotavirus, infectious disease, gastroenteritis, Thailand
Procedia PDF Downloads 67788 Deciphering the Gut Microbiome's Role in Early-Life Immune Development
Authors: Xia Huo
Abstract:
Children are more vulnerable to environmental toxicants compared to adults, and their developing immune system is among the most sensitive targets regarding toxicity of environmental toxicants. Studies have found that exposure to environmental toxicants is associated with impaired immune function in children, but only a few studies have focused on the relationship between environmental toxicant exposure and vaccine antibody potency and immunoglobulin (Ig) levels in children. These studies investigated the associations of exposure to polychlorinated biphenyls (PCBs), perfluorinated compounds (PFCs), heavy metals (Pb, Cd, As, Hg) and PM2.5 with the serum-specific antibody concentrations and Ig levels against different vaccines, such as anti-Hib, tetanus, diphtheria toxoid, and analyze the possible mechanisms underlying exposure-related alterations of antibody titers and Ig levels against different vaccines. Results suggest that exposure to these toxicants is generally associated with decreased potency of antibodies produced from childhood immunizations and an overall deficiency in the protection the vaccines provide. Toxicant exposure is associated with vaccination failure and decreased antibody titers, and increased risk of immune-related diseases in children by altering specific immunoglobulin levels. Age, sex, nutritional status, and co-exposure may influence the effects of toxicants on the immune function in children. Epidemiological evidence suggests that exposure-induced changes to humoral immunerelated tissue/cells/molecules response to vaccines may have predominant roles in the inverse associations between antibody responsiveness to vaccines and environmental toxicants. These results help us to conduct better immunization policies for children under environmental toxicant burden.Keywords: environmental toxicants, immunotoxicity, vaccination, antibodies, children's health
Procedia PDF Downloads 59787 Artificial Intelligence Assisted Sentiment Analysis of Hotel Reviews Using Topic Modeling
Authors: Sushma Ghogale
Abstract:
With a surge in user-generated content or feedback or reviews on the internet, it has become possible and important to know consumers' opinions about products and services. This data is important for both potential customers and businesses providing the services. Data from social media is attracting significant attention and has become the most prominent channel of expressing an unregulated opinion. Prospective customers look for reviews from experienced customers before deciding to buy a product or service. Several websites provide a platform for users to post their feedback for the provider and potential customers. However, the biggest challenge in analyzing such data is in extracting latent features and providing term-level analysis of the data. This paper proposes an approach to use topic modeling to classify the reviews into topics and conduct sentiment analysis to mine the opinions. This approach can analyse and classify latent topics mentioned by reviewers on business sites or review sites, or social media using topic modeling to identify the importance of each topic. It is followed by sentiment analysis to assess the satisfaction level of each topic. This approach provides a classification of hotel reviews using multiple machine learning techniques and comparing different classifiers to mine the opinions of user reviews through sentiment analysis. This experiment concludes that Multinomial Naïve Bayes classifier produces higher accuracy than other classifiers.Keywords: latent Dirichlet allocation, topic modeling, text classification, sentiment analysis
Procedia PDF Downloads 97786 Family Living with Adolescent Mother: The Consequential Effects of Adolescent Pregnancy
Authors: Somsakhool Neelasmith, Darunee Jongudomkarn, Rutja Phuphaibul
Abstract:
Adolescent pregnancy is a major global concern including Thailand, which has long adopted policies and solutions to prevent such problem. Family is one of the key strategies to drive policy achievement whereas the various families and regional differences will be challenges. This article reports a preliminary study finding using qualitative case study methods, aiming to explore the situation of families living with adolescent mother in the North Eastern of Thailand or ISAN. Data were collected by in-depth interview with six key informants; five adolescent mothers age 14- 19 years and one mother in law of adolescent mother during November to December of 2017. The preliminary suggests that firstly, the adolescent pregnancy was found to be one of the significant issues among most of the families and that adolescent mothers and their family perceived other families were also faced with this problem with despite different conditions. Secondly, the parents assumed simultaneous roles as both parents and grandparents when one of their adolescent girls became an adolescent mother. Lastly, when perceiving that their adolescent daughter became pregnant, families addressed this issue by compromise with the related parties to maintain family and social relationship. This situation can be a potential intractable problem to adolescents and their families. Families may suffer from adolescent pregnancy with respect to health, economy and other family burdens. Moreover, the national development may be affected or delayed since this group of people is considered promising human resource. It is therefore required to further conduct in-depth research to cope with this issue particularly about the policies related to adolescent pregnancy.Keywords: adolescent mother, adolescent pregnancy, consequential effect, family living with adolescent mother
