Search results for: behavioral risks
1726 Family Relationships among Users and Non Users of Social Media
Authors: Sawsan Kamal Kalil El Galad, Heba Shafik Ibrahim Mohamed, Rania Ismail Moussa
Abstract:
New developments in the technological world have made the internet an innovative way for individuals and families to communicate. Social media sites help in fulfilling communication needs and wants of their users. The use of social media may have an effect on the family relation either in a positive or negative manner. This study aimed to investigate the family relationships among users and non users of social media. The study followed a cross- sectional descriptive comparative research design. It was conducted on 360 employees, at Damanhour University in Elbeheira, Egypt. Brief Family Relationship Scale (BFRS) was used to collect the data of this study. The results revealed that the mean score of the social media users is slightly increased in relation to the non users of social media mean score with no significant difference between both groups. It was concluded that using social media for short time has no effect on the family relationship, sitting with family in daily base satisfy the social and emotional needs of its member and enhance family relations. Recommendations encompassed that the time spent on social media should be assessed regularly to prevent being isolated from the family members. Educational programs to increase the parent’s awareness how to deal with their children regarding social media and its risks.Keywords: social media, family relationships, communication needs, culture
Procedia PDF Downloads 1131725 Biodiversity And Ecosystem Services In Morocco: Current State And Human Development
Authors: Mohammed Taleb
Abstract:
Morocco is characterized by an important genetic diversity represented by a rich and varied flora with 5211 species and subspecies and many natural ecosystems. Biodiversity and natural ecosystems provide the local population with highly diversified services represented by aromatic and medicinal plants, forage plants, melliferous plants, firewood, lumber, mushrooms, etc. Ecosystem services are currently subject to many pressures: overgrazing and deforestation, climate change, including increased drought, urbanization and forest fire. Conscious of the risks that weigh on biodiversity and ecosystem services, Morocco had made an important effort to reverse the tendencies by developing a consistent biodiversity conservation strategy focused on in-situ and ex-situ conservation. This presentation will be focused on the current state of biodiversity and ecosystem services and their role for the human development and their decline under the action of different pressures (grazing, timber harvest, harvesting of medicinal and aromatic plants, charcoal making...) while emphasizing efforts constructed by Morocco to conserve and sustainably manage biodiversity and ecosystem services.Keywords: morocco, biodiversity, ecosystem services, local population
Procedia PDF Downloads 941724 The Impact of Political Polarization on the COVID-19 Vaccine Hesitancy in the United States: A Qualitative Study
Authors: Peiran Ma
Abstract:
This study explored the role of political polarization in an individual's decision of receiving the COVID-19 vaccine. A total of 15 participants participated in individual interviews and focus group discussions about the relationships among domestic political polarization, vaccine hesitancy, and behavioral responses to the COVID-19 pandemic. Political affiliation affected an individual’s decision on the COVID-19 vaccination, such that people who identified as Liberals and Democrats were more accepting of the vaccine. On the other hand, the level of influence declined over time (2020-2022) when the general conception of COVID-19 immunization shifted from political to personal. Results provided qualitative support to the previously identified positive relationship between divided political opinions and COVID-19 vaccine hesitancy and highlighted the decreasing trend in the power of political polarization in vaccination and the existence of other factors.Keywords: COVID-19, vaccine hesitancy, political polarization, partisanship, ideology
Procedia PDF Downloads 851723 Small and Medium-Sized Enterprises in West African Semi-Arid Lands Facing Climate Change
Authors: Mamadou Diop, Florence Crick, Momadou Sow, Kate Elizabeth Gannon
Abstract:
Understanding SME leaders’ responses to climate is essential to cope with ongoing changes in temperature and rainfall. This study analyzes the response of SME leaders to the adverse effects of climate change in semi-arid lands (SAL) in Senegal. Based on surveys administrated to 161 SME leaders, this research shows that 91% of economic units are affected by climatic conditions, although 70% do not have a plan to deal with climate risks. Economic actors have striven to take measures to adapt. However, their efforts are limited by various obstacles accentuated by a lack of support from public authorities. In doing so, substantial political, institutional and financial efforts at national and local levels are needed to promote an enabling environment for economic actors to adapt. This will focus on information and training about the threats and opportunities related to global warming, the creation of an adaptation support fund to support local initiatives and the improvement of the institutional, regulatory and political framework.Keywords: small and medium-sized enterprises, climate change, adaptation, semi-arid lands
Procedia PDF Downloads 2081722 Grammatical Parallelism in the Qurʼān
Authors: Yehudit Dror
Abstract:
Parallelism¬, or as it is called in Arabic, al-muqābala, occupies a central position in the rhetorical discipline of ʻilm al-bayān. Parallelism is used as a figure of textual ornamentation or embellishment and can be divided into several types that are based on the semantics of parallelism and its formative structure. Parallelism in Arabic has received a considerable amount of attention from the Arab rhetorician, which enables understanding the essence of parallelism in Arabic – its types, structure and meaning. However, there are some lacunae in their descriptions concerning the function and thematic restrictions of parallelism in the Qur’ān. In my presentation, which focuses on grammatical parallelism where the two stichos of the parallelism are the same with respect to syntax and morphology, I will show that parallelism has some important roles in the textual arrangement; it may, for example, conclude a thematic section, indicate a turning point in the text or to clarify what has been said previously. In addition, it will be shown that parallelism is not used randomly in the Qurʼān but rather is restricted to repeated themes which carry the most important messages of the Qurʼān, such as God's Might or behavioral patterns of the believers and the non-believers; or it can be used as a stylistic device.Keywords: grammatical parallelism, half-line, symmetry, Koran
Procedia PDF Downloads 3331721 Exploring the Gap between Coverage, Access, Utilization of Long Lasting Insecticidal Nets (LLINs) among the People of Malaria Endemic Districts in Bangladesh
Authors: Fouzia Khanam, Tridib Chowdhury, Belal Hossain, Sajedur Rahman, Mahfuzar Rahman
Abstract:
Introduction: Over the last decades, the world has achieved a noticeable success in preventing malaria. Nevertheless, malaria, a vector-borne infectious disease, remains a major public health burden globally as well as in Bangladesh. To achieve the goal of eliminating malaria, BRAC, a leading organization of Bangladesh in collaboration with government, is distributing free LLIN to the 13 endemic districts of the country. The study was conducted with the aim of assessing the gap between coverage, access, and utilization of LLIN among the people of the 13 malaria endemic districts of Bangladesh. Methods: This baseline study employed a community cross-sectional design triangulated with qualitative methods to measure households’ ownership, access and use of 13 endemic districts. A multistage cluster random sampling was employed for the quantitative part and for qualitative part a purposive sampling strategy was done. Thus present analysis included 2640 households encompassing a total of 14475 populations. Data were collected using a pre-tested structured questionnaire through one on one face-to-face interview with respondents. All analyses were performed using STATA (Version 13.0). For the qualitative part participant observation, in-depth interview, focus group discussion, key informant interview and informal interview was done to gather the contextual data. Findings: According to our study, 99.8% of households possessed at least one-bed net in both study areas. 77.4% households possessed at least two LLIN and 43.2% households had access to LLIN for all the members. So the gap between coverage and access is 34%. 91.8% people in the 13 districts and 95.1% in Chittagong Hill Tracts areas reported having had slept under a bed net the night before interviewed. And despite the relatively low access, in 77.8% of households, all the members were used the LLIN the previous night. This higher utilization compared to access might be due to the increased awareness among the community people regarding LLIN uses. However, among those people with sufficient access to LLIN, 6% of them still did not use the LLIN which reflects the behavioral failure that needs to be addressed. The major reasons for not using LLIN, identified by both qualitative and quantitative findings, were insufficient access, sleeping or living outside the home, migration, perceived low efficacy of LLIN, fear of physical side effects or feeling uncomfortable. Conclusion: Given that LLIN access and use was a bit short of the targets, it conveys important messages to the malaria control program. Targeting specific population segments and groups for achieving expected LLIN coverage is very crucial. And also, addressing behavior failure by well-designed behavioral change interventions is mandatory.Keywords: long lasting insecticide net, malaria, malaria control programme, World Health Organisation
Procedia PDF Downloads 1881720 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms
Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier
Abstract:
Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability
Procedia PDF Downloads 1071719 A Review on Future Safety Conditions and Requirements for E-Bikes
Authors: Jonas Palmer, Leon Brüning, Lukas Himmelsbach
Abstract:
The worldwide ambitions to transform the transportation sector are increasingly affecting the safety conditions for all traffic participants and the required infrastructure. To contribute to the transformation and for health aspects, individuals search for carbon-free alternatives that include physical excitation. Especially e-bikes experience a growing demand within the last few years and consequently change the safety requirements. E-cyclists are exposed to amplified risks due to higher velocity in comparison to classic cyclists. Furthermore, cyclists suffer from a lack of infrastructure, rider assistance systems as well as awareness of other road users. For minimizing the risk of accidents, it is crucial to identify, develop and implement safety measures for cyclists. The paper aims to contribute to future research with delivering an overview of the latest publications and to subsequently identify essential research gaps. Therefore, it is essential to analyze the areas of technical adjustments as well as legal aspects and the correlation of both. The review`s insights can intensify the awareness of safety issues related to e-bikes and promote the development and implementation of appropriate measures.Keywords: e-bike safety measures, future mobility, risk management, road safety
Procedia PDF Downloads 1161718 Identification of Successful Criteria for Measuring Large Infrastructure Projects Performance in Malaysia
Authors: M. A. N. Masrom, M. H. I. A. Rahim, G. K. Chen, S. Mohamed
Abstract:
Large infrastructure project is one of significant category in the development of Malaysian construction industry. This type of project has been recognized as a high complexity project with numerous construction risks, large cost involvement, highly technical requirements and divers of resources. Besides, the development of large infrastructure such as highway, railway, Mass Rapid Transit (MRT) and airport are also needed a large investment of public and private sector. To accomplish the development successfully, several challenges has to be determined prior the project commencement. To date, a comprehensive assessment of key success criteria particularly for large infrastructure in developing country such as Malaysia, is still not systematically defined and therefore, it needs further investigation. This paper aims to explore the potential success criteria that would be useful in gauging overall performance of large infrastructure implementation particularly in developing country. Previous successful criteria studies were used to develop a conceptual framework that possibly suitable for measuring large infrastructure performance. The findings show that successful criteria of infrastructure projects implementation could be grouped according to several key elements as it seems significant to the participants in prioritizing project challenges more systematically.Keywords: successful criteria, performance, large infrastructure, Malaysia
Procedia PDF Downloads 4091717 Forecasting the Future Implications of ChatGPT Usage in Education Based on AI Algorithms
Authors: Yakubu Bala Mohammed, Nadire Chavus, Mohammed Bulama
Abstract:
Generative Pre-trained Transformer (ChatGPT) represents an artificial intelligence (AI) tool capable of swiftly generating comprehensive responses to prompts and follow-up inquiries. This emerging AI tool was introduced in November 2022 by OpenAI firm, an American AI research laboratory, utilizing substantial language models. This present study aims to delve into the potential future consequences of ChatGPT usage in education using AI-based algorithms. The paper will bring forth the likely potential risks of ChatGBT utilization, such as academic integrity concerns, unfair learning assessments, excessive reliance on AI, and dissemination of inaccurate information using four machine learning algorithms: eXtreme-Gradient Boosting (XGBoost), Support vector machine (SVM), Emotional artificial neural network (EANN), and Random forest (RF) would be used to analyze the study collected data due to their robustness. Finally, the findings of the study will assist education stakeholders in understanding the future implications of ChatGPT usage in education and propose solutions and directions for upcoming studies.Keywords: machine learning, ChatGPT, education, learning, implications
Procedia PDF Downloads 2321716 Activating Psychological Resources of DUI (Drivers under the Influence of Alcohol) Using the Traffic Psychology Intervention (IFT Course), Germany
Authors: Parichehr Sharifi, Konrad Reschke, Hans-Liudger Dienel
Abstract:
Psychological intervention generally targets changes in attitudes and behavior. Working with DUIs is part of traffic psychologists’ work. The primary goal of this field is to reduce the probability of re-conspicuous of the delinquent driver. One of these measurements in Germany is IFT courses for DUI s. The IFT course was designed by the Institute for Therapy Research. Participants are drivers who have fallen several times or once with a blood alcohol concentration of 1.6 per mill and who have completed a medical-psychological assessment (MPU) with the result of the course recommendation. The course covers four sessions of 3.5 hours each (1 hour / 60 m) and in a period of 3 to 4 weeks in the group discussion. This work analyzes interventions for the rehabilitation of DUI (Drunk Drivers offenders) offenders in groups under the aspect of activating psychological resources. From the aspect of sustainability, they should also have long-term consequences for the maintenance of unproblematic driving behavior in terms of the activation of resources. It is also addressing a selected consistency-theory-based intervention effect, activating psychological resources. So far, this has only been considered in the psychotherapeutic field but never in the field of traffic psychology. The methodology of this survey is one qualitative and three quantitative. In four sub-studies, it will be examined which measurements can determine the resources and how traffic psychological interventions can strengthen resources. The results of the studies have the following implications for traffic psychology research and practice: (1) In the field of traffic psychology intervention for the restoration of driving fitness, it can be stated that aspects of resource activation in this work have been investigated for the first time by qualitative and quantitative methods. (2) The resource activation could be confirmed based on the determined results as an effective factor of traffic psychological intervention. (3) Two sub-studies show a range of resources and resource activation options that must be given greater emphasis in traffic psychology interventions: - Social resource activation - improvement of the life skills of participants - Reactivation of existing social support options - Re-experiencing self-esteem, self-assurance, and acceptance of traffic-related behaviors. (4) In revising the IFT-§70 course, as well as other courses on recreating aptitude for DUI, new traffic-specific resource-enabling interventions against alcohol abuse should be developed to further enhance the courses through motivational, cognitive, and behavioral effects of resource activation, Resource-activating interventions can not only be integrated into behavioral group interventions but can also be applied in psychodynamic, psychodynamic (individual psychological) and other contexts of individual traffic psychology. The results are indicative but clearly show that personal resources can be strengthened through traffic psychology interventions. In the research, practice, training, and further education of traffic psychology, the aspect of primary resource activation (Grawe, 1999), therefore, always deserves the greatest attention for the rehabilitation of DUIs and Traffic safety.Keywords: traffic safety, psychological resources, activating of resources, intervention programs for alcohol offenders, empowerment
Procedia PDF Downloads 781715 Assessment of Golestan Dam Break Using Finite Volume Method
Authors: Ebrahim Alamatian, Seyed Mehdi Afzalnia
Abstract:
One of the most vital hydraulic structures is the dam. Regarding the unrecoverable damages which may occur after a dam break phenomenon, analyzing dams’ break is absolutely essential. GOLESTAN dam is located in the western South of Mashhad city in Iran. GOLESTAN dam break might lead to severe problems due to adjacent tourist and entertainment areas. In this paper, a numerical code based on the finite volume method was applied for assessing the risk of GOLESTAN dam break. As to this issue, first, a canal with a triangular barrier was modeled so as to verify the capability of the concerned code. Comparing analytical, experimental and numerical results showed that water level in the model results is in a good agreement with the similar water level in the analytical solutions and experimental data. The results of dam break modeling are revealed that two of the bridges, that are PARTOIE and NAMAYESHGAH, located downstream in the flow direction, are at risk following the potential GOLESTAN dam break. Therefore, the required times to conduct the precautionary measures at bridges were calculated at about 12 and 21 minutes, respectively. Thus, it is crucial to announce people about the possible risks of the dam break in order to decrease likely losses.Keywords: numerical model, shallow water equations, GOLESTAN dam break, dry and wet beds modeling
Procedia PDF Downloads 1441714 Future Outlook and Current Situation for Security of Gas Supply in Eastern Baltic Region
Authors: Ando Leppiman, Kati Kõrbe Kaare, Ott Koppel
Abstract:
The growing demand for gas has rekindled a debate on gas security of supply due to supply interruptions, increasing gas prices, transportation and distribution bottlenecks and a growing reliance on imports over longer distances. Security of supply is defined mostly as an infrastructure package to satisfy N-1 criteria. In case of Estonia, Finland, Latvia, and Lithuania all the gas infrastructure is built to supply natural gas only from one single supplier, Russia. In 2012, almost 100% of natural gas to the Eastern Baltic Region was supplied by Gazprom. under such circumstances infrastructure N-1 criteria does not guarantee security of supply. In the Eastern Baltic Region, the assessment of risk of gas supply disruption has been worked out by applying the method of risk scenarios. There are various risks to be tackled in Eastern Baltic States in terms of improving security of supply, such as single supplier risk, physical infrastructure risk, regulatory gap, fair price, and competition. The objective of this paper is to evaluate the energy security of the Eastern Baltic Region within the framework of the European Union’s policies and to make recommendations on how to better guarantee the energy security of the region.Keywords: security of supply, supply routes for natural gas, energy balance, diversified supply options, common regulative package
Procedia PDF Downloads 2621713 Pregnancy through the Lens of Iranian Women with HIV: A Qualitative
Authors: Zahra BehboodiI-Moghadam, Zohre Khalajinia, Ali Reza Nikbakht Nasrabadi, Minoo Mohraz
Abstract:
The purpose of our study was to explore and describe the experiences of pregnant women with HIV in Iran. A qualitative exploratory study with conventional content analysis was used. Twelve pregnant women with HIV who referred to perinatal care at the Imam Khomeini Hospital Behavioral Diseases Consultation: Center in Tehran were recruited to participate in in-depth interviews. The average age of the participants was 32.5 years. Four main themes were extracted from the data: “fear and hope, “stigma and discrimination, “marital life stability” and “trust”. The findings reveal the pregnant women living with HIV are vulnerable and need professional support. Improving the knowledge of healthcare professionals especially midwifes on pregnancy complications for women with HIV is crucial in order to provide high-quality care to pregnant women with HIV-positive.Keywords: HIV, pregnancy, content analysis, experiences, Iran, qualitative research
Procedia PDF Downloads 4721712 Design and Implementation of 2D Mesh Network on Chip Using VHDL
Authors: Boudjedra Abderrahim, Toumi Salah, Boutalbi Mostefa, Frihi Mohammed
Abstract:
Nowadays, using the advancement of technology in semiconductor device fabrication, many transistors can be integrated to a single chip (VLSI). Although the growth chip density potentially eases systems-on-chip (SoCs) integrating thousands of processing element (PE) such as memory, processor, interfaces cores, system complexity, high-performance interconnect and scalable on-chip communication architecture become most challenges for many digital and embedded system designers. Networks-on-chip (NoCs) becomes a new paradigm that makes possible integrating heterogeneous devices and allows many communication constraints and performances. In this paper, we are interested for good performance and low area for implementation and a behavioral modeling of network on chip mesh topology design using VHDL hardware description language with performance evaluation and FPGA implementation results.Keywords: design, implementation, communication system, network on chip, VHDL
Procedia PDF Downloads 3791711 CNN-Based Compressor Mass Flow Estimator in Industrial Aircraft Vapor Cycle System
Authors: Justin Reverdi, Sixin Zhang, Saïd Aoues, Fabrice Gamboa, Serge Gratton, Thomas Pellegrini
Abstract:
In vapor cycle systems, the mass flow sensor plays a key role for different monitoring and control purposes. However, physical sensors can be inaccurate, heavy, cumbersome, expensive, or highly sensitive to vibrations, which is especially problematic when embedded into an aircraft. The conception of a virtual sensor, based on other standard sensors, is a good alternative. This paper has two main objectives. Firstly, a data-driven model using a convolutional neural network is proposed to estimate the mass flow of the compressor. We show that it significantly outperforms the standard polynomial regression model (thermodynamic maps) in terms of the standard MSE metric and engineer performance metrics. Secondly, a semi-automatic segmentation method is proposed to compute the engineer performance metrics for real datasets, as the standard MSE metric may pose risks in analyzing the dynamic behavior of vapor cycle systems.Keywords: deep learning, convolutional neural network, vapor cycle system, virtual sensor
