Search results for: information security risk treatment
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24265

Search results for: information security risk treatment

13825 Investigating the Effect of the Pedagogical Agent on Visual Attention in Attention Deficit Hyperactivity Disorder Students

Authors: Nasrin Mohammadhasani, Rosa Angela Fabio

Abstract:

The attention to relevance information is the key element for learning. Otherwise, Attention Deficit Hyperactivity Disorder (ADHD) students have a fuzzy visual pattern that prevents them to attention and remember learning subject. The present study aimed to test the hypothesis that the presence of a pedagogical agent can effectively support ADHD learner's attention and learning outcomes in a multimedia learning environment. The learning environment was integrated with a pedagogical agent, named Koosha as a social peer. This study employed a pretest and posttest experimental design with control group. The statistical population was 30 boys students, age 10-11 with ADHD that randomly assigned to learn with/without an agent in well designed environment for mathematic. The results suggested that experimental and control groups show a significant difference in time when they participated and mathematics achievement. According to this research, using the pedagogical agent can enhance learning of ADHD students by gaining and guiding their attention to relevance information part on display, so it can be considered as asocial cue that provides theme cognitive supports.

Keywords: attention, computer assisted instruction, multimedia learning environment, pedagogical agent

Procedia PDF Downloads 307
13824 An Examination of the Effectiveness of iPad-Based Augmentative and Alternative Intervention on Acquisition, Generalization and Maintenance of the Requesting Information Skills of Children with Autism

Authors: Amaal Almigal

Abstract:

Technology has been argued to offer distinct advantages and benefits for teaching children with autism spectrum disorder (ASD) to communicate. One aspect of this technology is augmentative and alternative communication (AAC) systems such as picture exchange or speech generation devices. Whilst there has been significant progress in teaching these children to request their wants and needs with AAC, there remains a need for developing technologies that can really make a difference in teaching them to ask questions. iPad-based AAC can be effective for communication. However, the effectiveness of this type of AAC in teaching children to ask questions needs to be examined. Thus, in order to examine the effectiveness of iPad-based AAC in teaching children with ASD to ask questions, This research will test whether iPad leads to more learning than a traditional approach picture and text cards does. Two groups of children who use AAC will be taught to ask ‘What is it?’ questions. With the first group, low-tech AAC picture and text cards will be used, while an iPad-based AAC application called Proloquo2Go will be used with the second group. Interviews with teachers and parents will be conducted before and after the experiment. The children’s perspectives will also be considered. The initial outcomes of this research indicate that iPad can be an effective tool to help children with autism to ask questions.

Keywords: autism, communication, information, iPad, pictures, requesting

Procedia PDF Downloads 262
13823 Global Gender Differences in Job Satisfaction in the Hospitality Industry

Authors: Jonathan Hinton Westover, Maureen S. Andrade, Doug Miller

Abstract:

Research has been inconclusive in determining if men or women experience more job satisfaction. A global comparison examining extrinsic and intrinsic factors, work relations, and work-life balance determinants found few differences; however, work relations and work-life balance factors were more significant for male than female workers across occupations. The current study uses International Social Survey Program data representing 37 countries to explore gender differences in job satisfaction in the hospitality industry. Findings demonstrate that mean job satisfaction scores for females are lower across hospitality occupations except for hotel receptionists, housekeeping supervisors, and hotel cleaners. Regression results revealed additional differences such as the significance of co-worker relations, the negative impact of being discriminated against and harassed at work, working weekends, marital status, and supervisory status for women with autonomy, work stress, education, and employment relationship being more salient for men. Interesting work, work being useful to society, job security, pay, relations with management, and work interfering with family were significant for both males and females.

Keywords: job satisfaction, gender, hospitality, global comparisons

Procedia PDF Downloads 130
13822 PredictionSCMS: The Implementation of an AI-Powered Supply Chain Management System

Authors: Ioannis Andrianakis, Vasileios Gkatas, Nikos Eleftheriadis, Alexios Ellinidis, Ermioni Avramidou

Abstract:

The paper discusses the main aspects involved in the development of a supply chain management system using the newly developed PredictionSCMS software as a basis for the discussion. The discussion is focused on three topics: the first is demand forecasting, where we present the predictive algorithms implemented and discuss related concepts such as the calculation of the safety stock, the effect of out-of-stock days etc. The second topic concerns the design of a supply chain, where the core parameters involved in the process are given, together with a methodology of incorporating these parameters in a meaningful order creation strategy. Finally, the paper discusses some critical events that can happen during the operation of a supply chain management system and how the developed software notifies the end user about their occurrence.

Keywords: demand forecasting, machine learning, risk management, supply chain design

Procedia PDF Downloads 90
13821 Bibliometric Measures on Leveraging Technology to Mitigate the Impact of Covid-19 on Business

Authors: Olanrewaju Johnson Akinduntire

Abstract:

This paper investigates the statistical evaluation of books, citations, articles, journals and other publications in accounting and finance on leveraging technology to mitigate the impact of COVID-19 on business. The research proffers an appraisal of the impact of computerized accounting systems in pre and post pandemic era on activities of the formal and informal sectors, it analyzes the concept of computerized accounting systems, and it seeks to determine the impact of computerized of the overall activities of the informal sector. A special focus of this ICT strategy should be to demystify and promote the diffusion of ICT as a general-purpose technology to the informal sector. It is believed that the use of new technologies can be crucial to meeting the Millennium Development Goals (MDGs) in a timely and effective fashion. Consequent to these, there is a need to prevent the further marginalization of the informal sector by availing ICT services which are mixed appropriately and also properly located. By implication, this will help them access markets and other business information, which can enable or make their economic activities more vibrant and facilitate the availability of information about new opportunities. Conclusively, for one to understand the application of ICT and their locational dynamics in informal sector clusters, there is a need to comprehend and acknowledge the drivers and pressures leading to the adoption of new technology.

