Search results for: information sources
2646 Interactive Fun Activities for Blind and Sighted Teenagers
Authors: Haif Alharthy, Samar Altarteer
Abstract:
Blind and sighted teenagers might find it challenging to communicate and have fun interaction with each other. The previous studies emphasize the importance of the interactive communication of the blind with the sighted people in developing the interpersonal and social skills of the blind people . Playing games is one of the effective ways used to engage the blind with the sighted people and help in enhancing their social skills. However, it is difficult to find a fun game that is designed to encourage interaction between blind and sighted teenagers in which the blind can play it independently without help and that the sighted find its design attractive and satisfying. The aim of this paper is to examine how challenging is to have fun interaction between blind and sighted people and offer interactive tabletop game solution in which both of them can independently participate and enjoy. The paper discusses the importance and the impact of the interactive fun communication between blind and sighted people and how to get them involved with each other through games. The paper investigates several approaches to design a universal game. A survey was conducted for blind teenager’s family members to discover what difficulties they face while playing and communicating with their blind family member and to identify the blind’s needs and interests in games. The study reveals that although families like to play tabletop games with their blind member, they find difficulties in finding universal games that is interesting and adequate for both. Also, qualitative interviews were conducted with blind teenager shows the sufficiency in tabletop games that do not require help from another family member to play the game. The results suggested that an effective approach is to develop an interactive tabletop game embedded with audio and tactile techniques. The findings of the pilot study highlighted the necessary information such as tools, visuals, and game concepts that should be considered in developing interactive card game for blind and sighted teenagers.Keywords: Blind, card game, communication, interaction, play, tabletop game, teenager
Procedia PDF Downloads 2092645 Scalable and Accurate Detection of Pathogens from Whole-Genome Shotgun Sequencing
Authors: Janos Juhasz, Sandor Pongor, Balazs Ligeti
Abstract:
Next-generation sequencing, especially whole genome shotgun sequencing, is becoming a common approach to gain insight into the microbiomes in a culture-independent way, even in clinical practice. It does not only give us information about the species composition of an environmental sample but opens the possibility to detect antimicrobial resistance and novel, or currently unknown, pathogens. Accurately and reliably detecting the microbial strains is a challenging task. Here we present a sensitive approach for detecting pathogens in metagenomics samples with special regard to detecting novel variants of known pathogens. We have developed a pipeline that uses fast, short read aligner programs (i.e., Bowtie2/BWA) and comprehensive nucleotide databases. Taxonomic binning is based on the lowest common ancestor (LCA) principle; each read is assigned to a taxon, covering the most significantly hit taxa. This approach helps in balancing between sensitivity and running time. The program was tested both on experimental and synthetic data. The results implicate that our method performs as good as the state-of-the-art BLAST-based ones, furthermore, in some cases, it even proves to be better, while running two orders magnitude faster. It is sensitive and capable of identifying taxa being present only in small abundance. Moreover, it needs two orders of magnitude less reads to complete the identification than MetaPhLan2 does. We analyzed an experimental anthrax dataset (B. anthracis strain BA104). The majority of the reads (96.50%) was classified as Bacillus anthracis, a small portion, 1.2%, was classified as other species from the Bacillus genus. We demonstrate that the evaluation of high-throughput sequencing data is feasible in a reasonable time with good classification accuracy.Keywords: metagenomics, taxonomy binning, pathogens, microbiome, B. anthracis
Procedia PDF Downloads 1372644 Spatial Interpolation of Intermediate Soil Properties to Enhance Geotechnical Surveying for Foundation Design
Authors: Yelbek B. Utepov, Assel T. Mukhamejanova, Aliya K. Aldungarova, Aida G. Nazarova, Sabit A. Karaulov, Nurgul T. Alibekova, Aigul K. Kozhas, Dias Kazhimkanuly, Akmaral K. Tleubayeva
Abstract:
This research focuses on enhancing geotechnical surveying for foundation design through the spatial interpolation of intermediate soil properties. Traditional geotechnical practices rely on discrete data from borehole drilling, soil sampling, and laboratory analyses, often neglecting the continuous nature of soil properties and disregarding values in intermediate locations. This study challenges these omissions by emphasizing interpolation techniques such as Kriging, Inverse Distance Weighting, and Spline interpolation to capture the nuanced spatial variations in soil properties. The methodology is applied to geotechnical survey data from two construction sites in Astana, Kazakhstan, revealing continuous representations of Young's Modulus, Cohesion, and Friction Angle. The spatial heatmaps generated through interpolation offered valuable insights into the subsurface environment, highlighting heterogeneity and aiding in more informed foundation design decisions for considered cites. Moreover, intriguing patterns of heterogeneity, as well as visual clusters and transitions between soil classes, were explored within seemingly uniform layers. The study bridges the gap between discrete borehole samples and the continuous subsurface, contributing to the evolution of geotechnical engineering practices. The proposed approach, utilizing open-source software geographic information systems, provides a practical tool for visualizing soil characteristics and may pave the way for future advancements in geotechnical surveying and foundation design.Keywords: soil mechanical properties, spatial interpolation, inverse distance weighting, heatmaps
Procedia PDF Downloads 852643 Energy Performance Gaps in Residences: An Analysis of the Variables That Cause Energy Gaps and Their Impact
Authors: Amrutha Kishor
Abstract:
Today, with the rising global warming and depletion of resources every industry is moving toward sustainability and energy efficiency. As part of this movement, it is nowadays obligatory for architects to play their part by creating energy predictions for their designs. But in a lot of cases, these predictions do not reflect the real quantities of energy in newly built buildings when operating. These can be described as ‘Energy Performance Gaps’. This study aims to determine the underlying reasons for these gaps. Seven houses designed by Allan Joyce Architects, UK from 1998 until 2019 were considered for this study. The data from the residents’ energy bills were cross-referenced with the predictions made with the software SefairaPro and from energy reports. Results indicated that the predictions did not match the actual energy usage. An account of how energy was used in these seven houses was made by means of personal interviews. The main factors considered in the study were occupancy patterns, heating systems and usage, lighting profile and usage, and appliances’ profile and usage. The study found that the main reasons for the creation of energy gaps were the discrepancies in occupant usage and patterns of energy consumption that are predicted as opposed to the actual ones. This study is particularly useful for energy-conscious architectural firms to fine-tune the approach to designing houses and analysing their energy performance. As the findings reveal that energy usage in homes varies based on the way residents use the space, it helps deduce the most efficient technological combinations. This information can be used to set guidelines for future policies and regulations related to energy consumption in homes. This study can also be used by the developers of simulation software to understand how architects use their product and drive improvements in its future versions.Keywords: architectural simulation, energy efficient design, energy performance gaps, environmental design