Procedia PDF Downloads 278785 Navigating Government Finance Statistics: Effortless Retrieval and Comparative Analysis through Data Science and Machine Learning
Authors: Kwaku Damoah
Abstract:
This paper presents a methodology and software application (App) designed to empower users in accessing, retrieving, and comparatively exploring data within the hierarchical network framework of the Government Finance Statistics (GFS) system. It explores the ease of navigating the GFS system and identifies the gaps filled by the new methodology and App. The GFS, embodies a complex Hierarchical Network Classification (HNC) structure, encapsulating institutional units, revenues, expenses, assets, liabilities, and economic activities. Navigating this structure demands specialized knowledge, experience, and skill, posing a significant challenge for effective analytics and fiscal policy decision-making. Many professionals encounter difficulties deciphering these classifications, hindering confident utilization of the system. This accessibility barrier obstructs a vast number of professionals, students, policymakers, and the public from leveraging the abundant data and information within the GFS. Leveraging R programming language, Data Science Analytics and Machine Learning, an efficient methodology enabling users to access, navigate, and conduct exploratory comparisons was developed. The machine learning Fiscal Analytics App (FLOWZZ) democratizes access to advanced analytics through its user-friendly interface, breaking down expertise barriers.Keywords: data science, data wrangling, drilldown analytics, government finance statistics, hierarchical network classification, machine learning, web application.
Procedia PDF Downloads 69784 Senior Entrepreneurship and the Takeover of Family Businesses: The Case of Moroccan Family-Owned Small Medium-Sized Enterprises
Authors: Brahim Ouzaka, Said Ouhadi
Abstract:
Family businesses (FB) represent the oldest and most resilient form of organization. However, they are weakened by problems of entrepreneurial discontinuity. The objective of this paper is to analyze the problem of the succession of FBs created by senior entrepreneurs. This study analyzes and explores the constructs of senior entrepreneurship and the strategy and takeover policies of the Moroccan Family owned Small and Medium-Sized Businesses. Our main research question is formulated as follows: how does senior entrepreneurship promote the takeover of Moroccan family SMEs? So we aim through this study to analyze the challenge of the takeover of the FB created by senior entrepreneurs in order to explore and understand the specificities, choices and strategies as well as the reality of the takeover process among this category of senior entrepreneurs. After a review of the literature on the relationship between the constructs of senior entrepreneurship and the takeover of FBs, the empirical study will consist of an exploratory qualitative approach of 3 family SMEs created by senior entrepreneurs and subsequently transmitted to their descendants. This qualitative research serves to explore the choices, the strategies as well as the specificities of the entrepreneurial acts and processes of this category of entrepreneurs. The interviews were conducted with senior entrepreneurs and successors of three Moroccan family SMEs, focusing on the specificity of entrepreneurial actions and strategies in the case of SMEs launched by senior entrepreneurs and on the reality of the conduct and preparation of the takeover process, the methods of socialization and training of buyers in the context of these companies.Keywords: senior entrepreneurship, family SME, family business, takeover
Procedia PDF Downloads 87783 Value Relevance of Good Governance: A Study on Listed Companies in the UK
Authors: Ashiqul Amin Khan, Mohsin Ul Amin Khan
Abstract:
The aim of this research is to find the relationship between good governance and shareholder wealth maximisation. The concept of good governance has become more objective in nature over time through various regulations, professionalisation, and practices. This has led to a number of methods for scoring and ranking corporate governance practices. Since shareholder wealth maximisation remains the key corporate goal for managers and governors alike, the effect of good governance in increasing the value of corporations is commented to be an important aspect. In measuring the value relevance of good governance, statistical measures of various yields of listed companies in the UK have been used in this research. Yields reflect required returns on investments from different investment tenets. Historical yields, calculated using historical fundamental data of such companies, reflect expected yields to a great extent. These yields, in turn, reflect the expected risk premium and growth associated with the stocks of the companies. Using fundamental data, the yields have been adjusted to reflect the risk premium required by the investors along various value paradigms. Good governance should naturally lead to lower required risk premium since good corporate governance provided assurance to the investors in terms of sustainability of future performance and desired financial conduct. This, in turn, increases the wealth of stockholders. The findings of this research confirm such nature of the relationship between good governance and value of the company in the long run.Keywords: corporate governance, good governance practices, short-termism, shareholder value relevance, wealth maximisation, yield
Procedia PDF Downloads 365782 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 96