Keywords: COVID-19 , (MDGs) , ICT, bibliometric

Procedia PDF Downloads 179
13820 The Findings EEG-LORETA about Epilepsy

Authors: Leila Maleki, Ahmad Esmali Kooraneh, Hossein Taghi Derakhshi

Abstract:

Neural activity in the human brain starts from the early stages of prenatal development. This activity or signals generated by the brain are electrical in nature and represent not only the brain function but also the status of the whole body. At the present moment, three methods can record functional and physiological changes within the brain with high temporal resolution of neuronal interactions at the network level: the electroencephalogram (EEG), the magnet oencephalogram (MEG), and functional magnetic resonance imaging (fMRI); each of these has advantages and shortcomings. EEG recording with a large number of electrodes is now feasible in clinical practice. Multichannel EEG recorded from the scalp surface provides a very valuable but indirect information about the source distribution. However, deep electrode measurements yield more reliable information about the source locations، Intracranial recordings and scalp EEG are used with the source imaging techniques to determine the locations and strengths of the epileptic activity. As a source localization method, Low Resolution Electro-Magnetic Tomography (LORETA) is solved for the realistic geometry based on both forward methods, the Boundary Element Method (BEM) and the Finite Difference Method (FDM). In this paper, we review The findings EEG- LORETA about epilepsy.

Keywords: epilepsy, EEG, EEG-LORETA

Procedia PDF Downloads 540
13819 Nurse Schedule Problem in Mubarak Al Kabeer Hospital

Authors: Khaled Al-Mansour, Nawaf Esmael, Abdulaziz Al-Zaid, Mohammed Al Ateeqi, Ali Al-Yousfi, Sayed Al-Zalzalah

Abstract:

In this project we will create the new schedule of nurse according to the preference of them. We did our project in Mubarak Al Kabeer Hospital (in Kuwait). The project aims to optimize the schedule of nurses in Mubarak Al Kabeer Hospital. The schedule of the nurses was studied and understood well to do any modification for their schedule to make the nurses feel as much comfort as they are. First constraints were found to know what things we can change and what things we can’t, the hard constraints are the hospital and ministry policies where we can’t change anything about, and the soft constraints are things that make nurses more comfortable. Data were collected and nurses were interviewed to know what is more better for them. All these constraints and date have been formulated to mathematical equations. This report will first contain an introduction to the topic which includes details of the problem definition. It will also contain information regarding the optimization of a nurse schedule and its contents and importance; furthermore, the report will contain information about the data needed to solve the problem and how it was collected. The problem requires formulation and that is also to be shown. The methodology will be explained which will state what has already been done. We used the lingo software to find the best schedule for the nurse. The schedule has been made according to what the nurses prefer, and also took consideration of the hospital policy when we make the schedule.

Keywords: nurse schedule problem, Kuwait, hospital policy, optimization of schedules

Procedia PDF Downloads 265
13818 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups

Authors: John Hardy

Abstract:

Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.

Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism

Procedia PDF Downloads 289
13817 Strength Performance and Microstructure Characteristics of Natural Bonded Fiber Composites from Malaysian Bamboo

Authors: Shahril Anuar Bahari, Mohd Azrie Mohd Kepli, Mohd Ariff Jamaludin, Kamarulzaman Nordin, Mohamad Jani Saad

Abstract:

Formaldehyde release from wood-based panel composites can be very toxicity and may increase the risk of human health as well as environmental problems. A new bio-composites product without synthetic adhesive or resin is possible to be developed in order to reduce these problems. Apart from formaldehyde release, adhesive is also considered to be expensive, especially in the manufacturing of composite products. Natural bonded composites can be termed as a panel product composed with any type of cellulosic materials without the addition of synthetic resins. It is composed with chemical content activation in the cellulosic materials. Pulp and paper making method (chemical pulping) was used as a general guide in the composites manufacturing. This method will also generally reduce the manufacturing cost and the risk of formaldehyde emission and has potential to be used as an alternative technology in fiber composites industries. In this study, the natural bonded bamboo fiber composite was produced from virgin Malaysian bamboo fiber (Bambusa vulgaris). The bamboo culms were chipped and digested into fiber using this pulping method. The black liquor collected from the pulping process was used as a natural binding agent in the composition. Then the fibers were mixed and blended with black liquor without any resin addition. The amount of black liquor used per composite board was 20%, with approximately 37% solid content. The composites were fabricated using a hot press machine at two different board densities, 850 and 950 kg/m³, with two sets of hot pressing time, 25 and 35 minutes. Samples of the composites from different densities and hot pressing times were tested in flexural strength and internal bonding (IB) for strength performance according to British Standard. Modulus of elasticity (MOE) and modulus of rupture (MOR) was determined in flexural test, while tensile force perpendicular to the surface was recorded in IB test. Results show that the strength performance of the composites with 850 kg/m³ density were significantly higher than 950 kg/m³ density, especially for samples from 25 minutes hot pressing time. Strength performance of composites from 25 minutes hot pressing time were generally greater than 35 minutes. Results show that the maximum mean values of strength performance were recorded from composites with 850 kg/m³ density and 25 minutes pressing time. The maximum mean values for MOE, MOR and IB were 3251.84, 16.88 and 0.27 MPa, respectively. Only MOE result has conformed to high density fiberboard (HDF) standard (2700 MPa) in British Standard for Fiberboard Specification, BS EN 622-5: 2006. Microstructure characteristics of composites can also be related to the strength performance of the composites, in which, the observed fiber damage in composites from 950 kg/m³ density and overheat of black liquor led to the low strength properties, especially in IB test.