Procedia PDF Downloads 1182642 Anti-Corruption Education in Ukraine during Martial Law and in Lithuania during the State of Emergency
Authors: Kateryna Kulyk
Abstract:
Anti-corruption education is an integral element of the corruption prevention mechanism of any state. Effective implementation of anti-corruption policy is impossible without awareness-raising activities. Information campaigns should target different social groups and aim to reduce tolerance to any form of corruption. Today, Ukraine and Lithuania have all the necessary infrastructure to actively work in this direction. Anti-corruption measures and building a society resistant to corruption are particularly important in the context of martial law in Ukraine and the state of emergency in Lithuania, as these conditions increase the risks of corrupt practices. To implement this area of activity, it is recommended to actively involve all state and local authorities, business representatives, non-governmental organisations, and all interested citizens. As of today, educational institutions, specialised anti-corruption bodies, and the public are already involved in this process. The purpose of the research is to draw public attention to the need and importance of obtaining basic knowledge on combating and preventing corruption, even in a state of emergency or martial law. This topic remains relevant even during the period of a state of emergency or martial law, as the risk of corrupt practices increases during these periods. The study is based on a comprehensive analysis of the anti-corruption policies of Ukraine and Lithuania, sociological research, and our own survey of anti-corruption experts. Legislation, reports of anti-corruption bodies and civil society organisations were analysed. We also conducted an anonymous survey of 13 anti-corruption experts on the most important anti-corruption measures in the countries studied. The main contribution of the research is to draw attention to the problem of low awareness of the population of countries about the importance of anti-corruption education as one of the necessary conditions for reducing corruption practices.Keywords: corruption, prevention and combating of corruption, education, anti-corruption education, martial law, state of emergency
Procedia PDF Downloads 352641 Evaluation of Environmental and Social Management System of Green Climate Fund's Accredited Entities: A Qualitative Approach Applied to Environmental and Social System
Authors: Sima Majnooni
Abstract:
This paper discusses the Green Climate Fund's environmental and social management framework (GCF). The environmental and social management framework ensures the accredited entity considers the GCF's accreditation standards and effectively implements each of the GCF-funded projects. The GCF requires all accredited entities to meet basic transparency and accountability standards as well as environmental and social safeguards (ESMS). In doing so, the accredited entity sets up different independent units. One of these units is called the Grievance Mechanism. When allegations of environmental and social harms are raised in association with GCF-funded activities, affected parties can contact the entity’s grievance unit. One of the most challenging things about the accredited entity's grievance unit is the lack of available information and resources on the entities' websites. Many AEs have anti-corruption or anti-money laundering unit, but they do not have the environmental and social unit for affected people. This paper will argue the effectiveness of environmental and social grievance mechanisms of AEs by using a qualitative approach to indicate how many of AEs have a poor or an effective GRM. Some ESMSs seem highly effective. On the other hand, other mechanisms lack basic requirements such as a clear, transparent, uniform procedure and a definitive timetable. We have looked at each AE mechanism not only in light of how the website goes into detail regarding the process of grievance mechanism but also in light of their risk category. Many mechanisms appear inadequate for the lower level risk category entities (C) and, even surprisingly, for many higher-risk categories (A). We found; in most cases, the grievance mechanism of AEs seems vague.Keywords: grievance mechanism, vague environmental and social policies, green climate fund, international climate finance, lower and higher risk category
Procedia PDF Downloads 1242640 Comparison of Blockchain Ecosystem for Identity Management
Authors: K. S. Suganya, R. Nedunchezhian
Abstract:
In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management.Keywords: blockchain, consensus protocols, bitcoin, identity theft, digital identity management, pandemic, COVID-19, self-sovereign identity
Procedia PDF Downloads 1302639 Sudden Death in Young Patients: A Study of 312 Autopsy Cases
Authors: N. Haj Salem, M. Belhadj, S. Ben Jomâa, S. Saadi, R. Dhouieb, A. Chadly
Abstract:
Introduction: Sudden death in young is seen as a dramatic phenomenon requiring knowledge of its impact and determining their causes. Aim: We aim to study the epidemiological characteristics of sudden death in young, and to discuss the mechanism and the importance of autopsy in these situations. Material and methods: We performed a retrospective cohort study using autopsy data from the department of forensic medicine at the University Hospital of Fattouma Bourguiba, Monastir-Tunisia. A review of all autopsies performed during 23 years was done. In each case, clinical information and circumstances of death were obtained. We have included all sudden death in persons aged between 1 year and 35 years for the male and from one year to 45 years for female. We collected 312 cases of sudden death during the studied period. The collected data were processed using SPSS 20. The significance level was set at 0.05. Results: Thirty-two cases of cardiac ischemic sudden death have been collected. Myocardial infarction was the second cause of sudden death in young patients. There was a male predominance. The most affected subjects were aged between 25-45 years. The death occurred more frequently at rest. Coronary artery disease has been discovered in twenty-four cases (75%). A severe coronary artery disease was observed in two children with medical history of familial hypercholesterolemia. The myocardial infarction occurred in healthy coronary arteries in eight cases. An anomalous course of coronary arteries, in particular, myocardial bridging, was found in eight cases (25%). Toxicological screening was negative in all cases. Second cause of death was hypertrophic cardiomyopathy. Neurological and respiratory causes of death were implicated respectively in 10% and 15%. Conclusion: Identifying epidemiological characteristics of sudden death in this population is important for guiding approaches to prevention that must be based on dietary hygienic measures and the control of cardiovascular risk factors.Keywords: autopsy, cardiac death, sudden death, young
