Search results for: real experiences
6782 A Data Envelopment Analysis Model in a Multi-Objective Optimization with Fuzzy Environment
Authors: Michael Gidey Gebru
Abstract:
Most of Data Envelopment Analysis models operate in a static environment with input and output parameters that are chosen by deterministic data. However, due to ambiguity brought on shifting market conditions, input and output data are not always precisely gathered in real-world scenarios. Fuzzy numbers can be used to address this kind of ambiguity in input and output data. Therefore, this work aims to expand crisp Data Envelopment Analysis into Data Envelopment Analysis with fuzzy environment. In this study, the input and output data are regarded as fuzzy triangular numbers. Then, the Data Envelopment Analysis model with fuzzy environment is solved using a multi-objective method to gauge the Decision Making Units' efficiency. Finally, the developed Data Envelopment Analysis model is illustrated with an application on real data 50 educational institutions.Keywords: efficiency, Data Envelopment Analysis, fuzzy, higher education, input, output
Procedia PDF Downloads 616781 Investigation of Norovirus Genogroups (GI, GII and GIV) in Stool of Pet Dogs with Diarrhea
Abstract:
Norovirus (NoV) infection is effective and contagious in humans and many animals such as calves, pigs, dogs, cats, monkeys. There is not enough evidence about the zoonotic transmission of NoV between humans and animals. However, the fact that contamination of foods and environment by animal/human waste happens in indirect way leads to consideration of the agent as a zoonotic character. In our study, we aim to search the presence of NoV infection, which is a major public health problem, in possessed dogs showing diarrhea symptoms, to detect its genotype and to study nutrition and life conditions. We searched the existence of human NoV GI, GII and GIV in the stool of 128 pet dogs in Burdur Province with diarrhoea in various sex, age and breed by using Real-Time PCR method. Human NoV GII was found in only 5 of the 128 dog stool samples (3.91%). In the study, it was determined that the owners of the dogs with NoV GII are middle aged or elderly people most of whom are male and that there were no children in their houses. As these dogs are treated like the owner’s child, it is assumed that they could be transmitted with NoV GII as a result of close interaction with their owner.Keywords: dog, human, norovirus, Real-Time PCR, stool
Procedia PDF Downloads 1516780 Helping Others and Mental Health: A Qualitative Study Exploring Perspectives of Youth Engaging in Prosocial Activities
Authors: Saima Hirani, Emmanuela Ojukwu, Nilanga Aki Bandara
Abstract:
Background: Mental health challenges that begin during the youth age period may continue across the entire life course. One way to support youth mental health is to encourage youth engagement in prosocial activities. This study aimed to explore youth’s perceptions about helping others and mental well-being, barriers, and enablers for youth to initiate and continue prosocial activities, and strategies for developing the attribute of helping others in youth. Methods: We conducted a qualitative study using semi-structured, virtual interviews with 18 young individuals (aged 16-24 years) living in Vancouver, British Columbia, Canada. Results: Youth perceived helping others as a source of feeling peace and calm, finding meaning in life, experiencing social connection and promoting self-care, and relieving stress. Participants reported opportunities to learn new skills, the role of religion, social connections, previous positive experiences, and role modeling as enablers for their prosocial behaviour. Heavy time commitment, negative behaviour from others, self-doubt, and late exposure to such activities were considered barriers by youth when participating in prosocial activities. Youth also brought forward key recommendations for engaging youth in helping others. Conclusions: The findings of this study support the notion that youth have positive experiences when engaging in helping others and that involving young people in prosocial activities could be used as a protective intervention for promoting youth mental health and overall well-being.Keywords: helping others, prosocial behaviour, youth, mental well-being
Procedia PDF Downloads 686779 Molecular Characterization and Phylogenetic Analysis of Capripoxviruses from Outbreak in Iran 2021
Authors: Maryam Torabi, Habibi, Abdolahi, Mohammadi, Hassanzadeh, Darban Maghami, Baghi
Abstract:
Sheeppox Virus (SPPV) and goatpox virus (GTPV) are considerable diseases of sheep, and goats, caused by viruses of the Capripoxvirus (CaPV) genus. They are responsible for economic losses. Animal mortality, morbidity, cost of vaccinations, and restrictions in animal products’ trade are the reasons of economic losses. Control and eradication of CaPV depend on early detection of outbreaks so that molecular detection and genetic analysis could be effective to this aim. This study was undertaken to molecularly characterize SPPV and GTPV strains that have been circulating in Iran. 120 skin papules and nodule biopsies were collected from different regions of Iran and were examined for SPPV, GTPV viruses using TaqMan Real -Time PCR. Some of these amplified genes were sequenced, and phylogenetic trees were constructed. Out of the 120 samples analysed, 98 were positive for CaPV by Real- Time PCR (81.6%), and most of them wereSPPV. then 10 positive samples were sequenced and characterized by amplifying the ORF 103CaPV gene. sequencing and phylogenetic analysis for these positive samples revealed a high percentage of identity with SPPV isolated from different countries in Middle East. In conclusions, molecular characterization revealed nearly complete identity with all recent SPPVs strains in local countries that requires further studies to monitor the virus evolution and transmission pathways to better understand the virus pathobiology that will help for SPPV control.Keywords: molecular epidemiology, Real-Time PCR, phylogenetic analysis, capripoxviruses
Procedia PDF Downloads 1496778 Gender Cultural Scripts and Career Choices
Authors: Caroline Hoorn
Abstract:
Post-matriculants in disadvantaged communities such as Douglas encounter a number of career challenges. The transition to the democratic dispensation in 1994, coupled with the rapid changes in the information domain that are characteristic of post-industrial life, complicate the career development trajectories of disadvantaged youth. The career development stories and experiences of disadvantaged youth in provinces such as the Northern Cape have not been told, leading to their marginalisation. It is against this background that the study explored the gendered dimensions of career development narratives, experiences, and choices of post-matriculants in the Douglas community in the Northern Cape. Using a qualitative, narrative approach, the researcher elicited career development stories from 23 participants in Douglas using semi-structured interviews. Two main themes were highlighted through the narratives; (1) willingness to challenge the traditional male dominated career script (2) breaking gender barriers. The study showed that gender did not have any influence on the career choices of the post-matriculants. The perceptions around career choices and gender were being challenged partly by the urge to affirm equality and the constant reminder of the poverty-stricken conditions prevalent in the households. A preferred gender is not required to be attached to the fulfilment of outcomes in a knowledge-based economy. Thus, it is not an issue of gender or masculinity but knowledge and skills. Furthermore, the study revealed that the career choices being considered are still the traditionally stereotypical careers like nursing, teaching, and social work, which demonstrates a lack of information to a broader pool of career options to select from.Keywords: career development, gender, narratives, post-matriculants
Procedia PDF Downloads 1026777 An Examination of Earnings Management by Publicly Listed Targets Ahead of Mergers and Acquisitions
Authors: T. Elrazaz
Abstract:
This paper examines accrual and real earnings management by publicly listed targets around mergers and acquisitions. Prior literature shows that earnings management around mergers and acquisitions can have a significant economic impact because of the associated wealth transfers among stakeholders. More importantly, acting on behalf of their shareholders or pursuing their self-interests, managers of both targets and acquirers may be equally motivated to manipulate earnings prior to an acquisition to generate higher gains for their shareholders or themselves. Building on the grounds of information asymmetry, agency conflicts, stewardship theory, and the revelation principle, this study addresses the question of whether takeover targets employ accrual and real earnings management in the periods prior to the announcement of Mergers and Acquisitions (M&A). Additionally, this study examines whether acquirers are able to detect targets’ earnings management, and in response, adjust the acquisition premium paid in order not to face the risk of overpayment. This study uses an aggregate accruals approach in estimating accrual earnings management as proxied by estimated abnormal accruals. Additionally, real earnings management is proxied for by employing widely used models in accounting and finance literature. The results of this study indicate that takeover targets manipulate their earnings using accruals in the second year with an earnings release prior to the announcement of the M&A. Moreover, in partitioning the sample of targets according to the method of payment used in the deal, the results are restricted only to targets of stock-financed deals. These results are consistent with the argument that targets of cash-only or mixed-payment deals do not have the same strong motivations to manage their earnings as their stock-financed deals counterparts do additionally supporting the findings of prior studies that the method of payment in takeovers is value relevant. The findings of this study also indicate that takeover targets manipulate earnings upwards through cutting discretionary expenses the year prior to the acquisition while they do not do so by manipulating sales or production costs. Moreover, in partitioning the sample of targets according to the method of payment used in the deal, the results are restricted only to targets of stock-financed deals, providing further robustness to the results derived under the accrual-based models. Finally, this study finds evidence suggesting that acquirers are fully aware of the accrual-based techniques employed by takeover targets and can unveil such manipulation practices. These results are robust to alternative accrual and real earnings management proxies, as well as controlling for the method of payment in the deal.Keywords: accrual earnings management, acquisition premium, real earnings management, takeover targets
Procedia PDF Downloads 1166776 Detection of Muscle Swelling Using the Cnts-Based Poc Wearable Strain Sensor
Authors: Nadeem Qaiser, Sherjeel Munsif Khan, Muhammad Mustafa Hussian, Vincent Tung
Abstract:
One of the emerging fields in the detection of chronic diseases is based on the point-of-care (POC) early monitoring of the symptoms and thus provides a state-of-the-art personalized healthcare system. Nowadays, wearable and flexible sensors are being used for analyzing sweat, glucose, blood pressure, and other skin conditions. However, localized jaw-bone swelling called parotid-swelling caused by some viruses has never been tracked before. To track physical motion or deformations, strain sensors, especially piezoresistive ones, are widely used. This work, for the first time, reports carbon nanotubes (CNTs)-based piezoresistive sensing patch that is highly flexible and stretchable and can record muscle deformations in real-time. The developed patch offers an excellent gauge factor for in-plane stretching and spatial expansion with low hysteresis. To calibrate the volumetric muscle expansion, we fabricated the pneumatic actuator that experienced volumetric expansion and thus redefined the gauge factor. Moreover, we employ a Bluetooth-low-energy system that can send information about muscle activity in real-time to a smartphone app. We utilized COMSOL calculations to reveal the mechanical robustness of the patch. The experiments showed the sensing patch's greater cyclability, making it a patch for personal healthcare and an excellent choice for monitoring the real-time POC monitoring of the human muscle swelling.Keywords: piezoresistive strain sensor, FEM simulations, CNTs sensor, flexible
Procedia PDF Downloads 886775 Bullying with Neurodiverse Students and Education Policy Reform
Authors: Fharia Tilat Loba
Abstract:
Studies show that there is a certain group of students who are more vulnerable to bullying due to their physical appearance, disability, sexual preference, race, and lack of social and behavioral skills. Students with autism spectrum disorders (ASD) are one of the most vulnerable groups among these at-risk groups. Researchers suggest that focusing on vulnerable groups of students who can be the target of bullying helps to understand the causes and patterns of aggression, which ultimately helps in structuring intervention programs to reduce bullying. Since Australia ratified the United Nations Convention on the Rights of Persons with Disabilities in 2006, it has been committed to providing an inclusive, safe, and effective learning environment for all children. In addition, the 2005 Disability Standards for Education seeks to ensure that students with disabilities can access and participate in education on the same basis as other students, covering all aspects of education, including harassment and victimization. However, bullying hinders students’ ability to fully participate in schooling. The proposed study aims to synthesize the notions of traditional bullying and cyberbullying and attempts to understand the experiences of students with ASD who are experiencing bullying in their schools. The proposed study will primarily focus on identifying the gaps between policy and practice related to bullying, and it will also attempt to understand the experiences of parents of students with ASD and professionals who have experience dealing with bullying at the school level in Australia. This study is expected to contribute to the theoretical knowledge of the bullying phenomenon and provide a reference for advocacy at the school, organization, and government levels.Keywords: education policy, bullying, Australia, neurodiversity