Keywords: bamboo fiber, natural bonded, black liquor, mechanical tests, microstructure observations

Procedia PDF Downloads 252
13816 A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)

Authors: Hafiza Khaddija Saman, Muhammad Sufyan

Abstract:

The increase in availability and popularity of mobile wireless devices has led researchers to develop a wide variety of Mobile Ad-hoc Networking (MANET) protocols to exploit the unique communication opportunities presented by these devices. Devices are able to communicate directly using the wireless spectrum in a peer-to-peer fashion, and route messages through intermediate nodes, however, the nature of wireless shared communication and mobile devices result in many routing and security challenges which must be addressed before deploying a MANET. In this paper, we investigate the range of MANET routing protocols available and discuss the functionalities of several ranging from early protocols such as DSDV to more advanced such as MAODV, our protocol study focuses upon works by Perkins in developing and improving MANET routing. A range of literature relating to the field of MANET routing was identified and reviewed, we also reviewed literature on the topic of securing AODV based MANETs as this may be the most popular MANET protocol. The literature review identified a number of trends within research papers such as exclusive use of the random waypoint mobility model, excluding key metrics from simulation results and not comparing protocol performance against available alternatives.

Keywords: protocol, MANET, ad-Hoc, communication

Procedia PDF Downloads 256
13815 Solving Definition and Relation Problems in English Navigation Terminology

Authors: Ayşe Yurdakul, Eckehard Schnieder

Abstract:

Because of the growing multidisciplinarity and multilinguality, communication problems in different technical fields grows more and more. Therefore, each technical field has its own specific language, terminology which is characterised by the different definition of terms. In addition to definition problems, there are also relation problems between terms. Among these problems of relation, there are the synonymy, antonymy, hypernymy/hyponymy, ambiguity, risk of confusion, and translation problems etc. Thus, the terminology management system iglos of the Institute for Traffic Safety and Automation Engineering of the Technische Universität Braunschweig has the target to solve these problems by a methodological standardisation of term definitions with the aid of the iglos sign model and iglos relation types. The focus of this paper should be on solving definition and relation problems between terms in English navigation terminology.

Keywords: iglos, iglos sign model, methodological resolutions, navigation terminology, common language, technical language, positioning, definition problems, relation problems

Procedia PDF Downloads 329
13814 Intelligent Wireless Patient Monitoring and Tracking System

Authors: Ch. Sandeep Kumar Subudhi, S. Sivanandam

Abstract:

Our system is to monitor the human body temperature, blood pressure (BP), Pulse Rate and ECG and tracking the patient location. In our system the body temperature is detected by using LM35 temperature sensor, blood pressure is detected by the BP sensor, pulse rate is detected by the ear plug pulse sensor and the ECG is detected by the three lead ECG sensor in the working environment of the patient. The sensed information is sent to the PIC16F877 microcontroller through signal conditioning circuit. A desired amount of sensor value is set and if it is exceeded preliminary steps should be taken by indication by buzzer. The sensor information will be transmitted from the patient unit to the main controller unit with the help of Zigbee communication medium which is connected with the microcontrollers in the both units. The main controller unit will send those sensor data as well as the location of that patient by the help of GPS module to the observer/doctor. The observer/doctor can receive the SMS sent by GSM module and further decision can be taken. The message is sent to a cell phone using global system mobile (GSM) Modem. MAX232 acts as a driver between microcontroller and modem.

Keywords: LM35, heart beat sensor, ECG Sensor, BP Sensor, Zigbee module, GSM module, GPS module, PIC16F877A microcontroller

Procedia PDF Downloads 378
13813 Communication Layer Security in Smart Farming: A Survey on Wireless Technologies

Authors: Hossein Mohammadi Rouzbahani, Hadis Karimipour, Evan Fraser, Ali Dehghantanha, Emily Duncan, Arthur Green, Conchobhair Russell

Abstract:

Human population growth has driven rising demand for food that has, in turn, imposed huge impacts on the environment. In an effort to reconcile our need to produce more sustenance while also protecting the world’s ecosystems, farming is becoming more reliant on smart tools and communication technologies. Developing a smart farming framework allows farmers to make more efficient use of inputs, thus protecting water quality and biodiversity habitat. Internet of Things (IoT), which has revolutionized every sphere of the economy, is being applied to agriculture by connecting on-farm devices and providing real-time monitoring of everything from environmental conditions to market signals through to animal health data. However, utilizing IoT means farming networks are now vulnerable to malicious activities, mostly when wireless communications are highly employed. With that in mind, this research aims to review different utilized communication technologies in smart farming. Moreover, possible cyber-attacks are investigated to discover the vulnerabilities of communication technologies considering the most frequent cyber-attacks that have been happened.

Keywords: smart farming, Internet of Things, communication layer, cyber-attack

Procedia PDF Downloads 240
13812 Probing Syntax Information in Word Representations with Deep Metric Learning

Authors: Bowen Ding, Yihao Kuang

Abstract:

In recent years, with the development of large-scale pre-trained lan-guage models, building vector representations of text through deep neural network models has become a standard practice for natural language processing tasks. From the performance on downstream tasks, we can know that the text representation constructed by these models contains linguistic information, but its encoding mode and extent are unclear. In this work, a structural probe is proposed to detect whether the vector representation produced by a deep neural network is embedded with a syntax tree. The probe is trained with the deep metric learning method, so that the distance between word vectors in the metric space it defines encodes the distance of words on the syntax tree, and the norm of word vectors encodes the depth of words on the syntax tree. The experiment results on ELMo and BERT show that the syntax tree is encoded in their parameters and the word representations they produce.