Procedia PDF Downloads 2392638 Adaptive Energy-Aware Routing (AEAR) for Optimized Performance in Resource-Constrained Wireless Sensor Networks
Authors: Innocent Uzougbo Onwuegbuzie
Abstract:
Wireless Sensor Networks (WSNs) are crucial for numerous applications, yet they face significant challenges due to resource constraints such as limited power and memory. Traditional routing algorithms like Dijkstra, Ad hoc On-Demand Distance Vector (AODV), and Bellman-Ford, while effective in path establishment and discovery, are not optimized for the unique demands of WSNs due to their large memory footprint and power consumption. This paper introduces the Adaptive Energy-Aware Routing (AEAR) model, a solution designed to address these limitations. AEAR integrates reactive route discovery, localized decision-making using geographic information, energy-aware metrics, and dynamic adaptation to provide a robust and efficient routing strategy. We present a detailed comparative analysis using a dataset of 50 sensor nodes, evaluating power consumption, memory footprint, and path cost across AEAR, Dijkstra, AODV, and Bellman-Ford algorithms. Our results demonstrate that AEAR significantly reduces power consumption and memory usage while optimizing path weight. This improvement is achieved through adaptive mechanisms that balance energy efficiency and link quality, ensuring prolonged network lifespan and reliable communication. The AEAR model's superior performance underlines its potential as a viable routing solution for energy-constrained WSN environments, paving the way for more sustainable and resilient sensor network deployments.Keywords: wireless sensor networks (WSNs), adaptive energy-aware routing (AEAR), routing algorithms, energy, efficiency, network lifespan
Procedia PDF Downloads 362637 Blueprinting of a Normalized Supply Chain Processes: Results in Implementing Normalized Software Systems
Authors: Bassam Istanbouli
Abstract:
With the technology evolving every day and with the increase in global competition, industries are always under the pressure to be the best. They need to provide good quality products at competitive prices, when and how the customer wants them. In order to achieve this level of service, products and their respective supply chain processes need to be flexible and evolvable; otherwise changes will be extremely expensive, slow and with many combinatorial effects. Those combinatorial effects impact the whole organizational structure, from a management, financial, documentation, logistics and specially the information system Enterprise Requirement Planning (ERP) perspective. By applying the normalized system concept/theory to segments of the supply chain, we believe minimal effects, especially at the time of launching an organization global software project. The purpose of this paper is to point out that if an organization wants to develop a software from scratch or implement an existing ERP software for their business needs and if their business processes are normalized and modular then most probably this will yield to a normalized and modular software system that can be easily modified when the business evolves. Another important goal of this paper is to increase the awareness regarding the design of the business processes in a software implementation project. If the blueprints created are normalized then the software developers and configurators will use those modular blueprints to map them into modular software. This paper only prepares the ground for further studies; the above concept will be supported by going through the steps of developing, configuring and/or implementing a software system for an organization by using two methods: The Software Development Lifecycle method (SDLC) and the Accelerated SAP implementation method (ASAP). Both methods start with the customer requirements, then blue printing of its business processes and finally mapping those processes into a software system. Since those requirements and processes are the starting point of the implementation process, then normalizing those processes will end up in a normalizing software.Keywords: blueprint, ERP, modular, normalized
Procedia PDF Downloads 1392636 Evaluation the Effects of Air Pollution on Elderly People of the City of Tehran
Authors: Farideh Gheitasi, Amir Hossain Jaberansari, Payam Abedini
Abstract:
The World Health Organization (WHO) Manifesto for Safe Communities states that "All human beings have an equal right to health and safety". The purpose of a safe Community is to minimize the damages threatening people. It seems that not sufficient attention has been given to relate environment and objectives of the safe Community. The reason for that can be assigned to the lack of enough information about environmental parameters and their relation with indices of the safe community like type and effect time of damages resulting from air pollution. Air pollution can be characterized as one of main environmental problems of Tehran. This problem is mostly due to the special geographic and climate situation, high population density and irregular growth in the number of vehicles. This paper is aimed at investigating the necessity of considering environmental factors to obtain a safe community through determining the effects of environmental pollution, particularly air pollution, on 490000 elders (+65) of Tehran. The methodology used in this study was on the basis of Random sampling and social surveying. The number of questionnaires was determined to be 321 through using Cochran method and the questionnaires were filled out by elders during personal interviews. The analysis of obtained results indicated that elders believe the major effects of air pollution include heart and respiratory diseases, obligation to stay at home on polluted days and its associated mental problems. Moreover, it was found that there is direct link between the number of polluted days and mortality frequency of elders. Having an environmental view may have an appreciable influence on the qualitative and quantitative development of activities and also facilitate obtaining the goals of the Safe Communities. In addition to reduce damages caused by pollutions, this view will encourage friends of the environment to cooperate with authorities of the safe community.Keywords: air pollution, elderly people, environment, waste management
Procedia PDF Downloads 4822635 Pregnant Women and Mothers in Prison, Mother and Baby Units and Mental Health
Authors: Rachel Dolan
Abstract:
Background: Over two thirds of women in prison in England are mothers, and estimates suggest between 100 and 200 women per year give birth during imprisonment. There are currently six mother and baby units (MBUs) in prisons in England which admit women and babies up to the age of 18 months. Although there are only 65 places available, and despite positive impacts, they are rarely full. Mental illness may influence the number of admissions, as may interpretation of admission criteria. They are the only current alternative to separation for imprisoned mothers and their babies. Aims: To identify the factors that affect the decision to apply for/be offered a place in a prison MBU; to measure the impact of a placement upon maternal mental health and wellbeing; To measure the Initial outcomes for mother and child. Methods: A mixed methods approach - 100 pregnant women in English prisons are currently being recruited from prisons in England. Quantitative measures will establish the prevalence of mental disorder, personality disorder, substance misuse and quality of life. Qualitative interviews will document the experiences of pregnancy and motherhood in prison. Results: Preliminary quantitative findings suggest the most prevalent mental disorders are anxiety and depression and approximately half the participants meet the criteria for one or more personality disorders. The majority of participants to date have been offered a place in a prison MBU, and those in a prison with an MBU prior to applying are more likely to be admitted. Those with a previous history of childcare issues, who are known to social services are less likely to be offered a place. Qualitative findings suggest that many women are often hungry and uncomfortable during pregnancy, many have feelings of guilt about having a child in prison and that feelings of anxiety and worry are exacerbated by lack of information.Keywords: mothers, prison, mother and baby units, mental health
Procedia PDF Downloads 2862634 Design of a Fuzzy Expert System for the Impact of Diabetes Mellitus on Cardiac and Renal Impediments
Authors: E. Rama Devi Jothilingam
Abstract:
Diabetes mellitus is now one of the most common non communicable diseases globally. India leads the world with largest number of diabetic subjects earning the title "diabetes capital of the world". In order to reduce the mortality rate, a fuzzy expert system is designed to predict the severity of cardiac and renal problems of diabetic patients using fuzzy logic. Since uncertainty is inherent in medicine, fuzzy logic is used in this research work to remove the inherent fuzziness of linguistic concepts and uncertain status in diabetes mellitus which is the prime cause for the cardiac arrest and renal failure. In this work, the controllable risk factors "blood sugar, insulin, ketones, lipids, obesity, blood pressure and protein/creatinine ratio" are considered as input parameters and the "the stages of cardiac" (SOC)" and the stages of renal" (SORD) are considered as the output parameters. The triangular membership functions are used to model the input and output parameters. The rule base is constructed for the proposed expert system based on the knowledge from the medical experts. Mamdani inference engine is used to infer the information based on the rule base to take major decision in diagnosis. Mean of maximum is used to get a non fuzzy control action that best represent possibility distribution of an inferred fuzzy control action. The proposed system also classifies the patients with high risk and low risk using fuzzy c means clustering techniques so that the patients with high risk are treated immediately. The system is validated with Matlab and is used as a tracking system with accuracy and robustness.Keywords: Diabetes mellitus, fuzzy expert system, Mamdani, MATLAB
Procedia PDF Downloads 2902633 Dynamics of Smallholder Farmer Adoption of High Value Horticultural Crops in Indonesia
Authors: Suprehatin Suprehatin
Abstract:
Improving the participation of smallholder farmers in horticultural value chains to benefit from the rapidly growing demand for high-value agricultural products is one strategy for raising farm income. However, smallholder farmer participation in Indonesian horticultural value chains is under-researched. To address this knowledge gap, this study aims to describe the current status of horticultural crop adoption in Indonesia and analyze the motivations and dynamics of smallholder farmer participation in horticultural value chains: why some small farmers join these new and potentially profitable chains and continue their participation. This study also examines the characteristics of farmers who adopted and those who did not adopt a new horticultural crop with respect to the household (farmer), farm and institutional characteristics. The analysis was conducted using unique data from a 2013 survey of 960 Indonesian farmers on Java Island that produce a variety of agricultural products. Basic statistical analysis showed relatively low adoption rates (10%) of new horticultural crops amongst 960 selected Indonesian farmers with different decisions made in terms of number and timing of new horticultural crop adoption. Adopters were motivated mainly by higher profit, higher yield, and more cash opportunities. The result also showed that current low rates of horticultural crop adoption are associated with a variety of factors, such as lower levels of education among farmers, resource constraints, lack of information on horticultural crop production and low participation in farmer groups. These findings will be helpful for policymakers when designing policies and programs to promote greater participation of Indonesian smallholder farmers in horticultural value chains. In other words, a revitalisation of agricultural policy beyond staple food is important to seize potential benefits from the ongoing agricultural food market transformation.Keywords: farmer adoption, high value, horticultural crops, Indonesia
Procedia PDF Downloads 2812632 Ethanol Chlorobenzene Dosimetr Usage for Measuring Dose of the Intraoperative Linear Electron Accelerator System
Authors: Mojtaba Barzegar, Alireza Shirazi, Saied Rabi Mahdavi
Abstract:
Intraoperative radiation therapy (IORT) is an innovative treatment modality that the delivery of a large single dose of radiation to the tumor bed during the surgery. The radiotherapy success depends on the absorbed dose delivered to the tumor. The achievement better accuracy in patient treatment depends upon the measured dose by standard dosimeter such as ionization chamber, but because of the high density of electric charge/pulse produced by the accelerator in the ionization chamber volume, the standard correction factor for ion recombination Ksat calculated with the classic two-voltage method is overestimated so the use of dose/pulse independent dosimeters such as chemical Fricke and ethanol chlorobenzene (ECB) dosimeters have been suggested. Dose measurement is usually calculated and calibrated in the Zmax. Ksat calculated by comparison of ion chamber response and ECB dosimeter at each applicator degree, size, and dose. The relative output factors for IORT applicators have been calculated and compared with experimentally determined values and the results simulated by Monte Carlo software. The absorbed doses have been calculated and measured with statistical uncertainties less than 0.7% and 2.5% consecutively. The relative differences between calculated and measured OF’s were up to 2.5%, for major OF’s the agreement was better. In these conditions, together with the relative absorbed dose calculations, the OF’s could be considered as an indication that the IORT electron beams have been well simulated. These investigations demonstrate the utility of the full Monte Carlo simulation of accelerator head with ECB dosimeter allow us to obtain detailed information of clinical IORT beams.Keywords: intra operative radiotherapy, ethanol chlorobenzene, ksat, output factor, monte carlo simulation
Procedia PDF Downloads 4792631 Comparative Analysis of Medical Tourism Industry among Key Nations in Southeast Asia