Procedia PDF Downloads 576774 Localization of Geospatial Events and Hoax Prediction in the UFO Database
Authors: Harish Krishnamurthy, Anna Lafontant, Ren Yi
Abstract:
Unidentified Flying Objects (UFOs) have been an interesting topic for most enthusiasts and hence people all over the United States report such findings online at the National UFO Report Center (NUFORC). Some of these reports are a hoax and among those that seem legitimate, our task is not to establish that these events confirm that they indeed are events related to flying objects from aliens in outer space. Rather, we intend to identify if the report was a hoax as was identified by the UFO database team with their existing curation criterion. However, the database provides a wealth of information that can be exploited to provide various analyses and insights such as social reporting, identifying real-time spatial events and much more. We perform analysis to localize these time-series geospatial events and correlate with known real-time events. This paper does not confirm any legitimacy of alien activity, but rather attempts to gather information from likely legitimate reports of UFOs by studying the online reports. These events happen in geospatial clusters and also are time-based. We look at cluster density and data visualization to search the space of various cluster realizations to decide best probable clusters that provide us information about the proximity of such activity. A random forest classifier is also presented that is used to identify true events and hoax events, using the best possible features available such as region, week, time-period and duration. Lastly, we show the performance of the scheme on various days and correlate with real-time events where one of the UFO reports strongly correlates to a missile test conducted in the United States.Keywords: time-series clustering, feature extraction, hoax prediction, geospatial events
Procedia PDF Downloads 3786773 Women's Pathways to Prison in Thailand
Authors: Samantha Jeffries, Chontit Chuenurah
Abstract:
Thailand incarcerates the largest number of women and has the highest female incarceration rate in South East Asia. Since the 1990s, there has been a substantial increase in the number, rate and proportion of women imprisoned. Thailand places a high priority on the gender specific contexts out of which offending arises and the different needs of women in the criminal justice system. This is manifested in work undertaken to guide the development of the United Nations Rules for the Treatment of Women Prisoners and Non-Custodial Measures for Women Offenders (the Bangkok Rules); adopted by the United Nations General Assembly in 2010. The Bangkok Rules make a strong statement about Thailand’s recognition of and commitment to the fair and equitable treatment of women throughout their contact with the criminal justice system including at sentencing and in prison. This makes the comparatively high use of imprisonment for women in Thailand particularly concerning and raises questions about the relationship between gender, crime and criminal justice. While there is an extensive body of research in Western jurisdictions exploring women’s pathways to prison, there is a relative dearth of methodologically robust research examining the possible gendered circumstances leading to imprisonment in Thailand. In this presentation, we will report preliminary findings from a qualitative study of women’s pathways to prison in Thailand. Our research aims were to ascertain: 1) the type, frequency, and context of criminal behavior that led to women’s incarceration, 2) women’s experiences of the criminal justice system, 3) the broader life experiences and circumstances that led women to prison in Thailand. In-depth life history interviews (n=77) were utilized to gain a comprehensive understanding of women’s journeys into prison. The interview schedule was open-ended consisting of prisoner responses to broad discussion topics. This approach provided women with the opportunity to describe significant experiences in their lives, to bring together distinct chronologies of events, and to analyze links between their varied life experiences, offending, and incarceration. Analyses showed that women’s journey’s to prison take one of eight pathways which tentatively labelled as follows, the: 1) harmed and harming pathway, 2) domestic/family violence victimization pathway, 3) drug connected pathway, 4) street woman pathway, 5) economically motivated pathway, 6) jealousy anger and/or revenge pathway, 7) naivety pathway, 8) unjust and/or corrupted criminal justice pathway. Each will be fully discussed during the presentation. This research is significant because it is the first in-depth methodologically robust exploration of women’s journeys to prison in Thailand and one of a few studies to explore gendered pathways outside of western contexts. Understanding women’s pathways into Thailand’s prisons is crucial to the development of effective planning, policy and program responses not only while women are in prison but also post-release. To best meet women’s needs in prison and effectively support their reintegration, we must have a comprehensive understanding of who these women are, what offenses they commit, the reasons that trigger their confrontations with the criminal justice system and the impact of the criminal justice system on them.Keywords: pathways, prison, women, Thailand
Procedia PDF Downloads 2466772 A Fast Community Detection Algorithm
Authors: Chung-Yuan Huang, Yu-Hsiang Fu, Chuen-Tsai Sun
Abstract:
Community detection represents an important data-mining tool for analyzing and understanding real-world complex network structures and functions. We believe that at least four criteria determine the appropriateness of a community detection algorithm: (a) it produces useable normalized mutual information (NMI) and modularity results for social networks, (b) it overcomes resolution limitation problems associated with synthetic networks, (c) it produces good NMI results and performance efficiency for Lancichinetti-Fortunato-Radicchi (LFR) benchmark networks, and (d) it produces good modularity and performance efficiency for large-scale real-world complex networks. To our knowledge, no existing community detection algorithm meets all four criteria. In this paper, we describe a simple hierarchical arc-merging (HAM) algorithm that uses network topologies and rule-based arc-merging strategies to identify community structures that satisfy the criteria. We used five well-studied social network datasets and eight sets of LFR benchmark networks to validate the ground-truth community correctness of HAM, eight large-scale real-world complex networks to measure its performance efficiency, and two synthetic networks to determine its susceptibility to resolution limitation problems. Our results indicate that the proposed HAM algorithm is capable of providing satisfactory performance efficiency and that HAM-identified communities were close to ground-truth communities in social and LFR benchmark networks while overcoming resolution limitation problems.Keywords: complex network, social network, community detection, network hierarchy
Procedia PDF Downloads 2286771 Pattern of Stress Distribution in Different Ligature-Wire-Brackets Systems: A FE and Experimental Analysis
Authors: Afef Dridi, Salah Mezlini
Abstract:
Since experimental devices cannot calculate stress and deformation of complex structures. The Finite Element Method FEM has been widely used in several fields of research. One of these fields is orthodontics. The advantage of using such a method is the use of an accurate and non invasive method that allows us to have a sufficient data about the physiological reactions can happening in soft tissues. Most of researches done in this field were interested in the study of stresses and deformations induced by orthodontic apparatus in soft tissues (alveolar tissues). Only few studies were interested in the distribution of stress and strain in the orthodontic brackets. These studies, although they tried to be as close as possible to real conditions, their models did not reproduce the clinical cases. For this reason, the model generated by our research is the closest one to reality. In this study, a numerical model was developed to explore the stress and strain distribution under the application of real conditions. A comparison between different material properties was also done.Keywords: visco-hyperelasticity, FEM, orthodontic treatment, inverse method
Procedia PDF Downloads 2596770 Artificial Intelligence Based Abnormality Detection System and Real Valuᵀᴹ Product Design
Authors: Junbeom Lee, Jaehyuck Cho, Wookyeong Jeong, Jonghan Won, Jungmin Hwang, Youngseok Song, Taikyeong Jeong
Abstract:
This paper investigates and analyzes meta-learning technologies that use multiple-cameras to monitor and check abnormal behavior in people in real-time in the area of healthcare fields. Advances in artificial intelligence and computer vision technologies have confirmed that cameras can be useful for individual health monitoring and abnormal behavior detection. Through this, it is possible to establish a system that can respond early by automatically detecting abnormal behavior of the elderly, such as patients and the elderly. In this paper, we use a technique called meta-learning to analyze image data collected from cameras and develop a commercial product to determine abnormal behavior. Meta-learning applies machine learning algorithms to help systems learn and adapt quickly to new real data. Through this, the accuracy and reliability of the abnormal behavior discrimination system can be improved. In addition, this study proposes a meta-learning-based abnormal behavior detection system that includes steps such as data collection and preprocessing, feature extraction and selection, and classification model development. Various healthcare scenarios and experiments analyze the performance of the proposed system and demonstrate excellence compared to other existing methods. Through this study, we present the possibility that camera-based meta-learning technology can be useful for monitoring and testing abnormal behavior in the healthcare area.Keywords: artificial intelligence, abnormal behavior, early detection, health monitoring
Procedia PDF Downloads 876769 Transdisciplinary Pedagogy: An Arts-Integrated Approach to Promote Authentic Science, Technology, Engineering, Arts, and Mathematics Education in Initial Teacher Education
Authors: Anne Marie Morrin
Abstract:
This paper will focus on the design, delivery and assessment of a transdisciplinary STEAM (Science, Technology, Engineering, Arts, and Mathematics) education initiative in a college of education in Ireland. The project explores a transdisciplinary approach to supporting STEAM education where the concepts, methodologies and assessments employed derive from visual art sessions within initial teacher education. The research will demonstrate that the STEAM Education approach is effective when visual art concepts and methods are placed at the core of the teaching and learning experience. Within this study, emphasis is placed on authentic collaboration and transdisciplinary pedagogical approaches with the STEAM subjects. The partners included a combination of teaching expertise in STEM and Visual Arts education, artists, in-service and pre-service teachers and children. The inclusion of all stakeholders mentioned moves towards a more authentic approach where transdisciplinary practice is at the core of the teaching and learning. Qualitative data was collected using a combination of questionnaires (focused and open-ended questions) and focus groups. In addition, the data was collected through video diaries where students reflected on their visual journals and transdisciplinary practice, which gave rich insight into participants' experiences and opinions on their learning. It was found that an effective program of STEAM education integration was informed by co-teaching (continuous professional development), which involved a commitment to adaptable and flexible approaches to teaching, learning, and assessment, as well as the importance of continuous reflection-in-action by all participants. The delivery of a transdisciplinary model of STEAM education was devised to reconceptualizatise how individual subject areas can develop essential skills and tackle critical issues (such as self-care and climate change) through data visualisation and technology. The success of the project can be attributed to the collaboration, which was inclusive, flexible and a willingness between various stakeholders to be involved in the design and implementation of the project from conception to completion. The case study approach taken is particularistic (focusing on the STEAM-ED project), descriptive (providing in-depth descriptions from varied and multiple perspectives), and heuristic (interpreting the participants’ experiences and what meaning they attributed to their experiences).Keywords: collaboration, transdisciplinary, STEAM, visual arts education