Keywords: deep metric learning, syntax tree probing, natural language processing, word representations

Procedia PDF Downloads 63
13811 Consumer Knowledge and Behavior in the Aspect of Food Waste

Authors: Katarzyna Neffe-Skocinska, Marzena Tomaszewska, Beata Bilska, Dorota Zielinska, Monika Trzaskowska, Anna Lepecka, Danuta Kolozyn-Krajewska

Abstract:

The aim of the study was to assess Polish consumer behavior towards food waste, including knowledge of information on food labels. The survey was carried out using the CAPI (computer assisted personal interview) method, which involves interviewing the respondent using mobile devices. The research group was a representative sample for Poland due to demographic variables: gender, age, place of residence. A total of 1.115 respondents participated in the study (51.1% were women and 48.9% were men). The questionnaire included questions on five thematic aspects: 1. General knowledge and sources of information on the phenomenon of food waste; 2. Consumption of food after the date of minimum durability; 3. The meanings of the phrase 'best before ...'; 4. Indication of the difference between the meaning of the words 'best before ...' and 'use by'; 5. Indications products marked with the phrase 'best before ...'. It was found that every second surveyed Pole met with the topic of food waste (54.8%). Among the respondents, the most popular source of information related to the research topic was television (89.4%), radio (26%) and the Internet (24%). Over a third of respondents declared that they consume food after the date of minimum durability. Only every tenth (9.8%) respondent does not pay attention to the expiry date and type of consumed products (durable and perishable products). Correctly 39.8% of respondents answered the question: How do you understand the phrase 'best before ...'? In the opinion of 42.8% of respondents, the statements 'best before ...' and 'use by' mean the same thing, while 36% of them think differently. In addition, more than one-fifth of respondents could not respond to the questions. In the case of products of the indication information 'best before ...', more than 40% of the respondents chosen perishable products, e.g., yoghurts and durable, e.g., groats. A slightly lower percentage of indications was recorded for flour (35.1%), sausage (32.8%), canned corn (31.8%), and eggs (25.0%). Based on the assessment of the behavior of Polish consumers towards the phenomenon of food waste, it can be concluded that respondents have elementary knowledge of the study subject. Noteworthy is the good conduct of most respondents in terms of compliance with shelf life and dates of minimum durability of food products. The publication was financed on the basis of an agreement with the National Center for Research and Development No. Gospostrateg 1/385753/1/NCBR/2018 for the implementation and financing of the project under the strategic research and development program social and economic development of Poland in the conditions of globalizing markets – GOSPOSTRATEG - acronym PROM.

Keywords: food waste, shelf life, dates of durability, consumer knowledge and behavior

Procedia PDF Downloads 168
13810 A Retrospective Cohort Study on an Outbreak of Gastroenteritis Linked to a Buffet Lunch Served during a Conference in Accra

Authors: Benjamin Osei Tutu, Sharon Annison

Abstract:

On 21st November, 2016, an outbreak of foodborne illness occurred after a buffet lunch served during a stakeholders’ consultation meeting held in Accra. An investigation was conducted to characterise the affected people, determine the etiologic food, the source of contamination and the etiologic agent and to implement appropriate public health measures to prevent future occurrences. A retrospective cohort study was conducted via telephone interviews, using a structured questionnaire developed from the buffet menu. A case was defined as any person suffering from symptoms of foodborne illness e.g. diarrhoea and/or abdominal cramps after eating food served during the stakeholder consultation meeting in Accra on 21st November, 2016. The exposure status of all the members of the cohort was assessed by taking the food history of each respondent during the telephone interview. The data obtained was analysed using Epi Info 7. An environmental risk assessment was conducted to ascertain the source of the food contamination. Risks of foodborne infection from the foods eaten were determined using attack rates and odds ratios. Data was obtained from 54 people who consumed food served during the stakeholders’ meeting. Out of this population, 44 people reported with symptoms of food poisoning representing 81.45% (overall attack rate). The peak incubation period was seven hours with a minimum and maximum incubation periods of four and 17 hours, respectively. The commonly reported symptoms were diarrhoea (97.73%, 43/44), vomiting (84.09%, 37/44) and abdominal cramps (75.00%, 33/44). From the incubation period, duration of illness and the symptoms, toxin-mediated food poisoning was suspected. The environmental risk assessment of the implicated catering facility indicated a lack of time/temperature control, inadequate knowledge on food safety among workers and sanitation issues. Limited number of food samples was received for microbiological analysis. Multivariate analysis indicated that illness was significantly associated with the consumption of the snacks served (OR 14.78, P < 0.001). No stool and blood or samples of etiologic food were available for organism isolation; however, the suspected etiologic agent was Staphylococcus aureus or Clostridium perfringens. The outbreak could probably be due to the consumption of unwholesome snack (tuna sandwich or chicken. The contamination and/or growth of the etiologic agent in the snack may be due to the breakdown in cleanliness, time/temperature control and good food handling practices. Training of food handlers in basic food hygiene and safety is recommended.

Keywords: Accra, buffet, conference, C. perfringens, cohort study, food poisoning, gastroenteritis, office workers, Staphylococcus aureus

Procedia PDF Downloads 227
13809 Forecasting the Influences of Information and Communication Technology on the Structural Changes of Japanese Industrial Sectors: A Study Using Statistical Analysis

Authors: Ubaidillah Zuhdi, Shunsuke Mori, Kazuhisa Kamegai

Abstract:

The purpose of this study is to forecast the influences of Information and Communication Technology (ICT) on the structural changes of Japanese economies based on Leontief Input-Output (IO) coefficients. This study establishes a statistical analysis to predict the future interrelationships among industries. We employ the Constrained Multivariate Regression (CMR) model to analyze the historical changes of input-output coefficients. Statistical significance of the model is then tested by Likelihood Ratio Test (LRT). In our model, ICT is represented by two explanatory variables, i.e. computers (including main parts and accessories) and telecommunications equipment. A previous study, which analyzed the influences of these variables on the structural changes of Japanese industrial sectors from 1985-2005, concluded that these variables had significant influences on the changes in the business circumstances of Japanese commerce, business services and office supplies, and personal services sectors. The projected future Japanese economic structure based on the above forecast generates the differentiated direct and indirect outcomes of ICT penetration.