Procedia PDF Downloads 611710 Linguistic Inclusion in the Work of International NGOs: English as Both an Opportunity and a Barrier
Authors: Marta Bas-Szymaszek
Abstract:
This research examines the intricate relationship between language practices and beliefs within international environmental non-governmental organizations (ENGOs), with a particular focus on the Climate Action Network Europe (CAN Europe). While acknowledging that ENGOs often employ multilingual staff, this study aims to analyze the dual role of English within this sector. While English facilitates practical communication among individuals from diverse backgrounds, it also perpetuates inequalities and marginalization within CAN Europe. Instances of linguistic dominance impede participation and representation, reinforcing language hierarchies. Furthermore, the symbolic power of English risks overshadowing the multilingual skills of NGO employees. Through fourteen in-depth interviews, focus group discussions, and observations, this research uncovers the lived experiences of individuals navigating Europe’s largest environmental NGO network. By analyzing CAN Europe’s implicit language policy and the hegemony of English, this study illuminates the challenges within multilingual settings. The organization advocates for the implementation of more inclusive language policies and practices, with the objective of recognizing and embracing linguistic diversity within international environmental NGOs.Keywords: language policy, English, NGOs, linguistic inclusion, multilingualism
Procedia PDF Downloads 431709 Coastal Flood Mapping of Vulnerability Due to Sea Level Rise and Extreme Weather Events: A Case Study of St. Ives, UK
Authors: S. Vavias, T. R. Brewer, T. S. Farewell
Abstract:
Coastal floods have been identified as an important natural hazard that can cause significant damage to the populated built-up areas, related infrastructure and also ecosystems and habitats. This study attempts to fill the gap associated with the development of preliminary assessments of coastal flood vulnerability for compliance with the EU Directive on the Assessment and Management of Flood Risks (2007/60/EC). In this context, a methodology has been created by taking into account three major parameters; the maximum wave run-up modelled from historical weather observations, the highest tide according to historic time series, and the sea level rise projections due to climate change. A high resolution digital terrain model (DTM) derived from LIDAR data has been used to integrate the estimated flood events in a GIS environment. The flood vulnerability map created shows potential risk areas and can play a crucial role in the coastal zone planning process. The proposed method has the potential to be a powerful tool for policy and decision makers for spatial planning and strategic management.Keywords: coastal floods, vulnerability mapping, climate change, extreme weather events
Procedia PDF Downloads 3971708 Adaptive Thermal Comfort Model for Air-Conditioned Lecture Halls in Malaysia
Authors: B. T. Chew, S. N. Kazi, A. Amiri
Abstract:
This paper presents an adaptive thermal comfort model study in the tropical country of Malaysia. A number of researchers have been interested in applying the adaptive thermal comfort model to different climates throughout the world, but so far no study has been performed in Malaysia. For the use as a thermal comfort model, which better applies to hot and humid climates, the adaptive thermal comfort model was developed as part of this research by using the collected results from a large field study in six lecture halls with 178 students. The relationship between the operative temperature and behavioral adaptations was determined. In the developed adaptive model, the acceptable indoor neutral temperatures lay within the range of 23.9-26.0 oC, with outdoor temperatures ranging between 27.0–34.6oC. The most comfortable temperature for students in the lecture hall was 25.7 oC.Keywords: hot and humid, lecture halls, neutral temperature, adaptive thermal comfort model
Procedia PDF Downloads 3681707 The Use of Non-Parametric Bootstrap in Computing of Microbial Risk Assessment from Lettuce Consumption Irrigated with Contaminated Water by Sanitary Sewage in Infulene Valley
Authors: Mario Tauzene Afonso Matangue, Ivan Andres Sanchez Ortiz
Abstract:
The Metropolitan area of Maputo (Mozambique Capital City) is located in semi-arid zone (800 mm annual rainfall) with 1101170 million inhabitants. On the west side, there are the flatlands of Infulene where the Mulauze River flows towards to the Indian Ocean, receiving at this site, the storm water contaminated with sanitary sewage from Maputo, transported through a concrete open channel. In Infulene, local communities grow salads crops such as tomato, onion, garlic, lettuce, and cabbage, which are then commercialized and consumed in several markets in Maputo City. Lettuce is the most daily consumed salad crop in different meals, generally in fast-foods, breakfasts, lunches, and dinners. However, the risk of infection by several pathogens due to the consumption of lettuce, using the Quantitative Microbial Risk Assessment (QMRA) tools, is still unknown since there are few studies or publications concerning to this matter in Mozambique. This work is aimed at determining the annual risk arising from the consumption of lettuce grown in Infulene valley, in Maputo, using QMRA tools. The exposure model was constructed upon the volume of contaminated water remaining in the lettuce leaves, the empirical relations between the number of pathogens and the indicator of microorganisms (E. coli), the consumption of lettuce (g) and reduction of pathogens (days). The reference pathogens were Vibrio cholerae, Cryptosporidium, norovirus, and Ascaris. The water quality samples (E. coli) were collected in the storm water channel from January 2016 to December 2018, comprising 65 samples, and the urban lettuce consumption data were collected through inquiry in Maputo Metropolis covering 350 persons. A non-parametric bootstrap was performed involving 10,000 iterations over the collected dataset, namely, water quality (E. coli) and lettuce