Procedia PDF Downloads 496768 Canadian French as an Additional Language Teacher Candidates' Proficiency and Confidence Pre- and Post-Francophone Home-Stay: Practicum Experience as Revealed through Questionnaire and Interviews
Authors: Callie Mady
Abstract:
This study investigated the Canadian French as an additional language teacher candidates’ confidence and language maintenance strategies by means of questionnaires and interviews pre- and post- a Francophone home-stay practicum experience. Teacher French language proficiency is one of the components of teacher knowledge that can influence students’ French as an additional language acquisition. Although advantageous, seeking opportunities to use French in a French milieu comes with challenges. Teachers, for example, have been found to be hesitant to speak French with native speakers for fear of judgment. Another identified challenge to spending time in a French milieu is finances; while teachers have recognized the value of such an experience, cost is prohibitive. In recognition of the potential barriers and the need to maintain/improve the French proficiency of 'French as an additional language' teachers, this study provided a two-week home stay in a Francophone environment for teacher candidates of French as an additional language with financial subsidies for their participation. Through the post-experience interviews, the French as an additional language teacher candidates revealed an improvement in French proficiency. Similarly, the teacher candidates cited an increase in confidence in the interviews and through the questionnaire. They linked this increase in proficiency and confidence to their experiences with their host families and other Francophone members of the community. This study highlights the provision of immersion experiences as means to support teachers’ language confidence and proficiency.Keywords: French as an additional language education, teacher language confidence, teacher language maintenance, teacher language proficiency
Procedia PDF Downloads 3826767 AI-Powered Models for Real-Time Fraud Detection in Financial Transactions to Improve Financial Security
Authors: Shanshan Zhu, Mohammad Nasim
Abstract:
Financial fraud continues to be a major threat to financial institutions across the world, causing colossal money losses and undermining public trust. Fraud prevention techniques, based on hard rules, have become ineffective due to evolving patterns of fraud in recent times. Against such a background, the present study probes into distinct methodologies that exploit emergent AI-driven techniques to further strengthen fraud detection. We would like to compare the performance of generative adversarial networks and graph neural networks with other popular techniques, like gradient boosting, random forests, and neural networks. To this end, we would recommend integrating all these state-of-the-art models into one robust, flexible, and smart system for real-time anomaly and fraud detection. To overcome the challenge, we designed synthetic data and then conducted pattern recognition and unsupervised and supervised learning analyses on the transaction data to identify which activities were fishy. With the use of actual financial statistics, we compare the performance of our model in accuracy, speed, and adaptability versus conventional models. The results of this study illustrate a strong signal and need to integrate state-of-the-art, AI-driven fraud detection solutions into frameworks that are highly relevant to the financial domain. It alerts one to the great urgency that banks and related financial institutions must rapidly implement these most advanced technologies to continue to have a high level of security.Keywords: AI-driven fraud detection, financial security, machine learning, anomaly detection, real-time fraud detection
Procedia PDF Downloads 426766 Real Time Activity Recognition Framework for Health Monitoring Support in Home Environments
Authors: Shaikh Farhad Hossain, Liakot Ali
Abstract:
Technology advances accelerate the quality and type of services provided for health care and especially for monitoring health conditions. Sensors have turned out to be more effective to detect diverse physiological signs and can be worn on the human body utilizing remote correspondence modules. An assortment of programming devices have been created to help in preparing a difference rundown of essential signs by examining and envisioning information produced by different sensors. In this proposition, we presented a Health signs and Activity acknowledgment monitoring system. Utilizing off-the-rack sensors, we executed a movement location system for identifying five sorts of action: falling, lying down, sitting, standing, and walking. The framework collects and analyzes sensory data in real-time, and provides different feedback to the users. In addition, it can generate alerts based on the detected events and store the data collected to a medical server.Keywords: ADL, SVM, TRIL , MEMS
Procedia PDF Downloads 3986765 Older Adult Grandparents' Voices as a Principle Care Giver in a Skipped-Generation Family
Authors: Kerdsiri Hongthai, Darunee Jongudomkarn, Rutja Phuphaibul
Abstract:
In Thailand, many adults in rural areas migrate to seek employ¬ment resulting in skipped-generation family where grandparents care for grandchildren with no other adults present. This is a preliminary study using qualitative case study methods, aimed to explore the situations of older adult grandparents' experiences in skipped-generation family in North-East of Thailand. Data were collected by in-depth inter¬views with 6 grandparents living in skipped-generation families; 5 females and 1 males grandparents, aged 62-75, some of them have diabetes mellitus, hypertension, during November to December, 2017. The finding themes are: ‘Caught up in the middle’: the older adults were pleased to have grandchildren but, at the same time, acknowledge the burden that this placed on them, especially when the migrant children failed to send enough money back to support the family. ‘Getting bad health’: they reported to be fatigued and stressed due to burden of caring for their grandchildren without support. This situation can aggravate problems of poor health status and be worsening economic status of the grandparents. In some cases of deprivation, the grandparents feel that having to be the sole care providers of their grandchildren can negative adversely affect their mental status. It is important to find out in other sectors similar to Thailand and lead to more in-depth research to answer the research questions about policy and social support in skipped-generation family in the future.Keywords: older adult grandparents, experiences, principle care giver, skipped-generation family
Procedia PDF Downloads 1446764 Enabling Citizen Participation in Urban Planning through Geospatial Gamification