Keywords: forecast, ICT, industrial structural changes, statistical analysis

Procedia PDF Downloads 374
13808 A Study on Using Network Coding for Packet Transmissions in Wireless Sensor Networks

Authors: Rei-Heng Cheng, Wen-Pinn Fang

Abstract:

A wireless sensor network (WSN) is composed by a large number of sensors and one or a few base stations, where the sensor is responsible for detecting specific event information, which is sent back to the base station(s). However, how to save electricity consumption to extend the network lifetime is a problem that cannot be ignored in the wireless sensor networks. Since the sensor network is used to monitor a region or specific events, how the information can be reliably sent back to the base station is surly important. Network coding technique is often used to enhance the reliability of the network transmission. When a node needs to send out M data packets, it encodes these data with redundant data and sends out totally M + R packets. If the receiver can get any M packets out from these M + R packets, it can decode and get the original M data packets. To transmit redundant packets will certainly result in the excess energy consumption. This paper will explore relationship between the quality of wireless transmission and the number of redundant packets. Hopefully, each sensor can overhear the nearby transmissions, learn the wireless transmission quality around it, and dynamically determine the number of redundant packets used in network coding.

Keywords: energy consumption, network coding, transmission reliability, wireless sensor networks

Procedia PDF Downloads 387
13807 The Role of MAOA Gene in the Etiology of Autism Spectrum Disorder in Males

Authors: Jana Kisková, Dana Gabriková

Abstract:

Monoamine oxidase A gene (MAOA) is suggested to be a candidate gene implicated in many neuropsychiatric disorders, including autism spectrum disorder (ASD). This meta-analytic review evaluates the relationship between ASD and MAOA markers such as 30 bp variable number tandem repeats in the promoter region (uVNTR) and single nucleotide polymorphisms (SNPs) by using findings from recently published studies. It seems that in Caucasian males, the risk of developing ASD increase with the presence of 4-repeat allele in the promoter region of MAOA gene whereas no differences were found between autistic patients and controls in Egyptian, West Bengal and Korean population. Some studies point to the importance specific haplotype groups of SNPs and interaction of MAOA with others genes (e.g. FOXP2 or SRY). The results of existing studies are insufficient and further research is needed.

Keywords: autism spectrum disorder, MAOA, uVNTR, single nucleotide polymorphism

Procedia PDF Downloads 381
13806 Bioefficacy of Ocimum sanctum on Survival, Development and Reproduction of Dengue Vector Aedes aegypti L. (Diptera: Culicidae)

Authors: Mohd Shazad, K. K. Gupta

Abstract:

Vector borne diseases are a serious global concern. Aedes aegypti, the primary vector for viruses that cause dengue fever, dengue haemorrhagic fever, chikungunya and yellow fever is widespread over large areas of the tropics and subtropics. In last decade, diseases transmitted by Aedes aegypti are of serious concern. In past decade, number of cases of dengue fever, dengue hemorrhagic fever, and chikungunya has increased multifold. Present research work focused on impact of ethanol extract of Ocimum sanctum on dengue vector Aedes aegypti. 0-24 hr. old fourth instar larvae of lab-bred population of Aedes aegypti were exposed to ethanol leaf extract of Ocimum with concentrations ranging from 50 ppm to 400 ppm. Survival and development and the treated larvae and reproductive behaviour of the adults emerged from the treated larvae was evaluated. Our results indicated larvicidal potential of the leaf ethanol extract. The influence of the extract was dose dependent. 77.2% mortality was observed in the larvae exposed to 400 ppm for 24 hr. Treatment at lower concentrations revealed delayed toxicity. The larvae survived after treatment showed severe developmental anomalies. Consequently, there was the significant increase in duration of fourth instar larva. The L4 treated with 400-ppm extract moulted after 4.6 days; this was in sharp contrast to control where the larval period of the fourth instar lasts three days. The treated fourth instar larvae in many cases transformed into larva-pupa intermediates with the combination of larva, pupa characters. The larva-pupa intermediates had reduced life span and failed to moult successfully. The adults emerged from the larvae treated with lower doses had reduced reproductive potential. The females exhibited longer preoviposition period, reduced oviposition rate, abnormal oviposition behaviour and decreased fertility. Our studies indicated the possibility of the presence of JH mimic or JH analogue in the leaf ethanol extract of Ocimum. The present research work explored the potentials of Ocimum sanctum, also known as the queen of herbs, in integrated vector management programme of Aedes aegypti, which is a serious threat to human health.

Keywords: Aedes aegypti, development, mortality, Ocimum sanctum reproduction

Procedia PDF Downloads 240
13805 Routing Protocol in Ship Dynamic Positioning Based on WSN Clustering Data Fusion System

Authors: Zhou Mo, Dennis Chow

Abstract:

In the dynamic positioning system (DPS) for vessels, the reliable information transmission between each note basically relies on the wireless protocols. From the perspective of cluster-based routing protocols for wireless sensor networks, the data fusion technology based on the sleep scheduling mechanism and remaining energy in network layer is proposed, which applies the sleep scheduling mechanism to the routing protocols, considering the remaining energy of node and location information when selecting cluster-head. The problem of uneven distribution of nodes in each cluster is solved by the Equilibrium. At the same time, Classified Forwarding Mechanism as well as Redelivery Policy strategy is adopted to avoid congestion in the transmission of huge amount of data, reduce the delay in data delivery and enhance the real-time response. In this paper, a simulation test is conducted to improve the routing protocols, which turn out to reduce the energy consumption of nodes and increase the efficiency of data delivery.