Authors: Nur A. Azmi, Suseela D. Chandran, Fadilah Puteh, Azizan Zainuddin
Abstract:
Medical tourism has been associated as a global phenomenon in developed and developing countries in the 21st century. Medical tourism is defined as an activity in which individuals who travel from one country to another country to seek or receive medical healthcare. Based on the global trend, the number of medical tourists is increasing annually, especially in the Southeast Asia (SEA) region. Since the establishment of Association of Southeast Asian Nations (ASEAN) in 1967, the SEA nations have worked towards regional integration in medical tourism. The medical tourism in the SEA has become the third-largest sector that contributes towards economic development. Previous research has demonstrated several factors that affect the development of medical tourism. However, despite the already published literature on SEA's medical tourism in the last ten years there continues to be a scarcity of research on niche areas each of the SEA countries. Hence, this paper is significant in enriching the literature in the field of medical tourism particularly in showcasing the niche market of medical tourism among the SEA best players namely Singapore, Thailand, Malaysia and Indonesia. This paper also contributes in offering a comparative analysis between the said nations whether they are complementing or competing with each other in the medical tourism sector. This then, will increase the availability of information in SEA region on medical tourism. The data was collected through an in-depth interview with various stakeholders and private hospitals. The data was then analyzed using two approaches namely thematic analysis (interview data) and document analysis (secondary data). The paper concludes by arguing that the ASEAN countries have specific niche market to promote their medical tourism industry. This paper also concludes that these key nations complement each other in the industry. In addition, the medical tourism sector in SEA region offers greater prospects for market development and expansion that witnessed the emerging of new key players from other nations.Keywords: healthcare services, medical tourism, medical tourists, SEA region, comparative analysis
Procedia PDF Downloads 1442630 Assessing the Effects of Sub-Concussive Head Impacts on Clinical Measures of Neurologic Function
Authors: Gianluca Del Rossi
Abstract:
Sub-concussive impacts occur frequently in collision sports such as American tackle football. Sub-concussive level impacts are defined as hits to the head that do not result in the clinical manifestation of concussion injury. Presently, there is limited information known about the short-term effects of repeated sub-concussive blows to the head. Therefore, the purpose of this investigation was to determine if standard clinical measures could detect acute impairments in neurologic function resulting from the accumulation of sub-concussive impacts throughout a season of high school American tackle football. Simple reaction time using the ruler-drop test, and oculomotor performance using the King-Devick (KD) test, were assessed in 15 athletes prior to the start of the athletic season, then repeated each week of the season, and once following its completion. The mean reaction times and fastest KD scores that were recorded or calculated from each study participant and from each test session were analyzed to assess for change in reaction time and oculomotor performance over the course of the American tackle football season. Analyses of KD data revealed improvements in oculomotor performance from baseline measurements (i.e., decreased time), with most weekly comparisons to baseline being significantly different. Statistical tests performed on the mean reaction times obtained via the ruler-drop test throughout the season revealed statistically significant declines (i.e., increased time) between baseline and weeks 3, 4, 10, and 12 of the athletic season. The inconsistent and contrasting findings between KD data and reaction time demonstrate the need to identify more robust clinical measures to definitively assess if repeated sub-concussive impacts to the head are acutely detrimental to patients.Keywords: head injury, mTBI and sport, subclinical head trauma, sub-concussive impacts
Procedia PDF Downloads 2052629 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya
Authors: Samuel Mwangi, Josephine K. Mule
Abstract:
Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.Keywords: facial recognition, access control, technology, learning
Procedia PDF Downloads 1252628 When Your Change The Business Model ~ You Change The World
Authors: H. E. Amb. Terry Earthwind Nichols
Abstract:
Over the years Ambassador Nichols observed that successful companies all have one thing in common - belief in people. His observations of people in many companies, industries, and countries have also concluded one thing - groups of achievers far exceed the expectations and timelines of their superiors. His experience with achieving this has brought forth a model for the 21st century that will not only exceed expectations of companies, but it will also set visions for the future of business globally. It is time for real discussion around the future of work and the business model that will set the example for the world. Methodologies: In-person observations over 40 years – Ambassador Nichols present during the observations. Audio-visual observations – TV, Cinema, social media (YouTube, etc.), various news outlet Reading the autobiography of some of successful leaders over the last 75 years that lead their companies from a distinct perspective your people are your commodity. Major findings: People who believe in the leader’s vision for the company so much so that they remain excited about the future of the company and want to do anything in their power to ethically achieve that vision. People who are achieving regularly in groups, division, companies, etcetera: Live more healthfully lowering both sick time off and on-the-job accidents. Cannot wait to physically get to work as much as they can to feed off the high energy present in these companies. They are fully respected and supported resulting in near zero attrition. Simply put – they do not “Burn Out”. Conclusion: To the author’s best knowledge, 20th century practices in business are no longer valid and people are not going to work in those environments any longer. The average worker in the post-covid world is better educated than 50 years ago and most importantly, they have real-time information about any subject and can stream injustices as they happen. The Consortium Model is just the model for the evolution of both humankind and business in the 21st century.Keywords: business model, future of work, people, paradigm shift, business management
Procedia PDF Downloads 782627 Decoding the Natural Hazards: The Data Paradox, Juggling Data Flows, Transparency and Secrets, Analysis of Khuzestan and Lorestan Floods of Iran
Authors: Kiyanoush Ghalavand
Abstract:
We have a complex paradox in the agriculture and environment sectors in the age of technology. In the one side, the achievements of the science and information ages are shaping to come that is very dangerous than ever last decades. The progress of the past decades is historic, connecting people, empowering individuals, groups, and states, and lifting a thousand people out of land and poverty in the process. Floods are the most frequent natural hazards damaging and recurring of all disasters in Iran. Additionally, floods are morphing into new and even more devastating forms in recent years. Khuzestan and Lorestan Provinces experienced heavy rains that began on March 28, 2019, and led to unprecedented widespread flooding and landslides across the provinces. The study was based on both secondary and primary data. For the present study, a questionnaire-based primary survey was conducted. Data were collected by using a specially designed questionnaire and other instruments, such as focus groups, interview schedules, inception workshops, and roundtable discussions with stakeholders at different levels. Farmers in Khuzestan and Lorestan provinces were the statistical population for this study. Data were analyzed with several software such as ATLASti, NVivo SPSS Win, ،E-Views. According to a factorial analysis conducted for the present study, 10 groups of factors were categorized climatic, economic, cultural, supportive, instructive, planning, military, policymaking, geographical, and human factors. They estimated 71.6 percent of explanatory factors of flood management obstacles in the agricultural sector in Lorestan and Khuzestan provinces. Several recommendations were finally made based on the study findings.Keywords: chaos theory, natural hazards, risks, environmental risks, paradox
Procedia PDF Downloads 1452626 Numerical and Experimental Investigation of Distance Between Fan and Coil Block in a Fin and Tube Air Cooler Heat Exchanger
Authors: Feyza Şahi̇n, Harun Deni̇zli̇, Mustafa Zabun, Hüseyi̇n OnbaşIoğli
Abstract:
Heat exchangers are devices that are widely used to transfer heat between fluids due to their temperature differences. As a type of heat exchanger, air coolers are heat exchangers that cool the air as it passes through the fins of the heat exchanger by transferring heat to the refrigerant in the coil tubes of the heat exchanger. An assembled fin and tube heat exchanger consists of a coil block and a casing with a fan mounted on it. The term “Fan hood” is used to define the distance between the fan and the coil block. Air coolers play a crucial role in cooling systems, and their heat transfer performance can vary depending on design parameters. These parameters can be related to the air side or the internal fluid side. For airside efficiency, the distance between the fan and the coil block affects the performance by creating dead zones at the corners of the casing and maldistribution of airflow. Therefore, a detailed study of the effect of the fan hood on the evaporator and the optimum fan hood distance is necessary for an efficient air cooler design. This study aims to investigate the value of the fan hood in a fin and tube-type air cooler heat exchanger through computational fluid dynamics (CFD) simulations and experimental investigations. CFD simulations will be used to study the airflow within the fan hood. These simulations will provide valuable insights to optimize the design of the fan hood. In addition, experimental tests will be carried out to validate the CFD results and to measure the performance of the fan hood under real conditions. The results will help us to understand the effect of fan hood design on evaporator efficiency and contribute to the development of more efficient cooling systems. This study will provide essential information for evaporator design and improving the energy efficiency of cooling systems.Keywords: heat exchanger, fan hood, heat exchanger performance, air flow performance
Procedia PDF Downloads 772625 Single Item Presenteeism Question Reliability and Validity of Persian Version in Low Back Pain Patients
Authors: Mohammadreza Khanmohammadi, Noureddin Nakhostin Ansari, Soofia Naghdi
Abstract:
Purpose: Our study aimed to validate single item presenteeism question (SIPQ) into the Persian language for patients with low back pain. Background information: low back pain is a common health problem, and it is one of the most prevalent disorder in working people. There are the different subjective way to evaluate the effect of back pain on work productivity that one of them is by implementing single item presenteeism question. This question has not been validated into the Persian language. Method: Patients were asked to answer SIPQ and pain from 0 to 10 according to numerical rating scale (NRS). The functional rating index was administrated to evaluate construct validity. For test-retest reliability, almost 50 patients re-completed the Persian SIPQ. The construct validity of SIPQ was assessed by analyzing Spearman rank correlation between this question and the Persian version of Functional rating index questionnaire. To analyze test-retest reliability, we assessed intraclass correlation coefficient (agreement) (ICC agreement) (two-way random effects model, single measure). Results: The SIPQ score of two groups of patients (84 males, 16 females, mean age ±SD: 33.85±11.16 years, range: 19-67 years) and healthy subjects (48 male, 2 female ones, mean age ±SD: 24.24 ±8.07 years) was statistically significant. (Mann-Whitney U =198.00, P<.001). The Spearman correlation of data showed that there is a significant correlation between Persian SIPQ score and Persian FRI band (r= .559, P<.001). The ICC was .62. So, the analysis indicated good, test-retest reliability. Conclusion: This study showed that Persian version of SIPQ is reliable and valid when applied to back pain patients.Keywords: cross cultural adaptation, economic burden, low back pain, Persian language, translation
Procedia PDF Downloads 4112624 Cognitive Methods for Detecting Deception During the Criminal Investigation Process
Authors: Laid Fekih
Abstract:
Background: It is difficult to detect lying, deception, and misrepresentation just by looking at verbal or non-verbal expression during the criminal investigation process, as there is a common belief that it is possible to tell whether a person is lying or telling the truth just by looking at the way they act or behave. The process of detecting lies and deception during the criminal investigation process needs more studies and research to overcome the difficulties facing the investigators. Method: The present study aimed to identify the effectiveness of cognitive methods and techniques in detecting deception during the criminal investigation. It adopted the quasi-experimental method and covered a sample of (20) defendants distributed randomly into two homogeneous groups, an experimental group of (10) defendants be subject to criminal investigation by applying cognitive techniques to detect deception and a second experimental group of (10) defendants be subject to the direct investigation method. The tool that used is a guided interview based on models of investigative questions according to the cognitive deception detection approach, which consists of three techniques of Vrij: imposing the cognitive burden, encouragement to provide more information, and ask unexpected questions, and the Direct Investigation Method. Results: Results revealed a significant difference between the two groups in term of lie detection accuracy in favour of defendants be subject to criminal investigation by applying cognitive techniques, the cognitive deception detection approach produced superior total accuracy rates both with human observers and through an analysis of objective criteria. The cognitive deception detection approach produced superior accuracy results in truth detection: 71%, deception detection: 70% compared to a direct investigation method truth detection: 52%; deception detection: 49%. Conclusion: The study recommended if practitioners use a cognitive deception detection technique, they will correctly classify more individuals than when they use a direct investigation method.Keywords: the cognitive lie detection approach, deception, criminal investigation, mental health