Authors: Joanne F. Hayek
Abstract:
This study explores the use of gamification to promote citizen e-participation in urban planning. The research departs from a case study: the ‘Shape Your City’ web app designed and programmed by the author and presented as part of the 2021 Dubai Design Week to engage citizens in the co-creation of the future of their city through a gamified experience. The paper documents the design and development methodology of the web app and concludes with the findings of its pilot release. The case study explores the use of mobile interactive mapping, real-time data visualization, augmented reality, and machine learning as tools to enable co-planning. The paper also details the user interface design strategies employed to integrate complex cross-sector e-planning systems and make them accessible to citizens.Keywords: gamification, co-planning, citizen e-participation, mobile interactive mapping, real-time data visualization
Procedia PDF Downloads 1416763 Refactoring Object Oriented Software through Community Detection Using Evolutionary Computation
Authors: R. Nagarani
Abstract:
An intrinsic property of software in a real-world environment is its need to evolve, which is usually accompanied by the increase of software complexity and deterioration of software quality, making software maintenance a tough problem. Refactoring is regarded as an effective way to address this problem. Many refactoring approaches at the method and class level have been proposed. But the extent of research on software refactoring at the package level is less. This work presents a novel approach to refactor the package structures of object oriented software using genetic algorithm based community detection. It uses software networks to represent classes and their dependencies. It uses a constrained community detection algorithm to obtain the optimized community structures in software networks, which also correspond to the optimized package structures. It finally provides a list of classes as refactoring candidates by comparing the optimized package structures with the real package structures.Keywords: community detection, complex network, genetic algorithm, package, refactoring
Procedia PDF Downloads 4186762 Enabling Cloud Adoption Based Secured Mobile Banking through Backend as a Service
Authors: P. S. Jagadeesh Kumar, S. Meenakshi Sundaram
Abstract:
With the increase of prevailing non-traditional rivalry, mobile banking experiences an ever changing commercial backdrop. Substantial customer demands have established to be more intricate as customers request more expediency and superintend over their banking services. To enterprise advance and modernization in mobile banking applications, it is gradually obligatory to deeply leapfrog the scuffle using business model transformation. The dramaturgical vicissitudes taking place in mobile banking entail advanced traditions to exploit security. By reforming and transforming older back office into integrated mobile banking applications, banks can engender a supple and nimble banking environment that can rapidly respond to new business requirements over cloud computing. Cloud computing is transfiguring ecosystems in numerous industries, and mobile banking is no exemption providing services innovation, greater flexibility to respond to improved security and enhanced business intelligence with less cost. Cloud technology offer secure deployment possibilities that can provision banks in developing new customer experiences, empower operative relationship and advance speed to efficient banking transaction. Cloud adoption is escalating quickly since it can be made secured for commercial mobile banking transaction through backend as a service in scrutinizing the security strategies of the cloud service provider along with the antiquity of transaction details and their security related practices.Keywords: cloud adoption, backend as a service, business intelligence, secured mobile banking
Procedia PDF Downloads 2546761 Smart Automated Furrow Irrigation: A Preliminary Evaluation
Authors: Jasim Uddin, Rod Smith, Malcolm Gillies
Abstract:
Surface irrigation is the most popular irrigation method all over the world. However, two issues: low efficiency and huge labour involvement concern irrigators due to scarcity in recent years. To address these issues, a smart automated furrow is conceptualised that can be operated using digital devices like smartphone, iPad or computer and a preliminary evaluation was conducted in this study. The smart automated system is the integration of commercially available software and hardware. It includes real-time surface irrigation optimisation software (SISCO) and Rubicon Water’s surface irrigation automation hardware and software. The automated system consists of automatic water delivery system with 300 mm flexible pipes attached to both sides of a remotely controlled valve to operate the irrigation. A water level sensor to obtain the real-time inflow rate from the measured head in the channel, advance sensors to measure the advance time to particular points of an irrigated field, a solar-powered telemetry system including a base station to communicate all the field sensors with the main server. On the basis of field data, the software (SISCO) is optimised the ongoing irrigation and determine the optimum cut-off for particular irrigation and send this information to the control valve to stop the irrigation in a particular (cut-off) time. The preliminary evaluation shows that the automated surface irrigation worked reasonably well without manual intervention. The evaluation of farmers managed irrigation events show the potentials to save a significant amount of water and labour. A substantial amount of economic and social benefits are expected in rural industries by adopting this system. The future outcome of this work would be a fully tested commercial adaptive real-time furrow irrigation system able to compete with the pressurised alternative of centre pivot or lateral move machines on capital cost, water and labour savings but without the massive energy costs.Keywords: furrow irrigation, smart automation, infiltration, SISCO, real-time irrigation, adoptive control
Procedia PDF Downloads 4526760 Enabling Affirmative Futures: Making Use of Virtual Spaces and New Social Technologies in Co-Production Research with Marginalised Young People
Authors: Kirsty Liddiard
Abstract:
In this paper, we detail the politics and practicalities of co-produced disability research with disabled young people with life-limiting and life-threatening impairments in our ESRC funded project, Life, Death, Disability and the Human: Living Life to the Fullest. We centre our Co-Researcher Collective of disabled young people who, through virtual research methods and social technologies, are co-leading this innovative project exploring the lives, hopes, desires and ambitions of young disabled people living short(er) lives. Co-production is an established approach; however, our co-researchers have led us to develop inclusive and transformative research practices that engage with online social research methods in innovative ways. Through this discussion, we demarcate the Academy and ‘research process’ as potentially deeply ableist spaces that propogate the normative researcher as non-disabled; someone integrated into the Academy and insecure employment; and who enacts normative modes of leadership. We use our experiences of co-production in Living Life to the Fullest, then, to show that research – as a discipline, a set of politics, and scholarly practice – must be transformed in order to enable new inclusive research futures that support meaningful co-production with marginalised young people. In conclusion, as we detail our experiences, we aim to encourage disability studies researchers and others to adopt virtual environments and social technologies when researching with and for the lives of disabled people.Keywords: co-production, illness, youth, technology
Procedia PDF Downloads 1566759 From Mobility to Complexity: French Language Use among Algerian Doctoral Postgraduates in Scotland
Authors: Hadjer Chellia
Abstract:
The study explores the phenomenon of second language use in a migratory setting and uses the case of Algerian international students in Scotland, United Kingdom. The linguistic history of Algeria reveals that French language has a high status among the Algerians’ verbal repertoires and Algerian English students consider it as a language of prestige. With mobility of some of these students towards Scotland -in the guise of internationalization of higher education, mobility and exchange programs, the transition was deemed to bring more complexity to their pre-migratory linguistic repertoires and resulted into their French language- being endangered and threatened by a potential shift to English. The study employed semi-structured interviews among six Ph.D. ethnically related students, and the main aim behind that is to explore their current experiences with regards to French language use and to provide an account of the factors which assist in shifting to English as a second language instead. The six participants identified in interviews were further invited to focus group sessions based on an in-group interaction fashion to discuss different topics using heritage languages. This latter was opted for as part of the methodology as a means to observe their real linguistic practice and to investigate the link between behaviors and previous perceptions. The findings detect a variety of social, individual and socio-psychological factors that would contribute in refining the concept of language shift among newly established émigré communities with short stay vis a vis the linguistic outcomes of immigrants with long stay, across generational basis that was –to some extent-the focus of previous research on language shift. The results further reveal a mismatch between students' perceptions and observed behaviors. The research is then largely relevant to international students’ sociolinguistic experience of study abroad.Keywords: complexity, mobility, potential shift, sociolinguistic experience
Procedia PDF Downloads 1676758 Interest Rate Prediction with Taylor Rule
Authors: T. Bouchabchoub, A. Bendahmane, A. Haouriqui, N. Attou
Abstract:
This paper presents simulation results of Forex predicting model equations in order to give approximately a prevision of interest rates. First, Hall-Taylor (HT) equations have been used with Taylor rule (TR) to adapt them to European and American Forex Markets. Indeed, initial Taylor Rule equation is conceived for all Forex transactions in every States: It includes only one equation and six parameters. Here, the model has been used with Hall-Taylor equations, initially including twelve equations which have been reduced to only three equations. Analysis has been developed on the following base macroeconomic variables: Real change rate, investment wages, anticipated inflation, realized inflation, real production, interest rates, gap production and potential production. This model has been used to specifically study the impact of an inflation shock on macroeconomic director interest rates.Keywords: interest rate, Forex, Taylor rule, production, European Central Bank (ECB), Federal Reserve System (FED).
Procedia PDF Downloads 5276757 Implementing Mindfulness into Wellness Plans: Assisting Individuals with Substance Abuse and Addiction
Authors: Michele M. Mahr
Abstract:
The purpose of this study is to educate, inform, and facilitate scholarly conversation and discussion regarding the implementation of mindfulness techniques when working with individuals with substance use disorder (SUD) or addictive behaviors in mental health. Mindfulness can be recognized as the present moment, non-judgmental awareness, initiated by concentrated attention that is non-reactive and as openheartedly as possible. Individuals with SUD or addiction typically are challenged with triggers, environmental situations, cravings, or social pressures which may deter them from remaining abstinent from their drug of choice or addictive behavior. Also, mindfulness is recognized as one of the cognitive and behavioral treatment approaches and is both a physical and mental practice that encompasses individuals to become aware of internal situations and experiences with undivided attention. That said, mindfulness may be an effective strategy for individuals to employ during these experiences. This study will reveal how mental health practitioners and addiction counselors may find mindfulness to be an essential component of increasing wellness when working with individuals seeking mental health treatment. To this end, mindfulness is simply the ability individuals have to know what is actually happening as it is occurring and what they are experiencing at the moment. In the context of substance abuse and addiction, individuals may employ breathing techniques, meditation, and cognitive restructuring of the mind to become aware of present moment experiences. Furthermore, the notion of mindfulness has been directly connected to the development of neuropathways. The creation of the neural pathways then leads to creating thoughts which leads to developing new coping strategies and adaptive behaviors. Mindfulness strategies can assist individuals in connecting the mind with the body, allowing the individual to remain centered and focused. All of these mentioned above are vital components to recovery during substance abuse and addiction treatment. There are a variety of therapeutic modalities applying the key components of mindfulness, such as Mindfulness-Based Stress Reduction (MBSR) and Mindfulness-Based Cognitive Therapy for depression (MBCT). This study will provide an overview of both MBSR and MBCT in relation to treating individuals with substance abuse and addiction. The author will also provide strategies for readers to employ when working with clients. Lastly, the author will create and foster a safe space for discussion and engaging conversation among participants to ask questions, share perspectives, and be educated on the numerous benefits of mindfulness within wellness.Keywords: mindfulness, wellness, substance abuse, mental health