Keywords: DPS for vessel, wireless sensor network, data fusion, routing protocols

Procedia PDF Downloads 522
13804 A Correlational Study between Sexual Awareness, Behaviour and Sources of Sexual Knowledge among Youth in Context of Bihar

Authors: Kanika Naresh Singh, Uday Shankar

Abstract:

Background: Human behaviours are influenced by drives. Sexual drive is one of them. Education regarding sexual behaviour plays a great role in shaping one’s attitude towards it. These days after attaining the age of puberty, adolescents are confused and feel shy to talk about it. In order to get information, they refer to various types of sources and these sources play a greater role in spreading awareness in the mass adolescent population. Sometimes it also leads to the building of myths and misconceptions. Due to increasing incidences of HIV/AIDS, RTIs/STIs and teenage pregnancies, there is a rising need to impart sex education. Aim: The aim of this research was to study the level of sexual awareness among the youth of Bihar and also study their sexual behaviour and sources of influence. It also aims to study the correlation between sexual awareness, behaviour and sources of sexual knowledge among youth in Bihar. Methods: The sample size for the project was 50 youth consisting of both boys and girls, in between the age group of 18 to 23 years from urban and semi-urban areas. The purposive sampling method was used in the research. The tools used were the Sexual Awareness Questionnaire and Sexual Behavior and Sources of Influence (SBSI) scale. The sexual Awareness Questionnaire was developed by Snell, having 35 items. A socio-demographic data sheet was also used. Results: The youth had poor sexual awareness. Internet and Friends were found to be the major source for gathering information. The youth of Bihar were less inclined towards resolving their doubts with their parents. There was a positive correlation between sexual awareness, behaviour and sources of knowledge. Conclusion: The youth of Bihar has poor sexual knowledge. Internet and Friends are major sources of information. Sex Education should be promoted as suggested by various institutions like World Health Organization United Nations. Psychiatrists and psychologists have a key leadership role in introducing these potentially emotionally challenging issues to the youth with consideration of psychosocial and cultural factors.

Keywords: sexual awareness, sexual behavior, sources of influence, youths, Bihar, India

Procedia PDF Downloads 137
13803 Corporate Governance and Financial Performance: Evidence From Indonesian Islamic Banks

Authors: Ummu Salma Al Azizah, Herri Mulyono, Anisa Mauliata Suryana

Abstract:

The significance of corporate governance regarding to the agency problem have been transparent. This study examine the impact of corporate governance on the performance of Islamic banking in Indonesia. By using fixed effect model and added some control variable, the current study try to explore the correlation between the theoretical framework on corporate governance, such as agency theory and risk management theory. The bank performance (Return on Asset and Return on Equity) which are operational performance and financial performance. And Corporate governance based on Board size, CEO duality, Audit committee and Shariah supervisory board. The limitation of this study only focus on the Islamic banks performance from year 2015 to 2020. The study fill the gap in the literature by addressing the issue of corporate governance on Islamic banks performance in Indonesia.

Keywords: corporate governance, financial performance, islamic banks, listed companies, Indonesia

Procedia PDF Downloads 120
13802 Results of Operation of Online Medical Care System

Authors: Mahsa Houshdar, Seyed Mehdi Samimi Ardestani , ُSeyed Saeed Sadr

Abstract:

Introduction: Online Medicare is a method in which parts of a medical process - whether its diagnostics, monitoring or the treatment itself will be done by using online services. This system has been operated in one boy’s high school, one girl’s high school and one high school in deprived aria. Method: At the first step the students registered for using the system. It was not mandatory and not free. They participated in estimating depression scale, anxiety scale and clinical interview by online medical care system. During this estimation, we could find the existence and severity of depression and anxiety in each one of the participants, also we could find the consequent needs of each one, such as supportive therapy in mild depression or anxiety, need to visited by psychologist in moderate cases, need to visited by psychiatrist in moderate-severe cases, need to visited by psychiatrist and psychologist in severe cases and need to perform medical lab examination tests. The lab examination tests were performed on persons specified by the system. The lab examinations were included: serum level of vitamin D, serum level of vitamin B12, serum level of calcium, fasting blood sugar, HbA1c, thyroid function tests and CBC. All of the students were solely treated by vitamins or minerals therapy and/ or treatment of medical problem (such as hypothyroidism). After a few months, we came back to high schools and estimated the existence and severity of depression and anxiety in treated students. With comparing these results, the affectability of the system could be prof. Results: Totally, we operate this project in 1077 participants in 243 of participant, the lab examination test were performed. In girls high schools: the existence and severity of depression significantly deceased (P value= 0.018<0.05 & P value 0.004< 0.05), but results about anxiety was not significant. In boys high schools: the existence and severity of depression significantly decreased (P value= 0.023<0.05 & P value = 0.004< 0.05 & P value= 0.049< 0.05). In boys high schools: the existence and severity of anxiety significantly decreased (P value= 0.041<0.05 & P value = 0.046< 0.05 &) but in one high school results about anxiety was not significant. In high school in deprived area the students did not have any problem paying for participating in the project, but they could not pay for medical lab examination tests. Thus, operation of the system was not possible in deprived area without a sponsor. Conclusion: This online medical system was successful in creating medical and psychiatric profile without attending physician. It was successful in decreasing depression without using antidepressants, but it was partially successful in decreasing anxiety.