Procedia PDF Downloads 662623 An Investigation of the Science Process Skills of 48-66 Months Old Children
Authors: Nilüfer Kuru, Berrin Akman
Abstract:
In this study, science process skills of children with ages varying between 48-months and 66-months are analyzed. Science process skills of children are investigated in terms of factors including gender of children, attendance of children to the previous educational institution and duration of their attendance, educational background of their parents, ages of children and teachers, professional experience of teachers, educational background, and department of graduation of teachers, type of pre-school education institution of teachers and children. Sample of research consists of 250 children aged between 48-months and 66-months who attend state and private kindergartens under the Ministry of National Education, nursery classes of elementary schools and kindergartens of establishments in central districts of Ankara and 50 teachers who serve in these children’s classes. Science Observation Form, reached from the website of Alaska Department of Education & Early, are analyzed in terms of language, content, construct validity, and reliability by the researchers. Additionally, Personal Information Form is also developed by the researchers. Data obtained in the study are analyzed with SPSS 16.0 package program to obtain percentage and frequency, Kruskal Wallis H-test, and Mann- Whitney U test, which are one of the non-parametric tests, are used. Within the context of this study it has been seen that independent variables of age, type of school attending and status of attendance to pre-school education, educational background of children’s father are meaningful expositive in gaining science process skills for children. It has been seen that period of service of teachers, duration of attendance to pre-school education for children, gender of children and educational background of children’s mother are not meaningful expositive in gaining science process skills for children.Keywords: preschool, science process skills, early childhood education, science
Procedia PDF Downloads 3692622 The Promotion of a Risk Culture: a Descriptive Study of Ghanaian Banks
Authors: Gerhard Grebe, Johan Marx
Abstract:
The aim of the study is to assess the state of operational risk management and the adoption of an appropriate risk culture in Ghanaian banks. The Bank of Ghana (BoG) joined the Basel Consultative Group (BCG) of the Basel Committee on Bank Supervision (BCBS) in 2021 and is proceeding with the implementation of the Basel III international regulatory framework for banks. The BoG’s Directive about risk management encourages, inter alia, the creation of an appropriate risk culture by Ghanaian banks. However, it is not evident how the risk management staff of Ghanaian banks experience the risk culture and the implementation of operational risk management in the banks where they are employed. Ghana is a developing economy, and it is addressing challenges with its organisational culture. According to Transparency International, successive Ghanaian governments claim to be fighting corruption, but little success has been achieved so far. This points to a possible lack of accountability, transparency, and integrity in the environment in which Ghanaian banks operate and which could influence their risk culture negatively. Purposive sampling was used for the survey, and the questionnaire was completed byGhanaian bank personnel who specializesin operational risk management, risk governance, and compliance, bank supervision, risk analyses, as well as the implementation of the operational risk management requirements of the Basel regulatory frameworks. The respondents indicated that they are fostering a risk culture and implementing monitoring and reporting procedures; the three lines of defence (3LOD); compliance; internal auditing; disclosure of operational risk information; and receiving guidance from the bank supervisor in an attempt to improve their operational risk management practices. However, the respondents reported the following challenges with staff members who are not inside the risk management departments(in order of priority), namelydemonstrating a risk culture, training and development; communication; reporting and disclosure; roles and responsibilities; performance appraisal; and technological and environmental barriers. Recommendations to address these challenges are providedKeywords: ghana, operational risk, risk culture, risk management
Procedia PDF Downloads 1222621 Applications of Forensics/DNA Tools in Combating Gender-Based Violence: A Case Study in Nigeria
Authors: Edeaghe Ehikhamenor, Jennifer Nnamdi
Abstract:
Introduction: Gender-based violence (GBV) was a well-known global crisis before the COVID-19 pandemic. The pandemic burden only intensified the crisis. With prevailing lockdowns, increased poverty due to high unemployment, especially affecting females, and other mobility restrictions that have left many women trapped with their abusers, plus isolation from social contact and support networks, GBV cases spiraled out of control. Prevalence of economic with cultural disparity, which is greatly manifested in Nigeria, is a major contributory factor to GBV. This is made worst by religious adherents where the females are virtually relegated to the background. Our societal approaches to investigations and sanctions to culprits have not sufficiently applied forensic/DNA tools in combating these major vices. Violence against women or some rare cases against men can prevent them from carrying out their duties regardless of the position they hold. Objective: The main objective of this research is to highlight the origin of GBV, the victims, types, contributing factors, and the applications of forensics/DNA tools and remedies so as to minimize GBV in our society. Methods: Descriptive information was obtained through the search on our daily newspapers, electronic media, google scholar websites, other authors' observations and personal experiences, plus anecdotal reports. Results: Findings from our exploratory searches revealed a high incidence of GBV with very limited or no applications of Forensics/DNA tools as an intervening mechanism to reduce GBV in Nigeria. Conclusion: Nigeria needs to develop clear-cut policies on forensics/DNA tools in terms of institutional framework to develop a curriculum for the training of all stakeholders to fast-track justice for victims of GBV so as to serve as a deterrent to other culprits.Keywords: gender-based violence, forensics, DNA, justice
Procedia PDF Downloads 842620 Experimental Study and Numerical Simulation of the Reaction and Flow on the Membrane Wall of Entrained Flow Gasifier
Authors: Jianliang Xu, Zhenghua Dai, Zhongjie Shen, Haifeng Liu, Fuchen Wang
Abstract:
In an entrained flow gasifier, the combustible components are converted into the gas phase, and the mineral content is converted into ash. Most of the ash particles or droplets are deposited on the refractory or membrane wall and form a slag layer that flows down to the quenching system. The captured particle reaction process and slag flow and phase transformation play an important role in gasifier performance and safe and stable operation. The reaction characteristic of captured char particles on the molten slag had been studied by applied a high-temperature stage microscope. The gasification process of captured chars with CO2 on the slag surface was observed and recorded, compared to the original char gasification. The particle size evolution, heat transfer process are discussed, and the gasification reaction index of the capture char particle are modeled. Molten slag layer promoted the char reactivity from the analysis of reaction index, Coupled with heat transfer analysis, shrinking particle model (SPM) was applied and modified to predict the gasification time at carbon conversion of 0.9, and results showed an agreement with the experimental data. A comprehensive model with gas-particle-slag flow and reaction models was used to model the different industry gasifier. The carbon conversion information in the spatial space and slag layer surface are investigated. The slag flow characteristic, such as slag velocity, molten slag thickness, slag temperature distribution on the membrane wall and refractory brick are discussed.Keywords: char, slag, numerical simulation, gasification, wall reaction, membrane wall
Procedia PDF Downloads 3072619 High Fidelity Interactive Video Segmentation Using Tensor Decomposition, Boundary Loss, Convolutional Tessellations, and Context-Aware Skip Connections
Authors: Anthony D. Rhodes, Manan Goel
Abstract:
We provide a high fidelity deep learning algorithm (HyperSeg) for interactive video segmentation tasks using a dense convolutional network with context-aware skip connections and compressed, 'hypercolumn' image features combined with a convolutional tessellation procedure. In order to maintain high output fidelity, our model crucially processes and renders all image features in high resolution, without utilizing downsampling or pooling procedures. We maintain this consistent, high grade fidelity efficiently in our model chiefly through two means: (1) we use a statistically-principled, tensor decomposition procedure to modulate the number of hypercolumn features and (2) we render these features in their native resolution using a convolutional tessellation technique. For improved pixel-level segmentation results, we introduce a boundary loss function; for improved temporal coherence in video data, we include temporal image information in our model. Through experiments, we demonstrate the improved accuracy of our model against baseline models for interactive segmentation tasks using high resolution video data. We also introduce a benchmark video segmentation dataset, the VFX Segmentation Dataset, which contains over 27,046 high resolution video frames, including green screen and various composited scenes with corresponding, hand-crafted, pixel-level segmentations. Our work presents a improves state of the art segmentation fidelity with high resolution data and can be used across a broad range of application domains, including VFX pipelines and medical imaging disciplines.Keywords: computer vision, object segmentation, interactive segmentation, model compression
Procedia PDF Downloads 1202618 Digital Environment as a Factor of the City's Competitiveness in Attracting Tourists: The Case of Yekaterinburg
Authors: Alexander S. Burnasov, Anatoly V. Stepanov, Maria Y. Ilyushkina
Abstract:
In the conditions of transition to the digital economy, the digital environment of the city becomes one of the key factors of its tourism attractiveness. Modern digital environment makes travelling more accessible, improves the quality of travel services and the attractiveness of many tourist destinations. The digitalization of the industry allows to use resources more efficiently, to simplify business processes, to minimize risks, and to improve travel safety. The city promotion as a tourist destination in the foreign market becomes decisive in the digital environment. Information technologies are extremely important for the functioning of not only any tourist enterprise but also the city as a whole. In addition to solving traditional problems, it is also possible to implement some innovations from the tourism industry, such as the availability of city services in international systems of booking tickets and booking rooms in hotels, the possibility of early booking of theater and museum tickets, the possibility of non-cash payment by cards of international payment systems, Internet access in the urban environment for travelers. The availability of the city's digital services makes it possible to reduce ordering costs, contributes to the optimal selection of tourist products that meet the requirements of the tourist, provides increased transparency of transactions. The users can compare prices, features, services, and reviews of the travel service. The ability to share impressions with friends thousands of miles away directly affects the image of the city. It is possible to promote the image of the city in the digital environment not only through world-scale events (such as World Cup 2018, international summits, etc.) but also through the creation and management of services in the digital environment aimed at supporting tourism services, which will help to improve the positioning of the city in the global tourism market.Keywords: competitiveness, digital environment, travelling, Yekaterinburg
Procedia PDF Downloads 1362617 Exploring Elder Care in Different Settings in West Bengal: A Psycho-Social Study of Private Homes, Hospitals and Long-Term Care Facilities
Authors: Tulika Bhattacharyya, Suhita C. Chatterjee
Abstract:
West Bengal, one of the most rapidly ageing states in India, has inadequate structure for elder care. Therefore, there is an urgent need to improve elder care which involves focusing on different care settings where the elderly exists, like - Homes, Hospitals and Long-Term Care facilities (e.g. - Old Age Homes, Hospices). The study explores various elder care settings, with the intention to develop an understanding about them, and thereby generate comprehensive information about the entire spectrum of elder care in Kolkata. Empirical data are collected from the elderly and their caregivers in different settings. The tools for data collection are narratives, in-depth interviews and focus group discussions, along with field observations. Mixed method design is adopted to analyze the complexities of elder care in different set ups. The major challenges of elder care in private Homes are: architecturally inadequate housing conditions, paucity of financial support and scarcity of skilled caregivers. While the key factors preventing the Hospital and Long-Term Care Facilities from providing elder care services are inadequate policies and set governmental standards for elder care for the hospitalized elderly in various departments of the Hospital and the elderly residing in different kinds of Long Term Care Facilities. The limitations in each care setting results in considerable neglect and abuse of the elderly. The major challenges in elder care in West Bengal are lack of continuum between different care settings/ peripheral location of private Homes within public health framework and inadequate state Palliative policy- including narcotic regulations. The study suggests remedial measures to improve the capacity to deliver elder care in different settings.Keywords: elder care settings, family caregiver, home care, geriatric hospital care, long term care facility
Procedia PDF Downloads 287