Procedia PDF Downloads 776756 Jordan Curves in the Digital Plane with Respect to the Connectednesses given by Certain Adjacency Graphs
Authors: Josef Slapal
Abstract:
Digital images are approximations of real ones and, therefore, to be able to study them, we need the digital plane Z2 to be equipped with a convenient structure that behaves analogously to the Euclidean topology on the real plane. In particular, it is required that such a structure allows for a digital analogue of the Jordan curve theorem. We introduce certain adjacency graphs on the digital plane and prove digital Jordan curves for them thus showing that the graphs provide convenient structures on Z2 for the study and processing of digital images. Further convenient structures including the wellknown Khalimsky and Marcus-Wyse adjacency graphs may be obtained as quotients of the graphs introduced. Since digital Jordan curves represent borders of objects in digital images, the adjacency graphs discussed may be used as background structures on the digital plane for solving the problems of digital image processing that are closely related to borders like border detection, contour filling, pattern recognition, thinning, etc.Keywords: digital plane, adjacency graph, Jordan curve, quotient adjacency
Procedia PDF Downloads 3796755 A Qualitative Study of a Workplace International Employee Health Program
Authors: Jennifer Bradley
Abstract:
With opportunities to live and work abroad on the rise, effective preparation and support for international employees needs to be addressed within the work-site. International employees must build new habits, routines and social networks in an unfamiliar culture. Culture shock typically occurs within the first year and can affect both physical and psychological health. Employers have the opportunity to support staff through the adaptation process and foster healthy habits and routines. Cross-cultural training that includes a combination of instructional teaching, cultural experiences, and practice, is shown to increase the international employee adaptation process. However, little evidence demonstrates that organizations provide all of these aspects for international employees. The occupational therapy practitioner (OTP) offers a unique perspective focusing on the employee transactional relationship and engagement of meaningful occupations to enhance and enable participation in roles, habits and routines within new cultural contexts. This paper examines one such program developed and implemented by an OTP at the New England Center for Children, in Abu Dhabi, United Arab Emirates. The effectiveness of the program was assessed via participant feedback and concluded that an international employee support program that focuses on a variety of meaningful experiences and knowledge can empower employees to navigate healthy practices, develop habits and routines, and foster positive inter-cultural relationships in the organization and community.Keywords: occupational therapy practitioner, cross cultural training, international employee health, international employee support
Procedia PDF Downloads 1596754 Attack Redirection and Detection using Honeypots
Authors: Chowduru Ramachandra Sharma, Shatunjay Rawat
Abstract:
A false positive state is when the IDS/IPS identifies an activity as an attack, but the activity is acceptable behavior in the system. False positives in a Network Intrusion Detection System ( NIDS ) is an issue because they desensitize the administrator. It wastes computational power and valuable resources when rules are not tuned properly, which is the main issue with anomaly NIDS. Furthermore, most false positives reduction techniques are not performed during the real-time of attempted intrusions; instead, they have applied afterward on collected traffic data and generate alerts. Of course, false positives detection in ‘offline mode’ is tremendously valuable. Nevertheless, there is room for improvement here; automated techniques still need to reduce False Positives in real-time. This paper uses the Snort signature detection model to redirect the alerted attacks to Honeypots and verify attacks.Keywords: honeypot, TPOT, snort, NIDS, honeybird, iptables, netfilter, redirection, attack detection, docker, snare, tanner
Procedia PDF Downloads 1566753 Prevalence of Cytomegalovirus DNA in the Patients’ Serum with HIV using Real-Time PCR
Authors: Mohammadreza Aghasadeghi, Mojtaba Hamidi-Fard, Seyed Amir Sadeghi, Ashkan Noorbakhsh
Abstract:
Introduction: HIV is known as one of the most important pathogens and mortality in all human societies, but unfortunately, no definitive cure has been found for it. Due to its weakened immune system, this virus causes a variety of primary and secondary opportunistic infections. Cytomegalovirus (CMV) is one of the most relevant opportunistic viruses seen in HIV-positive people that cause various infections in HIV-positive people. This virus causes various infections in HIV-positive people, such as retinal infection (CMVR), gastrointestinal infections, diarrhea, severe weight loss, and cerebrospinal fluid problems. These various infections make it important to evaluate the prevalence of CMV in HIV-positive people to diagnose it quickly and in a timely manner. This infection in HIV-positive people reduces life expectancy and causes serious harm to patients. However, a simple test in HIV-positive people can prevent the virus from progressing. Material and Methods: In this study, we collected 200 blood samples (including 147 men and 53 women) from HIV-positive individuals and examined the frequency of CMV-DNA in these cases by real-time PCR method. In the next step, the data was analyzed by SPSS software, and then we obtained the relationship between age, sex, and the frequency of CMV in HIV-positive individuals. Results: The total frequency of CMV DNA was about 59%, which is a relatively high prevalence due to the age range of the subjects. The frequency in men was 61.2% and 52.8% in women. This frequency was also higher in males than females. We also observed more frequency in two age groups of 16 to 30 years and 31 to 45 years. Discussion: Due to the high prevalence of CMV in HIV-positive individuals and causing serious problems in this group of people, this study was shown that both the patients and the community should pay more attention to this issue. Ministry of Health, as a stakeholder organization, can make CMV DNA testing mandatory as soon as a person is HIV positive.Keywords: CMV, HIV, AIDS, real-time PCR, SPSS
Procedia PDF Downloads 213