Keywords: depression, diabetes, online medicare, vitamin D deficiency

Procedia PDF Downloads 319
13801 Scope of Lasers in Periodontics

Authors: Atmaja Patel

Abstract:

Since the development of lasers in 1951, the first medical application was reported by Goldman in 1962. In 1960, T.H. Maiman produced the first Ruby laser and was used in cardiovascular surgery by McGuff in 1963. After a long time of investigations and new developments in laser technology first clinical applications were performed by Choy and Ginsburg in 1983. Introduction of the first true dental laser was in 1989. This paper is to highlight the various treatments and prevention of periodontal diseases. Lasers have become more predictable and effective form of treatment for periodontal diseases. The advantages of lasers include reduced use of anaesthesia, coagulation that yields a dry surgical field and hence better visibility, reduced need of sutures, minimal swelling and scarring, less pain and medication, faster healing and increased patient acceptance.

Keywords: lasers, periodontal surgery, diode laser, healing

Procedia PDF Downloads 316
13800 Relevance of Dosing Time for Everolimus Toxicity in Respect to the Circadian P-Glycoprotein Expression in Mdr1a::Luc Mice

Authors: Narin Ozturk, Xiao-Mei Li, Sylvie Giachetti, Francis Levi, Alper Okyar

Abstract:

P-glycoprotein (P-gp, MDR1, ABCB1) is a transmembrane protein acting as an ATP-dependent efflux pump and functions as a biological barrier by extruding drugs and xenobiotics out of cells in healthy tissues especially in intestines, liver and brain as well as in tumor cells. The circadian timing system controls a variety of biological functions in mammals including xenobiotic metabolism and detoxification, proliferation and cell cycle events, and may affect pharmacokinetics, toxicity and efficacy of drugs. Selective mTOR (mammalian target of rapamycin) inhibitor everolimus is an immunosuppressant and anticancer drug that is active against many cancers, and its pharmacokinetics depend on P-gp. The aim of this study was to investigate the dosing time-dependent toxicity of everolimus with respect to the intestinal P-gp expression rhythms in mdr1a::Luc mice using Real Time-Biolumicorder (RT-BIO) System. Mdr1a::Luc male mice were synchronized with 12 h of Light and 12 h of Dark (LD12:12, with Zeitgeber Time 0 – ZT0 – corresponding Light onset). After 1-week baseline recordings, everolimus (5 mg/kg/day x 14 days) was administered orally at ZT1-resting period- and ZT13-activity period- to mdr1a::Luc mice singly housed in an innovative monitoring device, Real Time-Biolumicorder units which let us monitor real-time and long-term gene expression in freely moving mice. D-luciferin (1.5 mg/mL) was dissolved in drinking water. Mouse intestinal mdr1a::Luc oscillation profile reflecting P-gp gene expression and locomotor activity pattern were recorded every minute with the photomultiplier tube and infrared sensor respectively. General behavior and clinical signs were monitored, and body weight was measured every day as an index of toxicity. Drug-induced body weight change was expressed relative to body weight on the initial treatment day. Statistical significance of differences between groups was validated with ANOVA. Circadian rhythms were validated with Cosinor Analysis. Everolimus toxicity changed as a function of drug timing, which was least following dosing at ZT13, near the onset of the activity span in male mice. Mean body weight loss was nearly twice as large in mice treated with 5 mg/kg everolimus at ZT1 as compared to ZT13 (8.9% vs. 5.4%; ANOVA, p < 0.001). Based on the body weight loss and clinical signs upon everolimus treatment, tolerability for the drug was best following dosing at ZT13. Both rest-activity and mdr1a::Luc expression displayed stable 24-h periodic rhythms before everolimus and in both vehicle-treated controls. Real-time bioluminescence pattern of mdr1a revealed a circadian rhythm with a 24-h period with an acrophase at ZT16 (Cosinor, p < 0.001). Mdr1a expression remained rhythmic in everolimus-treated mice, whereas down-regulation was observed in P-gp expression in 2 of 4 mice. The study identified the circadian pattern of intestinal P-gp expression with an unprecedented precision. The circadian timing depending on the P-gp expression rhythms may play a crucial role in the tolerability/toxicity of everolimus. The circadian changes in mdr1a genes deserve further studies regarding their relevance for in vitro and in vivo chronotolerance of mdr1a-transported anticancer drugs. Chronotherapy with P-gp-effluxed anticancer drugs could then be applied according to their rhythmic patterns in host and tumor to jointly maximize treatment efficacy and minimize toxicity.

Keywords: circadian rhythm, chronotoxicity, everolimus, mdr1a::Luc mice, p-glycoprotein

Procedia PDF Downloads 340
13799 Comparing Performance of Irrigation System in Nepal by Collective Action and Decision-Making Capacity of the Farmers

Authors: Manita Ale, Ganesh P. Shivakoti, Ram C. Bastakoti

Abstract:

Irrigation system, a system for enhancing agricultural productivity, requires regular maintenance in order to avoid irregular allocation of water. For maintenance of the system in long run, farmers’ participation plays a key role increasing the performance of system. The performance of any irrigation system mainly relies on various factors which affect collective action plus decision making, as well as their shared impacts. The paper consists of system level information that were collected from 12 Irrigation Systems (IS) from three-sampled districts of Nepal and the household information that were collected from 160 irrigation water users. The results reveal that, out of 12 sampled irrigation systems, only 4 systems shows high performance levels. The high performance level of those systems was characterized on the basis of adequate availability of water, good maintenance of system infrastructure, and conformance to existing rules followed. In addition, the paper compares different irrigation systems based on trust, reciprocity, cropping intensity, command area and yield as tools to indicate the importance of collective action in performance of irrigation system.