consumption. The dose-response models were: Exponential for Cryptosporidium, Kummer Confluent hypergeomtric function (1F1) for Vibrio and Ascaris Gaussian hypergeometric function (2F1-(a,b;c;z) for norovirus. The annual infection risk estimates were performed using R 3.6.0 (CoreTeam) software by Monte Carlo (Latin hypercubes), a sampling technique involving 10,000 iterations. The annual infection risks values expressed by Median and the 95th percentile, per person per year (pppy) arising from the consumption of lettuce are as follows: Vibrio cholerae (1.00, 1.00), Cryptosporidium (3.91x10⁻³, 9.72x 10⁻³), nororvirus (5.22x10⁻¹, 9.99x10⁻¹) and Ascaris (2.59x10⁻¹, 9.65x10⁻¹). Thus, the consumption of the lettuce would result in greater risks than the tolerable levels ( < 10⁻³ pppy or 10⁻⁶ DALY) for all pathogens, and the Vibrio cholerae is the most virulent pathogens, according to the hit-single models followed by the Ascaris lumbricoides and norovirus. The sensitivity analysis carried out in this work pointed out that in the whole QMRA, the most important input variable was the reduction of pathogens (Spearman rank value was 0.69) between harvest and consumption followed by water quality (Spearman rank value was 0.69). The decision-makers (Mozambique Government) must strengthen the prevention measures related to pathogens reduction in lettuce (i.e., washing) and engage in wastewater treatment engineering.Keywords: annual infections risk, lettuce, non-parametric bootstrapping, quantitative microbial risk assessment tools
Procedia PDF Downloads 1201706 An Overview of Privacy and Security Issues in Social Networks
Authors: Mohamad Ibrahim Al Ladan
Abstract:
Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures
Procedia PDF Downloads 3071705 Authentic Connection between the Deity and the Individual Human Being Is Vital for Psychological, Biological, and Social Health
Authors: Sukran Karatas
Abstract:
Authentic energy network interrelations between the Creator and the creations as well as from creations to creations are the most important points for the worlds of physics and metaphysic to unite together and work in harmony, both within human beings, on the other hand, have the ability to choose their own life style voluntarily. However, it includes the automated involuntary spirit, soul and body working systems together with the voluntary actions, which involve personal, cultural and universal, rational or irrational variable values. Therefore, it is necessary for human beings to know the methods of existing authentic energy network connections to be able to communicate correlate and accommodate the physical and metaphysical entities as a proper functioning unity; this is essential for complete human psychological, biological and social well-being. Authentic knowledge is necessary for human beings to verify the position of self within self and with others to regulate conscious and voluntary actions accordingly in order to prevent oppressions and frictions within self and between self and others. Unfortunately, the absence of genuine individual and universal basic knowledge about how to establish an authentic energy network connection within self, with the deity and the environment is the most problematic issue even in the twenty-first century. The second most problematic issue is how to maintain freedom, equality and justice among human beings during these strictly interwoven network connections, which naturally involve physical, metaphysical and behavioral actions of the self and the others. The third and probably the most complicated problem is the scientific identification and the authentication of the deity. This not only provides the whole power and control over the choosers to set their life orders but also to establish perfect physical and metaphysical links as fully coordinated functional energy network. This thus indicates that choosing an authentic deity is the key-point that influences automated, emotional, and behavioral actions altogether, which shapes human perception, personal actions, and life orders. Therefore, we will be considering the existing ‘four types of energy wave end boundary behaviors’, comprising, free end, fixed end boundary behaviors, as well as boundary behaviors from denser medium to less dense medium and from less dense medium to denser medium. Consequently, this article aims to demonstrate that the authentication and the choice of deity has an important effect on individual psychological, biological and social health. It is hoped that it will encourage new researches in the field of authentic energy network connections to establish the best position and the most correct interrelation connections with self and others without violating the authorized orders and the borders of one another to live happier and healthier lives together. In addition, the book ‘Deity and Freedom, Equality, Justice in History, Philosophy, Science’ has more detailed information for those interested in this subject.Keywords: deity, energy network, power, freedom, equality, justice, happiness, sadness, hope, fear, psychology, biology, sociology
Procedia PDF Downloads 3471704 Evaluating the Destination Image of Iran and Its Influence on Revisit Intention: After Iran’s 2022 Crisis
Authors: Hamideh S. Shahidi
Abstract:
This research examines destination image and its impact on tourist revisit intention. Destination images can evolve over time, depending on a number of factors. Due to the multidimensional nature of destination image, the full extent of what might influence that change is not yet fully understood. As a result, the destination image should be measured with a heavy consideration of the variables used. Depending on the time and circumstances, these variables should be adjusted based on the research’s objectives. The aim of this research is to evaluate the image of destinations that may be perceived as risky, such as Iran, from the perspective of European cultural travellers. Further to the goal of understanding the effects of an image on tourists’ decision-making, the research will assess the impact of destination image on the revisit intention using push and pull factors and perceived risks with the potential moderating effect of cultural contact (the direct interaction between the host and the tourists with different culture). In addition, the moderating effect of uncertainty avoidance on revisit intention after Iran’s crisis in 2022 will be measured. Furthermore, the level of uncertainty avoidance between gender and age will be compared.Keywords: destination image, Iran’s 2022 crisis, revisit intention, uncertainty avoidance