Keywords: collective action, decision-making, farmers’ participation, performance

Procedia PDF Downloads 402
13798 Carcinogenic Polycyclic Aromatic Hydrocarbons in Urban Air Particulate Matter

Authors: A. Szabó Nagy, J. Szabó, Zs. Csanádi, J. Erdős

Abstract:

An assessment of the air quality of Győr (Hungary) was performed by determining the ambient concentrations of PM10-bound carcinogenic polycyclic aromatic hydrocarbons (cPAHs) in different seasons. A high volume sampler was used for the collection of ambient aerosol particles, and the associated cPAH compounds (benzo[a]pyrene (BaP), benzo[a]anthracene, benzofluoranthene isomers, indeno[123-cd]pyrene and dibenzo[ah]anthracene) were analyzed by a gas chromatographic method. Higher mean concentrations of total cPAHs were detected in samples collected in winter (9.62 ng/m3) and autumn (2.69 ng/m3) compared to spring (1.05 ng/m3) and summer (0.21 ng/m3). The calculated BaP toxic equivalent concentrations have also reflected that the local population appears to be exposed to significantly higher cancer risk in the heating seasons. Moreover, the concentration levels of cPAHs determined in this study were compared to other Hungarian urban sites.

Keywords: air, carcinogenic, polycyclic aromatic hydrocarbons (PAH), PM10

Procedia PDF Downloads 266
13797 Consumer Utility Analysis of Halal Certification on Beef Using Discrete Choice Experiment: A Case Study in the Netherlands

Authors: Rosa Amalia Safitri, Ine van der Fels-Klerx, Henk Hogeveen

Abstract:

Halal is a dietary law observed by people following Islamic faith. It is considered as a type of credence food quality which cannot be easily assured by consumers even upon and after consumption. Therefore, Halal certification takes place as a practical tool for the consumers to make an informed choice particularly in a non-Muslim majority country, including the Netherlands. Discrete choice experiment (DCE) was employed in this study for its ability to assess the importance of attributes attached to Halal beef in the Dutch market and to investigate consumer utilities. Furthermore, willingness to pay (WTP) for the desired Halal certification was estimated. Four most relevant attributes were selected, i.e., the slaughter method, traceability information, place of purchase, and Halal certification. Price was incorporated as an attribute to allow estimation of willingness to pay for Halal certification. There were 242 Muslim respondents who regularly consumed Halal beef completed the survey, from Dutch (53%) and non-Dutch consumers living in the Netherlands (47%). The vast majority of the respondents (95%) were within the age of 18-45 years old, with the largest group being student (43%) followed by employee (30%) and housewife (12%). Majority of the respondents (76%) had disposable monthly income less than € 2,500, while the rest earned more than € 2,500. The respondents assessed themselves of having good knowledge of the studied attributes, except for traceability information with 62% of the respondents considered themselves not knowledgeable. The findings indicated that slaughter method was valued as the most important attribute, followed by Halal certificate, place of purchase, price, and traceability information. This order of importance varied across sociodemographic variables, except for the slaughter method. Both Dutch and non-Dutch subgroups valued Halal certification as the third most important attributes. However, non-Dutch respondents valued it with higher importance (0,20) than their Dutch counterparts (0,16). For non-Dutch, the price was more important than Halal certification. The ideal product preferred by the consumers indicated the product serving the highest utilities for consumers, and characterized by beef obtained without pre-slaughtering stunning, with traceability info, available at Halal store, certified by an official certifier, and sold at 2.75 € per 500 gr. In general, an official Halal certifier was mostly preferred. However, consumers were not willing to pay for premium for any type of Halal certifiers, indicated by negative WTP of -0.73 €, -0.93 €, and -1,03€ for small, official, and international certifiers, respectively. This finding indicated that consumers tend to lose their utility when confronted with price. WTP estimates differ across socio-demographic variables with male and non-Dutch respondents had the lowest WTP. The unfamiliarity to traceability information might cause respondents to perceive it as the least important attribute. In the context of Halal certified meat, adding traceability information into meat packaging can serve two functions, first consumers can justify for themselves whether the processes comply with Halal requirements, for example, the use of pre-slaughtering stunning, and secondly to assure its safety. Therefore, integrating traceability info into meat packaging can help to make informed decision for both Halal status and food safety.

Keywords: consumer utilities, discrete choice experiments, Halal certification, willingness to pay

Procedia PDF Downloads 125
13796 Transformation of Industrial Policy towards Industry 4.0 and Its Impact on Firms' Competition

Authors: Arūnas Burinskas

Abstract:

Although Europe is on the threshold of a new industrial revolution called Industry 4.0, many believe that this will increase the flexibility of production, the mass adaptation of products to consumers and the speed of their service; it will also improve product quality and dramatically increase productivity. However, as expected, all the benefits of Industry 4.0 face many of the inevitable changes and challenges they pose. One of them is the inevitable transformation of current competition and business models. This article examines the possible results of competitive conversion from the classic Bertrand and Cournot models to qualitatively new competition based on innovation. Ability to deliver a new product quickly and the possibility to produce the individual design (through flexible and quickly configurable factories) by reducing equipment failures and increasing process automation and control is highly important. This study shows that the ongoing transformation of the competition model is changing the game. This, together with the creation of complex value networks, means huge investments that make it particularly difficult for small and medium-sized enterprises. In addition, the ongoing digitalization of data raises new concerns regarding legal obligations, intellectual property, and security.

Keywords: Bertrand and Cournot Competition, competition model, industry 4.0, industrial organisation, monopolistic competition

Procedia PDF Downloads 137