Procedia PDF Downloads 991703 Behavioral and EEG Reactions in Native Turkic-Speaking Inhabitants of Siberia and Siberian Russians during Recognition of Syntactic Errors in Sentences in Native and Foreign Languages
Authors: Tatiana N. Astakhova, Alexander E. Saprygin, Tatyana A. Golovko, Alexander N. Savostyanov, Mikhail S. Vlasov, Natalia V. Borisova, Alexandera G. Karpova, Urana N. Kavai-ool, Elena D. Mokur-ool, Nikolay A. Kolchanov, Lubomir I. Aftanas
Abstract:
The aim of the study is to compare behaviorally and EEG reactions in Turkic-speaking inhabitants of Siberia (Tuvinians and Yakuts) and Russians during the recognition of syntax errors in native and foreign languages. 63 healthy aboriginals of the Tyva Republic, 29 inhabitants of the Sakha (Yakutia) Republic, and 55 Russians from Novosibirsk participated in the study. All participants completed a linguistic task, in which they had to find a syntax error in the written sentences. Russian participants completed the task in Russian and in English. Tuvinian and Yakut participants completed the task in Russian, English, and Tuvinian or Yakut, respectively. EEG’s were recorded during the solving of tasks. For Russian participants, EEG's were recorded using 128-channels. The electrodes were placed according to the extended International 10-10 system, and the signals were amplified using ‘Neuroscan (USA)’ amplifiers. For Tuvinians and Yakuts EEG's were recorded using 64-channels and amplifiers Brain Products, Germany. In all groups 0.3-100 Hz analog filtering, sampling rate 1000 Hz were used. Response speed and the accuracy of recognition error were used as parameters of behavioral reactions. Event-related potentials (ERP) responses P300 and P600 were used as indicators of brain activity. The accuracy of solving tasks and response speed in Russians were higher for Russian than for English. The P300 amplitudes in Russians were higher for English; the P600 amplitudes in the left temporal cortex were higher for the Russian language. Both Tuvinians and Yakuts have no difference in accuracy of solving tasks in Russian and in their respective national languages (Tuvinian and Yakut). However, the response speed was faster for tasks in Russian than for tasks in their national language. Tuvinians and Yakuts showed bad accuracy in English, but the response speed was higher for English than for Russian and the national languages. With Tuvinians, there were no differences in the P300 and P600 amplitudes and in cortical topology for Russian and Tuvinian, but there was a difference for English. In Yakuts, the P300 and P600 amplitudes and topology of ERP for Russian were the same as Russians had for Russian. In Yakuts, brain reactions during Yakut and English comprehension had no difference and were reflected foreign language comprehension -while the Russian language comprehension was reflected native language comprehension. We found out that the Tuvinians recognized both Russian and Tuvinian as native languages, and English as a foreign language. The Yakuts recognized both English and Yakut as a foreign language, only Russian as a native language. According to the inquirer, both Tuvinians and Yakuts use the national language as a spoken language, whereas they don’t use it for writing. It can well be a reason that Yakuts perceive the Yakut writing language as a foreign language while writing Russian as their native.Keywords: EEG, language comprehension, native and foreign languages, Siberian inhabitants
Procedia PDF Downloads 5321702 Risk Management in an Islamic Framework
Authors: Magid Maatallah
Abstract:
The problem is, investment management in modern conditions boils down to risk management which is very underdeveloped in Islamic financial theory and practice. Add to this the fact that, in Islamic perception, this is one of the areas of conventional finance in need of drastic reforms. This need was recently underlined by the story of Long Term Capital Management (LTCM ), ( told by Roger Lowenstein in his book, When Genius Failed, Random House, 2000 ). So we face a double challenge, to develop Islamic techniques of risk management and to see that these new techniques are free from the ills with which conventional methods are suffering. This is different from the challenge faced in the middle of twentieth century, to develop a method of financial intermediation free of interest.Risk was always there, especially in business. But industrialization brought risks unknown in trade and agriculture. Industrial production often involves long periods of time .The longer the period of production the more the uncertainty. The scope of the market has expanded to cover the whole world, introducing new kinds of risk. More than a thousand years ago, when Islamic laws were being written, the nature and scope of risk and uncertainty was different. However, something can still be learnt which, in combination with the modern experience, should enable us to realize the Shariah objectives of justice, fairness and efficiency.Keywords: financial markets, Islamic framework, risk management, investment
Procedia PDF Downloads 5521701 An Ensemble Deep Learning Architecture for Imbalanced Classification of Thoracic Surgery Patients
Authors: Saba Ebrahimi, Saeed Ahmadian, Hedie Ashrafi
Abstract:
Selecting appropriate patients for surgery is one of the main issues in thoracic surgery (TS). Both short-term and long-term risks and benefits of surgery must be considered in the patient selection criteria. There are some limitations in the existing datasets of TS patients because of missing values of attributes and imbalanced distribution of survival classes. In this study, a novel ensemble architecture of deep learning networks is proposed based on stacking different linear and non-linear layers to deal with imbalance datasets. The categorical and numerical features are split using different layers with ability to shrink the unnecessary features. Then, after extracting the insight from the raw features, a novel biased-kernel layer is applied to reinforce the gradient of the minority class and cause the network to be trained better comparing the current methods. Finally, the performance and advantages of our proposed model over the existing models are examined for predicting patient survival after thoracic surgery using a real-life clinical data for lung cancer patients.Keywords: deep learning, ensemble models, imbalanced classification, lung cancer, TS patient selection
Procedia PDF Downloads 1451700 Controller Design and Experimental Evaluation of a Motorized Assistance for a Patient Transfer Floor Lift
Authors: Donatien Callon, Ian Lalonde, Mathieu Nadeau, Alexandre Girard
Abstract:
Patient transfer is a challenging, critical task because it exposes caregivers to injury risks. Available transfer devices, like floor lifts, lead to improvements but are far from perfect. They do not eliminate the caregivers’ risk of musculoskeletal disorders, and they can be burdensome to use due to their poor maneuverability. This paper presents a new motorized floor lift with a single central motorized wheel connected to an instrumented handle. Admittance controllers are designed to 1) improve the device maneuverability, 2) reduce the required caregiver effort, and 3) ensure the security and comfort of patients. Two controller designs, one with a linear admittance law and a non-linear admittance law with variable damping, were developed and implemented on a prototype. Tests were performed on seven participants to evaluate the performance of the assistance system and the controllers. The experimental results show that 1) the motorized assistance with the variable damping controller improves maneuverability by 28%, 2) reduces the amount of effort required to push the lift by 66%, and 3) provides the same level of patient comfort compared to a standard unassisted floor lift.Keywords: floor lift, human robot interaction, admittance controller, variable admittance
Procedia PDF Downloads 1111699 Student Learning and Motivation in an Interculturally Inclusive Classroom
Authors: Jonathan H. Westover, Jacque P. Westover, Maureen S. Andrade
Abstract:
Though learning theories vary in complexity and usefulness, a thorough understanding of foundational learning theories is a necessity in today’s educational environment. Additionally, learning theories lead to approaches in instruction that can affect student motivation and learning. The combination of a learning theory and elements to enhance student motivation can create a learning context where the student can thrive in their educational pursuits. This paper will provide an overview of three main learning theories: (1) Behavioral Theory, (2) Cognitive Theory, and (3) Constructivist Theory and explore their connection to elements of student learning motivation. Finally, we apply these learning theories and elements of student motivation to the following two context: (1) The FastStart Program at the Community College of Denver, and (2) An Online Academic English Language Course. We discussed potential of the program and course to have success in increasing student success outcomes.Keywords: learning theory, student motivation, inclusive pedagogy, developmental education
Procedia PDF Downloads 2561698 An Appraisal of the Attitude and Motivation of Almajiri (Teenage-Beggars) to Tsangaya Education System in Katsina and Zamfara States, Nigeria
Authors: Rasaq Ayodeji Iliyas
Abstract:
Almajiris are teenage beggars who under the guise of been enlisted in religious study beg perpetually on the streets and homes. A poorly attended bridge gap juvenile education system called Tsangaya was instituted for them. This study appraised the attitude and motivation of the over 9 million Almajiris largely domiciled in the Northern Nigeria to the Government’s efforts at getting them educated. The study, a survey research design, employed validated structured interview instrument that showed a high reliability index (Alpha Cronbach- 0.86) to gather data. 950 Almajiris sampled across the 50 Local Government Areas of Katsina (36) and Zamfara (14) States, Nigeria participated in the study. Outcomes of the study revealed a chronic attitudinal problem from the Almajiris; and a peculiarly low motivation to the Tsangaya School. It was, however, recommended that traditional rulers should be mandated by government to sensitize parents on the many risks involved in the inhuman cultural practice, and the grave consequences of unskilled adult life of the children; and state governments should legislate against the demeaning Almajiri practice, which already misrepresents Islam.Keywords: Almajiri, apraissal, Tsangaya education, motivation, attitude, motivation
Procedia PDF Downloads 2801697 Beyond the Economics of Food: Household Food Strategies in Clusters of the Umkhanyakude District Municipality
Authors: Mduduzi Nhlozi
Abstract:
Food insecurity continues to persist in rural areas of South Africa today. A number of factors can be attributed to this including declining rural economies, rising unemployment, natural disasters such as drought as well as shifting cultural norms, values, traditions and beliefs. This paper explores mechanisms used by rural households to achieve food security in the midst of various threats and risks to their livelihoods. The study used semi-structured questionnaire to collect information on lived experiences of households in their quest to access and ensure availability of food. The paper finds that households use a number of food strategies namely economy-related, culture-related and rite-of-passage related strategies to achieve food security. The thrust of argument in the paper is that there is a need for food security studies to move beyond the orthodox, economic analytic framework, towards new institutional economics, focusing on local governance and socio-cultural systems supporting households to achieve food security. It advocates for localised food security plans to be developed by local municipalities to improve food security status for rural households.Keywords: household, food insecurity, food strategies, new institutional economics, umkhanyakude
Procedia PDF Downloads 121